Apr 12 18:40:59.837229 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:40:59.837255 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:59.837267 kernel: BIOS-provided physical RAM map: Apr 12 18:40:59.837274 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:40:59.837282 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:40:59.837289 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:40:59.837299 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Apr 12 18:40:59.837307 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Apr 12 18:40:59.837316 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:40:59.837324 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:40:59.837332 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Apr 12 18:40:59.837340 kernel: NX (Execute Disable) protection: active Apr 12 18:40:59.837347 kernel: SMBIOS 2.8 present. Apr 12 18:40:59.837356 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Apr 12 18:40:59.837367 kernel: Hypervisor detected: KVM Apr 12 18:40:59.837375 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:40:59.837383 kernel: kvm-clock: cpu 0, msr 51191001, primary cpu clock Apr 12 18:40:59.837392 kernel: kvm-clock: using sched offset of 2751786895 cycles Apr 12 18:40:59.837401 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:40:59.837409 kernel: tsc: Detected 2794.748 MHz processor Apr 12 18:40:59.837418 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:40:59.837427 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:40:59.837436 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Apr 12 18:40:59.837446 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:40:59.837455 kernel: Using GB pages for direct mapping Apr 12 18:40:59.837464 kernel: ACPI: Early table checksum verification disabled Apr 12 18:40:59.837472 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Apr 12 18:40:59.837481 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837490 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837498 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837507 kernel: ACPI: FACS 0x000000009CFE0000 000040 Apr 12 18:40:59.837515 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837526 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837534 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:59.837543 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Apr 12 18:40:59.837551 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Apr 12 18:40:59.837560 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Apr 12 18:40:59.837568 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Apr 12 18:40:59.837577 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Apr 12 18:40:59.837586 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Apr 12 18:40:59.837599 kernel: No NUMA configuration found Apr 12 18:40:59.837608 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Apr 12 18:40:59.837617 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Apr 12 18:40:59.837627 kernel: Zone ranges: Apr 12 18:40:59.837636 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:40:59.837645 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Apr 12 18:40:59.837656 kernel: Normal empty Apr 12 18:40:59.837665 kernel: Movable zone start for each node Apr 12 18:40:59.837674 kernel: Early memory node ranges Apr 12 18:40:59.837683 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:40:59.837692 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Apr 12 18:40:59.837701 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Apr 12 18:40:59.837710 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:40:59.837719 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:40:59.837728 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Apr 12 18:40:59.837738 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:40:59.837747 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:40:59.837756 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:40:59.837766 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:40:59.837775 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:40:59.837784 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:40:59.837793 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:40:59.837802 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:40:59.837811 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:40:59.837822 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:40:59.837831 kernel: TSC deadline timer available Apr 12 18:40:59.837840 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Apr 12 18:40:59.837849 kernel: kvm-guest: KVM setup pv remote TLB flush Apr 12 18:40:59.837858 kernel: kvm-guest: setup PV sched yield Apr 12 18:40:59.837867 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Apr 12 18:40:59.837876 kernel: Booting paravirtualized kernel on KVM Apr 12 18:40:59.837885 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:40:59.837895 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Apr 12 18:40:59.837904 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Apr 12 18:40:59.837915 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Apr 12 18:40:59.837923 kernel: pcpu-alloc: [0] 0 1 2 3 Apr 12 18:40:59.837931 kernel: kvm-guest: setup async PF for cpu 0 Apr 12 18:40:59.837940 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Apr 12 18:40:59.837950 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:40:59.837959 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:40:59.837968 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Apr 12 18:40:59.837977 kernel: Policy zone: DMA32 Apr 12 18:40:59.837988 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:59.838012 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:40:59.838021 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:40:59.838030 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:40:59.838040 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:40:59.838050 kernel: Memory: 2436704K/2571756K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 134792K reserved, 0K cma-reserved) Apr 12 18:40:59.838059 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:40:59.838068 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:40:59.838077 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:40:59.838088 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:40:59.838098 kernel: rcu: RCU event tracing is enabled. Apr 12 18:40:59.838107 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:40:59.838117 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:40:59.838126 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:40:59.838135 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:40:59.838145 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:40:59.838154 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Apr 12 18:40:59.838163 kernel: random: crng init done Apr 12 18:40:59.838190 kernel: Console: colour VGA+ 80x25 Apr 12 18:40:59.838200 kernel: printk: console [ttyS0] enabled Apr 12 18:40:59.838209 kernel: ACPI: Core revision 20210730 Apr 12 18:40:59.838219 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Apr 12 18:40:59.838228 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:40:59.838237 kernel: x2apic enabled Apr 12 18:40:59.838265 kernel: Switched APIC routing to physical x2apic. Apr 12 18:40:59.838275 kernel: kvm-guest: setup PV IPIs Apr 12 18:40:59.838284 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:40:59.838296 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:40:59.838305 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Apr 12 18:40:59.838314 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Apr 12 18:40:59.838323 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Apr 12 18:40:59.838332 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Apr 12 18:40:59.838342 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:40:59.838351 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:40:59.838360 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:40:59.838370 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:40:59.838387 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Apr 12 18:40:59.838396 kernel: RETBleed: Mitigation: untrained return thunk Apr 12 18:40:59.838406 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:40:59.838418 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:40:59.838427 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:40:59.838437 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:40:59.838447 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:40:59.838456 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:40:59.838466 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:40:59.838483 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:40:59.838492 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:40:59.838502 kernel: LSM: Security Framework initializing Apr 12 18:40:59.838511 kernel: SELinux: Initializing. Apr 12 18:40:59.838521 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:40:59.838531 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:40:59.838541 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Apr 12 18:40:59.838552 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Apr 12 18:40:59.838562 kernel: ... version: 0 Apr 12 18:40:59.838571 kernel: ... bit width: 48 Apr 12 18:40:59.838581 kernel: ... generic registers: 6 Apr 12 18:40:59.838591 kernel: ... value mask: 0000ffffffffffff Apr 12 18:40:59.838600 kernel: ... max period: 00007fffffffffff Apr 12 18:40:59.838610 kernel: ... fixed-purpose events: 0 Apr 12 18:40:59.838619 kernel: ... event mask: 000000000000003f Apr 12 18:40:59.838629 kernel: signal: max sigframe size: 1776 Apr 12 18:40:59.838638 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:40:59.838649 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:40:59.838659 kernel: x86: Booting SMP configuration: Apr 12 18:40:59.838669 kernel: .... node #0, CPUs: #1 Apr 12 18:40:59.838678 kernel: kvm-clock: cpu 1, msr 51191041, secondary cpu clock Apr 12 18:40:59.838688 kernel: kvm-guest: setup async PF for cpu 1 Apr 12 18:40:59.838698 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Apr 12 18:40:59.838707 kernel: #2 Apr 12 18:40:59.838717 kernel: kvm-clock: cpu 2, msr 51191081, secondary cpu clock Apr 12 18:40:59.838727 kernel: kvm-guest: setup async PF for cpu 2 Apr 12 18:40:59.838738 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Apr 12 18:40:59.838748 kernel: #3 Apr 12 18:40:59.838757 kernel: kvm-clock: cpu 3, msr 511910c1, secondary cpu clock Apr 12 18:40:59.838767 kernel: kvm-guest: setup async PF for cpu 3 Apr 12 18:40:59.838776 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Apr 12 18:40:59.838786 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:40:59.838796 kernel: smpboot: Max logical packages: 1 Apr 12 18:40:59.838805 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Apr 12 18:40:59.838815 kernel: devtmpfs: initialized Apr 12 18:40:59.838826 kernel: x86/mm: Memory block size: 128MB Apr 12 18:40:59.838836 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:40:59.838846 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:40:59.838855 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:40:59.838865 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:40:59.838874 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:40:59.838884 kernel: audit: type=2000 audit(1712947259.239:1): state=initialized audit_enabled=0 res=1 Apr 12 18:40:59.838893 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:40:59.838903 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:40:59.838914 kernel: cpuidle: using governor menu Apr 12 18:40:59.838923 kernel: ACPI: bus type PCI registered Apr 12 18:40:59.838932 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:40:59.838942 kernel: dca service started, version 1.12.1 Apr 12 18:40:59.838951 kernel: PCI: Using configuration type 1 for base access Apr 12 18:40:59.838961 kernel: PCI: Using configuration type 1 for extended access Apr 12 18:40:59.838971 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:40:59.838980 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:40:59.838990 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:40:59.839012 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:40:59.839022 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:40:59.839031 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:40:59.839041 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:40:59.839051 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:40:59.839060 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:40:59.839070 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:40:59.839080 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:40:59.839089 kernel: ACPI: Interpreter enabled Apr 12 18:40:59.839100 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:40:59.839110 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:40:59.839119 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:40:59.839129 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:40:59.839139 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:40:59.839368 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:40:59.839385 kernel: acpiphp: Slot [3] registered Apr 12 18:40:59.839395 kernel: acpiphp: Slot [4] registered Apr 12 18:40:59.839406 kernel: acpiphp: Slot [5] registered Apr 12 18:40:59.839416 kernel: acpiphp: Slot [6] registered Apr 12 18:40:59.839425 kernel: acpiphp: Slot [7] registered Apr 12 18:40:59.839435 kernel: acpiphp: Slot [8] registered Apr 12 18:40:59.839444 kernel: acpiphp: Slot [9] registered Apr 12 18:40:59.839454 kernel: acpiphp: Slot [10] registered Apr 12 18:40:59.839463 kernel: acpiphp: Slot [11] registered Apr 12 18:40:59.839473 kernel: acpiphp: Slot [12] registered Apr 12 18:40:59.839482 kernel: acpiphp: Slot [13] registered Apr 12 18:40:59.839491 kernel: acpiphp: Slot [14] registered Apr 12 18:40:59.839502 kernel: acpiphp: Slot [15] registered Apr 12 18:40:59.839512 kernel: acpiphp: Slot [16] registered Apr 12 18:40:59.839521 kernel: acpiphp: Slot [17] registered Apr 12 18:40:59.839531 kernel: acpiphp: Slot [18] registered Apr 12 18:40:59.839540 kernel: acpiphp: Slot [19] registered Apr 12 18:40:59.839550 kernel: acpiphp: Slot [20] registered Apr 12 18:40:59.839559 kernel: acpiphp: Slot [21] registered Apr 12 18:40:59.839569 kernel: acpiphp: Slot [22] registered Apr 12 18:40:59.839578 kernel: acpiphp: Slot [23] registered Apr 12 18:40:59.839589 kernel: acpiphp: Slot [24] registered Apr 12 18:40:59.839599 kernel: acpiphp: Slot [25] registered Apr 12 18:40:59.839608 kernel: acpiphp: Slot [26] registered Apr 12 18:40:59.839618 kernel: acpiphp: Slot [27] registered Apr 12 18:40:59.839627 kernel: acpiphp: Slot [28] registered Apr 12 18:40:59.839636 kernel: acpiphp: Slot [29] registered Apr 12 18:40:59.839646 kernel: acpiphp: Slot [30] registered Apr 12 18:40:59.839655 kernel: acpiphp: Slot [31] registered Apr 12 18:40:59.839665 kernel: PCI host bridge to bus 0000:00 Apr 12 18:40:59.839785 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:40:59.839883 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:40:59.839973 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:40:59.840079 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Apr 12 18:40:59.840190 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:40:59.840304 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:40:59.840454 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:40:59.840582 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:40:59.840699 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:40:59.840796 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Apr 12 18:40:59.840889 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:40:59.840982 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:40:59.841086 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:40:59.841190 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:40:59.841304 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:40:59.841398 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:40:59.841488 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:40:59.841606 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Apr 12 18:40:59.841710 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Apr 12 18:40:59.841817 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Apr 12 18:40:59.841929 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Apr 12 18:40:59.842053 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:40:59.842244 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:40:59.842356 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:40:59.842466 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Apr 12 18:40:59.842563 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Apr 12 18:40:59.842669 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:40:59.842765 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:40:59.842858 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Apr 12 18:40:59.842951 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Apr 12 18:40:59.843074 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:40:59.843168 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Apr 12 18:40:59.843277 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Apr 12 18:40:59.843371 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Apr 12 18:40:59.843473 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Apr 12 18:40:59.843488 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:40:59.843498 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:40:59.843507 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:40:59.843516 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:40:59.843526 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:40:59.843536 kernel: iommu: Default domain type: Translated Apr 12 18:40:59.843545 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:40:59.843648 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:40:59.843759 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:40:59.843868 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:40:59.843883 kernel: vgaarb: loaded Apr 12 18:40:59.843894 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:40:59.843904 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:40:59.843914 kernel: PTP clock support registered Apr 12 18:40:59.843923 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:40:59.843932 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:40:59.843944 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:40:59.843954 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Apr 12 18:40:59.843963 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Apr 12 18:40:59.843973 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Apr 12 18:40:59.843983 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:40:59.843993 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:40:59.844013 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:40:59.844022 kernel: pnp: PnP ACPI init Apr 12 18:40:59.844148 kernel: pnp 00:02: [dma 2] Apr 12 18:40:59.844167 kernel: pnp: PnP ACPI: found 6 devices Apr 12 18:40:59.844192 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:40:59.844202 kernel: NET: Registered PF_INET protocol family Apr 12 18:40:59.844212 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:40:59.844222 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:40:59.844232 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:40:59.844241 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:40:59.844251 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:40:59.844263 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:40:59.844273 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:40:59.844283 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:40:59.844293 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:40:59.844303 kernel: NET: Registered PF_XDP protocol family Apr 12 18:40:59.844398 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:40:59.844497 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:40:59.844580 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:40:59.844668 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Apr 12 18:40:59.844753 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:40:59.844875 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:40:59.844988 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:40:59.845122 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:40:59.845136 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:40:59.845157 kernel: Initialise system trusted keyrings Apr 12 18:40:59.845167 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:40:59.845188 kernel: Key type asymmetric registered Apr 12 18:40:59.845201 kernel: Asymmetric key parser 'x509' registered Apr 12 18:40:59.845210 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:40:59.845220 kernel: io scheduler mq-deadline registered Apr 12 18:40:59.845241 kernel: io scheduler kyber registered Apr 12 18:40:59.845251 kernel: io scheduler bfq registered Apr 12 18:40:59.845261 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:40:59.845272 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:40:59.845282 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:40:59.845292 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:40:59.845304 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:40:59.845314 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:40:59.845323 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:40:59.845333 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:40:59.845343 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:40:59.845484 kernel: rtc_cmos 00:05: RTC can wake from S4 Apr 12 18:40:59.845501 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:40:59.845613 kernel: rtc_cmos 00:05: registered as rtc0 Apr 12 18:40:59.845734 kernel: rtc_cmos 00:05: setting system clock to 2024-04-12T18:40:59 UTC (1712947259) Apr 12 18:40:59.845856 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Apr 12 18:40:59.845871 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:40:59.845880 kernel: Segment Routing with IPv6 Apr 12 18:40:59.845889 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:40:59.845898 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:40:59.845908 kernel: Key type dns_resolver registered Apr 12 18:40:59.845931 kernel: IPI shorthand broadcast: enabled Apr 12 18:40:59.845941 kernel: sched_clock: Marking stable (413313059, 155120925)->(633481861, -65047877) Apr 12 18:40:59.845953 kernel: registered taskstats version 1 Apr 12 18:40:59.845963 kernel: Loading compiled-in X.509 certificates Apr 12 18:40:59.845972 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:40:59.845982 kernel: Key type .fscrypt registered Apr 12 18:40:59.845991 kernel: Key type fscrypt-provisioning registered Apr 12 18:40:59.846014 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:40:59.846032 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:40:59.846045 kernel: ima: No architecture policies found Apr 12 18:40:59.846055 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:40:59.846068 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:40:59.846077 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:40:59.846087 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:40:59.846097 kernel: Run /init as init process Apr 12 18:40:59.846118 kernel: with arguments: Apr 12 18:40:59.846129 kernel: /init Apr 12 18:40:59.846139 kernel: with environment: Apr 12 18:40:59.846172 kernel: HOME=/ Apr 12 18:40:59.846195 kernel: TERM=linux Apr 12 18:40:59.846208 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:40:59.846222 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:40:59.846235 systemd[1]: Detected virtualization kvm. Apr 12 18:40:59.846246 systemd[1]: Detected architecture x86-64. Apr 12 18:40:59.846268 systemd[1]: Running in initrd. Apr 12 18:40:59.846278 systemd[1]: No hostname configured, using default hostname. Apr 12 18:40:59.846289 systemd[1]: Hostname set to . Apr 12 18:40:59.846302 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:40:59.846313 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:40:59.846335 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:40:59.846346 systemd[1]: Reached target cryptsetup.target. Apr 12 18:40:59.846357 systemd[1]: Reached target paths.target. Apr 12 18:40:59.846370 systemd[1]: Reached target slices.target. Apr 12 18:40:59.846390 systemd[1]: Reached target swap.target. Apr 12 18:40:59.846404 systemd[1]: Reached target timers.target. Apr 12 18:40:59.846417 systemd[1]: Listening on iscsid.socket. Apr 12 18:40:59.846428 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:40:59.846439 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:40:59.846460 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:40:59.846471 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:40:59.846482 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:40:59.846493 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:40:59.846511 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:40:59.846527 systemd[1]: Reached target sockets.target. Apr 12 18:40:59.846538 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:40:59.846548 systemd[1]: Finished network-cleanup.service. Apr 12 18:40:59.846567 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:40:59.846582 systemd[1]: Starting systemd-journald.service... Apr 12 18:40:59.846593 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:40:59.846605 systemd[1]: Starting systemd-resolved.service... Apr 12 18:40:59.846616 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:40:59.846626 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:40:59.846637 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:40:59.846662 systemd-journald[198]: Journal started Apr 12 18:40:59.846728 systemd-journald[198]: Runtime Journal (/run/log/journal/100e01d3455546f2a458373905908595) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:40:59.832999 systemd-modules-load[199]: Inserted module 'overlay' Apr 12 18:40:59.880141 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:40:59.880162 kernel: audit: type=1130 audit(1712947259.870:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.880186 systemd[1]: Started systemd-journald.service. Apr 12 18:40:59.880199 kernel: Bridge firewalling registered Apr 12 18:40:59.880207 kernel: audit: type=1130 audit(1712947259.874:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.874000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.856943 systemd-resolved[200]: Positive Trust Anchors: Apr 12 18:40:59.884838 kernel: audit: type=1130 audit(1712947259.880:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.856954 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:40:59.856989 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:40:59.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.859869 systemd-resolved[200]: Defaulting to hostname 'linux'. Apr 12 18:40:59.900655 kernel: audit: type=1130 audit(1712947259.895:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.900684 kernel: audit: type=1130 audit(1712947259.900:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.876347 systemd[1]: Started systemd-resolved.service. Apr 12 18:40:59.880097 systemd-modules-load[199]: Inserted module 'br_netfilter' Apr 12 18:40:59.907291 kernel: SCSI subsystem initialized Apr 12 18:40:59.880747 systemd[1]: Reached target nss-lookup.target. Apr 12 18:40:59.886221 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:40:59.889510 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:40:59.895793 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:40:59.901518 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:40:59.914278 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:40:59.920860 kernel: audit: type=1130 audit(1712947259.915:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.915000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.916064 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:40:59.924741 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:40:59.924766 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:40:59.925543 dracut-cmdline[217]: dracut-dracut-053 Apr 12 18:40:59.927221 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:40:59.927420 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:40:59.933561 systemd-modules-load[199]: Inserted module 'dm_multipath' Apr 12 18:40:59.934280 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:40:59.940717 kernel: audit: type=1130 audit(1712947259.935:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.936491 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:40:59.944851 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:40:59.949967 kernel: audit: type=1130 audit(1712947259.945:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:59.992209 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:41:00.011214 kernel: iscsi: registered transport (tcp) Apr 12 18:41:00.031205 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:41:00.031251 kernel: QLogic iSCSI HBA Driver Apr 12 18:41:00.053970 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:41:00.059293 kernel: audit: type=1130 audit(1712947260.054:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.055608 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:41:00.099213 kernel: raid6: avx2x4 gen() 30432 MB/s Apr 12 18:41:00.116202 kernel: raid6: avx2x4 xor() 7651 MB/s Apr 12 18:41:00.133203 kernel: raid6: avx2x2 gen() 32468 MB/s Apr 12 18:41:00.150208 kernel: raid6: avx2x2 xor() 19193 MB/s Apr 12 18:41:00.167199 kernel: raid6: avx2x1 gen() 26452 MB/s Apr 12 18:41:00.184208 kernel: raid6: avx2x1 xor() 14736 MB/s Apr 12 18:41:00.201220 kernel: raid6: sse2x4 gen() 14677 MB/s Apr 12 18:41:00.218206 kernel: raid6: sse2x4 xor() 7498 MB/s Apr 12 18:41:00.235204 kernel: raid6: sse2x2 gen() 15997 MB/s Apr 12 18:41:00.252211 kernel: raid6: sse2x2 xor() 9481 MB/s Apr 12 18:41:00.269206 kernel: raid6: sse2x1 gen() 12180 MB/s Apr 12 18:41:00.286658 kernel: raid6: sse2x1 xor() 7491 MB/s Apr 12 18:41:00.286683 kernel: raid6: using algorithm avx2x2 gen() 32468 MB/s Apr 12 18:41:00.286693 kernel: raid6: .... xor() 19193 MB/s, rmw enabled Apr 12 18:41:00.287400 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:41:00.300197 kernel: xor: automatically using best checksumming function avx Apr 12 18:41:00.390204 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:41:00.397086 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:41:00.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.398000 audit: BPF prog-id=7 op=LOAD Apr 12 18:41:00.398000 audit: BPF prog-id=8 op=LOAD Apr 12 18:41:00.399261 systemd[1]: Starting systemd-udevd.service... Apr 12 18:41:00.411494 systemd-udevd[400]: Using default interface naming scheme 'v252'. Apr 12 18:41:00.416112 systemd[1]: Started systemd-udevd.service. Apr 12 18:41:00.416000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.417137 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:41:00.426292 dracut-pre-trigger[401]: rd.md=0: removing MD RAID activation Apr 12 18:41:00.446521 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:41:00.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.447793 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:41:00.482071 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:41:00.482000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:00.512199 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:41:00.518333 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:41:00.530207 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:41:00.530258 kernel: AES CTR mode by8 optimization enabled Apr 12 18:41:00.537203 kernel: libata version 3.00 loaded. Apr 12 18:41:00.537229 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:41:00.540172 kernel: GPT:9289727 != 19775487 Apr 12 18:41:00.540279 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:41:00.540294 kernel: GPT:9289727 != 19775487 Apr 12 18:41:00.540304 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:41:00.540312 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:00.542248 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:41:00.543493 kernel: scsi host0: ata_piix Apr 12 18:41:00.543610 kernel: scsi host1: ata_piix Apr 12 18:41:00.543704 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Apr 12 18:41:00.543714 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Apr 12 18:41:00.701230 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Apr 12 18:41:00.703228 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Apr 12 18:41:00.716770 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:41:00.720431 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (459) Apr 12 18:41:00.719376 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:41:00.730601 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:41:00.737515 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Apr 12 18:41:00.737713 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:41:00.737970 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:41:00.742729 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:41:00.745430 systemd[1]: Starting disk-uuid.service... Apr 12 18:41:00.754838 disk-uuid[532]: Primary Header is updated. Apr 12 18:41:00.754838 disk-uuid[532]: Secondary Entries is updated. Apr 12 18:41:00.754838 disk-uuid[532]: Secondary Header is updated. Apr 12 18:41:00.758557 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Apr 12 18:41:00.758702 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:00.761220 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:01.765203 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:01.765534 disk-uuid[533]: The operation has completed successfully. Apr 12 18:41:01.786471 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:41:01.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.786000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.786559 systemd[1]: Finished disk-uuid.service. Apr 12 18:41:01.800417 systemd[1]: Starting verity-setup.service... Apr 12 18:41:01.812211 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Apr 12 18:41:01.830550 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:41:01.832537 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:41:01.834858 systemd[1]: Finished verity-setup.service. Apr 12 18:41:01.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.899919 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:41:01.902678 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:41:01.900377 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:41:01.902705 systemd[1]: Starting ignition-setup.service... Apr 12 18:41:01.906155 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:41:01.918205 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:41:01.918259 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:41:01.918274 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:41:01.926441 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:41:01.968019 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:41:01.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.969000 audit: BPF prog-id=9 op=LOAD Apr 12 18:41:01.970151 systemd[1]: Starting systemd-networkd.service... Apr 12 18:41:01.995682 systemd-networkd[703]: lo: Link UP Apr 12 18:41:01.995694 systemd-networkd[703]: lo: Gained carrier Apr 12 18:41:01.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:01.996227 systemd-networkd[703]: Enumeration completed Apr 12 18:41:01.996474 systemd-networkd[703]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:41:01.996516 systemd[1]: Started systemd-networkd.service. Apr 12 18:41:01.997903 systemd[1]: Reached target network.target. Apr 12 18:41:01.998096 systemd-networkd[703]: eth0: Link UP Apr 12 18:41:01.998101 systemd-networkd[703]: eth0: Gained carrier Apr 12 18:41:02.000700 systemd[1]: Starting iscsiuio.service... Apr 12 18:41:02.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.003490 systemd[1]: Finished ignition-setup.service. Apr 12 18:41:02.005669 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:41:02.027078 systemd[1]: Started iscsiuio.service. Apr 12 18:41:02.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.028910 systemd[1]: Starting iscsid.service... Apr 12 18:41:02.032347 iscsid[710]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:41:02.032347 iscsid[710]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:41:02.032347 iscsid[710]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:41:02.032347 iscsid[710]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:41:02.032347 iscsid[710]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:41:02.032347 iscsid[710]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:41:02.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.035251 systemd[1]: Started iscsid.service. Apr 12 18:41:02.041835 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:41:02.043397 systemd-networkd[703]: eth0: DHCPv4 address 10.0.0.14/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:41:02.078485 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:41:02.078000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.079265 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:41:02.079309 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:41:02.079539 systemd[1]: Reached target remote-fs.target. Apr 12 18:41:02.080591 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:41:02.088440 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:41:02.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.125288 ignition[708]: Ignition 2.14.0 Apr 12 18:41:02.125304 ignition[708]: Stage: fetch-offline Apr 12 18:41:02.125387 ignition[708]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:02.125400 ignition[708]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:02.125527 ignition[708]: parsed url from cmdline: "" Apr 12 18:41:02.125532 ignition[708]: no config URL provided Apr 12 18:41:02.125538 ignition[708]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:41:02.125547 ignition[708]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:41:02.125568 ignition[708]: op(1): [started] loading QEMU firmware config module Apr 12 18:41:02.125574 ignition[708]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:41:02.133142 ignition[708]: op(1): [finished] loading QEMU firmware config module Apr 12 18:41:02.215624 ignition[708]: parsing config with SHA512: ba058b72aafea311f1d302d547dfe8005d286fac0464cc191dcd8cd7a9e88bdfd5fafae1651887c6ae87bb3a4e1e30649951645ef57b4093985ea19499f69991 Apr 12 18:41:02.255270 unknown[708]: fetched base config from "system" Apr 12 18:41:02.255282 unknown[708]: fetched user config from "qemu" Apr 12 18:41:02.255847 ignition[708]: fetch-offline: fetch-offline passed Apr 12 18:41:02.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.255926 systemd-resolved[200]: Detected conflict on linux IN A 10.0.0.14 Apr 12 18:41:02.255929 ignition[708]: Ignition finished successfully Apr 12 18:41:02.255937 systemd-resolved[200]: Hostname conflict, changing published hostname from 'linux' to 'linux2'. Apr 12 18:41:02.257038 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:41:02.258157 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:41:02.258929 systemd[1]: Starting ignition-kargs.service... Apr 12 18:41:02.272096 ignition[731]: Ignition 2.14.0 Apr 12 18:41:02.272104 ignition[731]: Stage: kargs Apr 12 18:41:02.272203 ignition[731]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:02.272211 ignition[731]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:02.274679 systemd[1]: Finished ignition-kargs.service. Apr 12 18:41:02.276000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.273316 ignition[731]: kargs: kargs passed Apr 12 18:41:02.277160 systemd[1]: Starting ignition-disks.service... Apr 12 18:41:02.273353 ignition[731]: Ignition finished successfully Apr 12 18:41:02.283582 ignition[737]: Ignition 2.14.0 Apr 12 18:41:02.283594 ignition[737]: Stage: disks Apr 12 18:41:02.283682 ignition[737]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:02.283690 ignition[737]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:02.286000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.285520 systemd[1]: Finished ignition-disks.service. Apr 12 18:41:02.284777 ignition[737]: disks: disks passed Apr 12 18:41:02.286644 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:41:02.284812 ignition[737]: Ignition finished successfully Apr 12 18:41:02.288492 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:41:02.289301 systemd[1]: Reached target local-fs.target. Apr 12 18:41:02.290059 systemd[1]: Reached target sysinit.target. Apr 12 18:41:02.291479 systemd[1]: Reached target basic.target. Apr 12 18:41:02.292861 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:41:02.304193 systemd-fsck[745]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:41:02.310352 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:41:02.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.313770 systemd[1]: Mounting sysroot.mount... Apr 12 18:41:02.341197 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:41:02.341737 systemd[1]: Mounted sysroot.mount. Apr 12 18:41:02.344700 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:41:02.347723 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:41:02.349726 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:41:02.351350 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:41:02.353252 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:41:02.356094 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:41:02.358586 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:41:02.362699 initrd-setup-root[755]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:41:02.366688 initrd-setup-root[763]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:41:02.370701 initrd-setup-root[771]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:41:02.374583 initrd-setup-root[779]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:41:02.403966 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:41:02.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.406817 systemd[1]: Starting ignition-mount.service... Apr 12 18:41:02.409319 systemd[1]: Starting sysroot-boot.service... Apr 12 18:41:02.412826 bash[796]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:41:02.436258 ignition[797]: INFO : Ignition 2.14.0 Apr 12 18:41:02.436258 ignition[797]: INFO : Stage: mount Apr 12 18:41:02.438124 ignition[797]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:02.438124 ignition[797]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:02.440392 systemd[1]: Finished sysroot-boot.service. Apr 12 18:41:02.440000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.444073 ignition[797]: INFO : mount: mount passed Apr 12 18:41:02.444924 ignition[797]: INFO : Ignition finished successfully Apr 12 18:41:02.446627 systemd[1]: Finished ignition-mount.service. Apr 12 18:41:02.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:02.842837 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:41:02.850323 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (806) Apr 12 18:41:02.850384 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:41:02.851893 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:41:02.851919 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:41:02.856126 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:41:02.857530 systemd[1]: Starting ignition-files.service... Apr 12 18:41:02.875314 ignition[826]: INFO : Ignition 2.14.0 Apr 12 18:41:02.875314 ignition[826]: INFO : Stage: files Apr 12 18:41:02.877861 ignition[826]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:02.877861 ignition[826]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:02.877861 ignition[826]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:41:02.882758 ignition[826]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:41:02.882758 ignition[826]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:41:02.887808 ignition[826]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:41:02.889551 ignition[826]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:41:02.891544 unknown[826]: wrote ssh authorized keys file for user: core Apr 12 18:41:02.892802 ignition[826]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:41:02.894525 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:41:02.894525 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:41:03.131390 systemd-networkd[703]: eth0: Gained IPv6LL Apr 12 18:41:03.275474 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:41:03.697726 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:41:03.700945 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:41:03.700945 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:41:03.700945 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:41:04.019625 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:41:04.166879 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:41:04.166879 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:41:04.171967 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:41:04.171967 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:41:04.195471 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:41:04.334874 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:41:04.337464 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:41:04.337464 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:41:04.601211 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:41:09.475466 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Apr 12 18:41:09.479383 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:41:09.479383 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:41:09.479383 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:41:09.752063 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:41:27.822947 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Apr 12 18:41:27.826107 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:41:27.826107 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:41:27.826107 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:41:27.879053 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:41:28.227127 ignition[826]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Apr 12 18:41:28.230095 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:41:28.230095 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:41:28.233386 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:41:28.233386 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:41:28.236861 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:41:28.238526 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:41:28.240229 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:41:28.241908 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:41:28.243611 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:41:28.245276 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:41:28.246986 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:41:28.248754 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:41:28.250511 ignition[826]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:41:28.252230 ignition[826]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:41:28.253640 ignition[826]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:41:28.255924 ignition[826]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:41:28.255924 ignition[826]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:41:28.260160 ignition[826]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:41:28.291755 ignition[826]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:41:28.304764 ignition[826]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:41:28.306629 ignition[826]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:41:28.306629 ignition[826]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:41:28.306629 ignition[826]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:41:28.306629 ignition[826]: INFO : files: files passed Apr 12 18:41:28.306629 ignition[826]: INFO : Ignition finished successfully Apr 12 18:41:28.313995 systemd[1]: Finished ignition-files.service. Apr 12 18:41:28.319664 kernel: kauditd_printk_skb: 24 callbacks suppressed Apr 12 18:41:28.319693 kernel: audit: type=1130 audit(1712947288.314:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.319681 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:41:28.320126 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:41:28.320721 systemd[1]: Starting ignition-quench.service... Apr 12 18:41:28.332205 kernel: audit: type=1130 audit(1712947288.324:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.332226 kernel: audit: type=1131 audit(1712947288.324:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.322970 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:41:28.323044 systemd[1]: Finished ignition-quench.service. Apr 12 18:41:28.338592 initrd-setup-root-after-ignition[851]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:41:28.341139 initrd-setup-root-after-ignition[853]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:41:28.341786 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:41:28.349709 kernel: audit: type=1130 audit(1712947288.344:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.344411 systemd[1]: Reached target ignition-complete.target. Apr 12 18:41:28.350504 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:41:28.364054 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:41:28.364168 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:41:28.374142 kernel: audit: type=1130 audit(1712947288.366:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.374171 kernel: audit: type=1131 audit(1712947288.366:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.366000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.366000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.366403 systemd[1]: Reached target initrd-fs.target. Apr 12 18:41:28.374203 systemd[1]: Reached target initrd.target. Apr 12 18:41:28.375242 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:41:28.376093 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:41:28.386998 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:41:28.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.390516 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:41:28.393893 kernel: audit: type=1130 audit(1712947288.389:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.399593 systemd[1]: Stopped target network.target. Apr 12 18:41:28.401287 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:41:28.438611 kernel: audit: type=1131 audit(1712947288.402:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.438642 kernel: audit: type=1131 audit(1712947288.408:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.438652 kernel: audit: type=1131 audit(1712947288.412:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.402000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.408000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.401781 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:41:28.401955 systemd[1]: Stopped target timers.target. Apr 12 18:41:28.440935 ignition[866]: INFO : Ignition 2.14.0 Apr 12 18:41:28.440935 ignition[866]: INFO : Stage: umount Apr 12 18:41:28.440935 ignition[866]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:41:28.440935 ignition[866]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:41:28.440935 ignition[866]: INFO : umount: umount passed Apr 12 18:41:28.440935 ignition[866]: INFO : Ignition finished successfully Apr 12 18:41:28.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.446000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.448000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:41:28.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.402104 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:41:28.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.402228 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:41:28.402572 systemd[1]: Stopped target initrd.target. Apr 12 18:41:28.406708 systemd[1]: Stopped target basic.target. Apr 12 18:41:28.455000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.406848 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:41:28.407012 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:41:28.459000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.407187 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:41:28.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.407364 systemd[1]: Stopped target remote-fs.target. Apr 12 18:41:28.463000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.407536 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:41:28.407719 systemd[1]: Stopped target sysinit.target. Apr 12 18:41:28.407867 systemd[1]: Stopped target local-fs.target. Apr 12 18:41:28.408030 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:41:28.408217 systemd[1]: Stopped target swap.target. Apr 12 18:41:28.471000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.408357 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:41:28.408479 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:41:28.473000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.408842 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:41:28.412643 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:41:28.412747 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:41:28.412997 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:41:28.413078 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:41:28.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.416722 systemd[1]: Stopped target paths.target. Apr 12 18:41:28.417089 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:41:28.483000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.421264 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:41:28.487000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.421812 systemd[1]: Stopped target slices.target. Apr 12 18:41:28.422310 systemd[1]: Stopped target sockets.target. Apr 12 18:41:28.422781 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:41:28.422905 systemd[1]: Closed iscsid.socket. Apr 12 18:41:28.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:28.423332 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:41:28.423442 systemd[1]: Closed iscsiuio.socket. Apr 12 18:41:28.423827 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:41:28.423990 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:41:28.424565 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:41:28.424703 systemd[1]: Stopped ignition-files.service. Apr 12 18:41:28.425974 systemd[1]: Stopping ignition-mount.service... Apr 12 18:41:28.426412 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:41:28.426562 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:41:28.428013 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:41:28.428749 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:41:28.429625 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:41:28.429942 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:41:28.430077 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:41:28.430279 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:41:28.430438 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:41:28.437270 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:41:28.437400 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:41:28.440413 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:41:28.440519 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:41:28.442142 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:41:28.442244 systemd[1]: Stopped ignition-mount.service. Apr 12 18:41:28.444658 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:41:28.444705 systemd[1]: Stopped ignition-disks.service. Apr 12 18:41:28.446367 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:41:28.446408 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:41:28.447257 systemd-networkd[703]: eth0: DHCPv6 lease lost Apr 12 18:41:28.516000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:41:28.448805 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:41:28.448855 systemd[1]: Stopped ignition-setup.service. Apr 12 18:41:28.451650 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:41:28.452156 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:41:28.452276 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:41:28.454554 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:41:28.454619 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:41:28.456257 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:41:28.456306 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:41:28.457662 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:41:28.457706 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:41:28.529040 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). Apr 12 18:41:28.529080 iscsid[710]: iscsid shutting down. Apr 12 18:41:28.459967 systemd[1]: Stopping network-cleanup.service... Apr 12 18:41:28.460974 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:41:28.461020 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:41:28.462872 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:41:28.462920 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:41:28.463805 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:41:28.463835 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:41:28.465647 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:41:28.468023 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:41:28.470096 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:41:28.470168 systemd[1]: Stopped network-cleanup.service. Apr 12 18:41:28.471654 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:41:28.471771 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:41:28.475085 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:41:28.475120 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:41:28.476844 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:41:28.476868 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:41:28.478435 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:41:28.478479 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:41:28.480381 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:41:28.480430 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:41:28.482069 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:41:28.482112 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:41:28.484623 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:41:28.485679 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:41:28.485725 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:41:28.489441 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:41:28.489531 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:41:28.490947 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:41:28.493108 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:41:28.508770 systemd[1]: Switching root. Apr 12 18:41:28.537506 systemd-journald[198]: Journal stopped Apr 12 18:41:33.377919 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:41:33.377974 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:41:33.377989 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:41:33.378004 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:41:33.378020 kernel: SELinux: policy capability open_perms=1 Apr 12 18:41:33.378037 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:41:33.378050 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:41:33.378062 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:41:33.378075 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:41:33.378088 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:41:33.378102 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:41:33.378117 systemd[1]: Successfully loaded SELinux policy in 56.477ms. Apr 12 18:41:33.378142 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 7.289ms. Apr 12 18:41:33.378160 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:41:33.378196 systemd[1]: Detected virtualization kvm. Apr 12 18:41:33.378211 systemd[1]: Detected architecture x86-64. Apr 12 18:41:33.378225 systemd[1]: Detected first boot. Apr 12 18:41:33.378239 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:41:33.378256 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:41:33.378269 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:41:33.378283 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:41:33.378299 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:41:33.378314 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:41:33.378329 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:41:33.378343 systemd[1]: Stopped iscsiuio.service. Apr 12 18:41:33.378356 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:41:33.378373 systemd[1]: Stopped iscsid.service. Apr 12 18:41:33.378387 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:41:33.378401 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:41:33.378415 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:41:33.378429 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:41:33.378446 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:41:33.378460 systemd[1]: Created slice system-getty.slice. Apr 12 18:41:33.378474 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:41:33.378490 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:41:33.378504 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:41:33.378518 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:41:33.378532 systemd[1]: Created slice user.slice. Apr 12 18:41:33.378546 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:41:33.378559 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:41:33.378574 systemd[1]: Set up automount boot.automount. Apr 12 18:41:33.378587 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:41:33.378605 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:41:33.378621 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:41:33.378635 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:41:33.378648 systemd[1]: Reached target integritysetup.target. Apr 12 18:41:33.378662 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:41:33.378675 systemd[1]: Reached target remote-fs.target. Apr 12 18:41:33.378688 systemd[1]: Reached target slices.target. Apr 12 18:41:33.378702 systemd[1]: Reached target swap.target. Apr 12 18:41:33.378716 systemd[1]: Reached target torcx.target. Apr 12 18:41:33.378730 systemd[1]: Reached target veritysetup.target. Apr 12 18:41:33.378745 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:41:33.378759 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:41:33.378772 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:41:33.378786 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:41:33.378800 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:41:33.378814 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:41:33.378828 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:41:33.378842 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:41:33.378855 systemd[1]: Mounting media.mount... Apr 12 18:41:33.378870 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:41:33.378884 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:41:33.378897 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:41:33.378911 systemd[1]: Mounting tmp.mount... Apr 12 18:41:33.378926 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:41:33.378939 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:41:33.378953 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:41:33.378966 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:41:33.378980 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:41:33.378997 systemd[1]: Starting modprobe@drm.service... Apr 12 18:41:33.379010 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:41:33.379023 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:41:33.379037 systemd[1]: Starting modprobe@loop.service... Apr 12 18:41:33.379051 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:41:33.379065 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:41:33.379078 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:41:33.379093 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:41:33.379107 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:41:33.379123 kernel: fuse: init (API version 7.34) Apr 12 18:41:33.379136 kernel: loop: module loaded Apr 12 18:41:33.379149 systemd[1]: Stopped systemd-journald.service. Apr 12 18:41:33.379162 systemd[1]: Starting systemd-journald.service... Apr 12 18:41:33.379196 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:41:33.379210 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:41:33.379224 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:41:33.379238 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:41:33.379255 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:41:33.379271 systemd[1]: Stopped verity-setup.service. Apr 12 18:41:33.379285 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:41:33.379299 kernel: kauditd_printk_skb: 66 callbacks suppressed Apr 12 18:41:33.379312 kernel: audit: type=1131 audit(1712947293.327:104): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379326 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:41:33.379339 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:41:33.379353 systemd[1]: Mounted media.mount. Apr 12 18:41:33.379367 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:41:33.379381 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:41:33.379395 systemd[1]: Mounted tmp.mount. Apr 12 18:41:33.379407 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:41:33.379420 kernel: audit: type=1130 audit(1712947293.345:105): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379432 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:41:33.379444 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:41:33.379458 kernel: audit: type=1130 audit(1712947293.352:106): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379471 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:41:33.379483 kernel: audit: type=1131 audit(1712947293.352:107): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379494 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:41:33.379507 kernel: audit: type=1130 audit(1712947293.361:108): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379519 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:41:33.379532 kernel: audit: type=1131 audit(1712947293.361:109): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379545 systemd[1]: Finished modprobe@drm.service. Apr 12 18:41:33.379557 kernel: audit: type=1130 audit(1712947293.371:110): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379569 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:41:33.379583 kernel: audit: type=1131 audit(1712947293.371:111): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.379596 kernel: audit: type=1305 audit(1712947293.375:112): op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:41:33.379611 systemd-journald[980]: Journal started Apr 12 18:41:33.379656 systemd-journald[980]: Runtime Journal (/run/log/journal/100e01d3455546f2a458373905908595) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:41:28.605000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:41:28.639000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:41:28.639000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:41:28.639000 audit: BPF prog-id=10 op=LOAD Apr 12 18:41:28.639000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:41:28.639000 audit: BPF prog-id=11 op=LOAD Apr 12 18:41:28.639000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:41:28.669000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:41:28.669000 audit[899]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001858e2 a1=c00002ae40 a2=c000029100 a3=32 items=0 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:28.669000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:41:28.670000 audit[899]: AVC avc: denied { associate } for pid=899 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:41:28.670000 audit[899]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001859b9 a2=1ed a3=0 items=2 ppid=882 pid=899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:28.670000 audit: CWD cwd="/" Apr 12 18:41:28.670000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:28.670000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:28.670000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:41:33.188000 audit: BPF prog-id=12 op=LOAD Apr 12 18:41:33.188000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:41:33.188000 audit: BPF prog-id=13 op=LOAD Apr 12 18:41:33.188000 audit: BPF prog-id=14 op=LOAD Apr 12 18:41:33.188000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:41:33.188000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:41:33.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.196000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.203000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:41:33.305000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.311000 audit: BPF prog-id=15 op=LOAD Apr 12 18:41:33.312000 audit: BPF prog-id=16 op=LOAD Apr 12 18:41:33.312000 audit: BPF prog-id=17 op=LOAD Apr 12 18:41:33.312000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:41:33.312000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:41:33.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.345000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.352000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.352000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.371000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.375000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:41:33.186786 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:41:28.667667 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:41:33.186800 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:41:28.667897 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:41:33.190132 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:41:28.667912 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:41:28.667934 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:41:28.667943 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:41:28.667968 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:41:28.667979 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:41:28.668143 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:41:33.382109 kernel: audit: type=1300 audit(1712947293.375:112): arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd5c4403d0 a2=4000 a3=7ffd5c44046c items=0 ppid=1 pid=980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.375000 audit[980]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=5 a1=7ffd5c4403d0 a2=4000 a3=7ffd5c44046c items=0 ppid=1 pid=980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:28.668189 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:41:28.668206 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:41:28.668921 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:41:28.668955 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:41:28.668970 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:41:28.668982 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:41:28.668997 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:41:28.669009 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:28Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:41:32.924094 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:32.924415 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:32.924531 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:32.924743 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:41:32.924806 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:41:32.924887 /usr/lib/systemd/system-generators/torcx-generator[899]: time="2024-04-12T18:41:32Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:41:33.375000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:41:33.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.389562 systemd[1]: Started systemd-journald.service. Apr 12 18:41:33.389000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.390152 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:41:33.390290 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:41:33.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.391383 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:41:33.391550 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:41:33.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.392578 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:41:33.392757 systemd[1]: Finished modprobe@loop.service. Apr 12 18:41:33.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.393942 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:41:33.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.395086 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:41:33.395000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.396287 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:41:33.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.397627 systemd[1]: Reached target network-pre.target. Apr 12 18:41:33.399677 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:41:33.401434 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:41:33.402379 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:41:33.403668 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:41:33.405506 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:41:33.406471 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:41:33.407314 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:41:33.408245 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:41:33.409072 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:41:33.414741 systemd-journald[980]: Time spent on flushing to /var/log/journal/100e01d3455546f2a458373905908595 is 14.730ms for 1130 entries. Apr 12 18:41:33.414741 systemd-journald[980]: System Journal (/var/log/journal/100e01d3455546f2a458373905908595) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:41:33.466068 systemd-journald[980]: Received client request to flush runtime journal. Apr 12 18:41:33.421000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.446000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.461000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:33.411394 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:41:33.413740 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:41:33.414856 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:41:33.466725 udevadm[1004]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:41:33.420290 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:41:33.421518 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:41:33.423440 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:41:33.442892 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:41:33.445674 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:41:33.460894 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:41:33.466940 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:41:33.467000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:34.745318 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:41:34.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:34.765000 audit: BPF prog-id=18 op=LOAD Apr 12 18:41:34.765000 audit: BPF prog-id=19 op=LOAD Apr 12 18:41:34.765000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:41:34.765000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:41:34.766412 systemd[1]: Starting systemd-udevd.service... Apr 12 18:41:34.781082 systemd-udevd[1006]: Using default interface naming scheme 'v252'. Apr 12 18:41:34.812014 systemd[1]: Started systemd-udevd.service. Apr 12 18:41:34.812000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:34.813000 audit: BPF prog-id=20 op=LOAD Apr 12 18:41:34.814529 systemd[1]: Starting systemd-networkd.service... Apr 12 18:41:34.819000 audit: BPF prog-id=21 op=LOAD Apr 12 18:41:34.820390 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:41:34.819000 audit: BPF prog-id=22 op=LOAD Apr 12 18:41:34.819000 audit: BPF prog-id=23 op=LOAD Apr 12 18:41:34.843883 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:41:34.846796 systemd[1]: Started systemd-userdbd.service. Apr 12 18:41:34.867000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:34.869597 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:41:34.914211 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:41:34.916000 audit[1019]: AVC avc: denied { confidentiality } for pid=1019 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:41:34.916000 audit[1019]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55f46b09a670 a1=32194 a2=7f8cdf69bbc5 a3=5 items=108 ppid=1006 pid=1019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.916000 audit: CWD cwd="/" Apr 12 18:41:34.916000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=1 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=2 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=3 name=(null) inode=12288 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=4 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=5 name=(null) inode=16385 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=6 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=7 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=8 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=9 name=(null) inode=16387 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=10 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=11 name=(null) inode=16388 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=12 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=13 name=(null) inode=16389 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=14 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=15 name=(null) inode=16390 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=16 name=(null) inode=16386 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=17 name=(null) inode=16391 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=18 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=19 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=20 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=21 name=(null) inode=16393 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=22 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=23 name=(null) inode=16394 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=24 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=25 name=(null) inode=16395 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=26 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=27 name=(null) inode=16396 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=28 name=(null) inode=16392 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=29 name=(null) inode=16397 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=30 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=31 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=32 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=33 name=(null) inode=16399 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=34 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=35 name=(null) inode=16400 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=36 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=37 name=(null) inode=16401 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=38 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=39 name=(null) inode=16402 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=40 name=(null) inode=16398 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=41 name=(null) inode=16403 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=42 name=(null) inode=12287 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=43 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=44 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=45 name=(null) inode=16405 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=46 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=47 name=(null) inode=16406 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=48 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=49 name=(null) inode=16407 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=50 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=51 name=(null) inode=16408 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=52 name=(null) inode=16404 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=53 name=(null) inode=16409 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=55 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=56 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=57 name=(null) inode=16411 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=58 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=59 name=(null) inode=16412 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=60 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=61 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=62 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=63 name=(null) inode=16414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=64 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=65 name=(null) inode=16415 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=66 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=67 name=(null) inode=16416 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=68 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=69 name=(null) inode=16417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=70 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=71 name=(null) inode=16418 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=72 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=73 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=74 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=75 name=(null) inode=16420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=76 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=77 name=(null) inode=16421 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=78 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=79 name=(null) inode=16422 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=80 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=81 name=(null) inode=16423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=82 name=(null) inode=16419 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=83 name=(null) inode=16424 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=84 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=85 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=86 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=87 name=(null) inode=16426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=88 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=89 name=(null) inode=16427 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=90 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=91 name=(null) inode=16428 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=92 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=93 name=(null) inode=16429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=94 name=(null) inode=16425 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=95 name=(null) inode=16430 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=96 name=(null) inode=16410 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=97 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=98 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=99 name=(null) inode=16432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=100 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=101 name=(null) inode=16433 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=102 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=103 name=(null) inode=16434 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=104 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=105 name=(null) inode=16435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=106 name=(null) inode=16431 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PATH item=107 name=(null) inode=16436 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:34.916000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:41:34.925196 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:41:34.985201 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:41:34.996202 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:41:34.996821 systemd-networkd[1014]: lo: Link UP Apr 12 18:41:34.996832 systemd-networkd[1014]: lo: Gained carrier Apr 12 18:41:34.997283 systemd-networkd[1014]: Enumeration completed Apr 12 18:41:34.997376 systemd[1]: Started systemd-networkd.service. Apr 12 18:41:34.997390 systemd-networkd[1014]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:41:34.998736 systemd-networkd[1014]: eth0: Link UP Apr 12 18:41:34.998744 systemd-networkd[1014]: eth0: Gained carrier Apr 12 18:41:35.003204 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:41:35.043198 kernel: kvm: Nested Virtualization enabled Apr 12 18:41:35.043297 kernel: SVM: kvm: Nested Paging enabled Apr 12 18:41:35.043316 kernel: SVM: Virtual VMLOAD VMSAVE supported Apr 12 18:41:35.043338 kernel: SVM: Virtual GIF supported Apr 12 18:41:35.043284 systemd-networkd[1014]: eth0: DHCPv4 address 10.0.0.14/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:41:35.050000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.067217 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:41:35.084630 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:41:35.085000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.086965 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:41:35.096478 lvm[1041]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:41:35.126409 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:41:35.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.127563 systemd[1]: Reached target cryptsetup.target. Apr 12 18:41:35.129443 systemd[1]: Starting lvm2-activation.service... Apr 12 18:41:35.134330 lvm[1042]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:41:35.163389 systemd[1]: Finished lvm2-activation.service. Apr 12 18:41:35.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.164455 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:41:35.165358 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:41:35.165381 systemd[1]: Reached target local-fs.target. Apr 12 18:41:35.166211 systemd[1]: Reached target machines.target. Apr 12 18:41:35.168104 systemd[1]: Starting ldconfig.service... Apr 12 18:41:35.169198 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:41:35.169235 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:35.170060 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:41:35.171761 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:41:35.173900 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:41:35.175404 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:41:35.175439 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:41:35.176243 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:41:35.179885 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Apr 12 18:41:35.181118 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:41:35.191000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.192037 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:41:35.197174 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:41:35.199697 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:41:35.204722 systemd-tmpfiles[1047]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:41:35.664502 systemd-fsck[1053]: fsck.fat 4.2 (2021-01-31) Apr 12 18:41:35.664502 systemd-fsck[1053]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:41:35.667203 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:41:35.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.669910 systemd[1]: Mounting boot.mount... Apr 12 18:41:35.682572 systemd[1]: Mounted boot.mount. Apr 12 18:41:35.689568 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:41:35.690201 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:41:35.691000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.697652 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:41:35.698000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.757541 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:41:35.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.760549 systemd[1]: Starting audit-rules.service... Apr 12 18:41:35.762981 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:41:35.765727 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:41:35.767000 audit: BPF prog-id=24 op=LOAD Apr 12 18:41:35.768751 systemd[1]: Starting systemd-resolved.service... Apr 12 18:41:35.770000 audit: BPF prog-id=25 op=LOAD Apr 12 18:41:35.771602 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:41:35.773654 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:41:35.775710 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:41:35.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.778000 audit[1066]: SYSTEM_BOOT pid=1066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.777211 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:41:35.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.781852 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:41:35.818510 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:41:35.819000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:35.834000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:41:35.834000 audit[1077]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe844fc350 a2=420 a3=0 items=0 ppid=1057 pid=1077 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.834000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:41:35.835339 augenrules[1077]: No rules Apr 12 18:41:35.835737 systemd[1]: Finished audit-rules.service. Apr 12 18:41:35.839602 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:41:35.846845 systemd[1]: Finished ldconfig.service. Apr 12 18:41:35.849282 systemd[1]: Starting systemd-update-done.service... Apr 12 18:41:35.852628 systemd-resolved[1061]: Positive Trust Anchors: Apr 12 18:41:35.852642 systemd-resolved[1061]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:41:35.852669 systemd-resolved[1061]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:41:35.857871 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:41:35.859374 systemd[1]: Reached target time-set.target. Apr 12 18:41:35.863968 systemd-timesyncd[1064]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:41:35.864091 systemd-timesyncd[1064]: Initial clock synchronization to Fri 2024-04-12 18:41:36.130773 UTC. Apr 12 18:41:35.912430 systemd[1]: Finished systemd-update-done.service. Apr 12 18:41:35.917775 systemd-resolved[1061]: Defaulting to hostname 'linux'. Apr 12 18:41:35.919661 systemd[1]: Started systemd-resolved.service. Apr 12 18:41:35.920572 systemd[1]: Reached target network.target. Apr 12 18:41:35.921378 systemd[1]: Reached target nss-lookup.target. Apr 12 18:41:35.922225 systemd[1]: Reached target sysinit.target. Apr 12 18:41:35.923085 systemd[1]: Started motdgen.path. Apr 12 18:41:35.923837 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:41:35.925100 systemd[1]: Started logrotate.timer. Apr 12 18:41:35.925949 systemd[1]: Started mdadm.timer. Apr 12 18:41:35.926670 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:41:35.927563 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:41:35.927589 systemd[1]: Reached target paths.target. Apr 12 18:41:35.928395 systemd[1]: Reached target timers.target. Apr 12 18:41:35.929448 systemd[1]: Listening on dbus.socket. Apr 12 18:41:35.931189 systemd[1]: Starting docker.socket... Apr 12 18:41:35.934033 systemd[1]: Listening on sshd.socket. Apr 12 18:41:35.934926 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:35.935292 systemd[1]: Listening on docker.socket. Apr 12 18:41:35.936119 systemd[1]: Reached target sockets.target. Apr 12 18:41:35.936922 systemd[1]: Reached target basic.target. Apr 12 18:41:35.937746 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:41:35.937766 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:41:35.938642 systemd[1]: Starting containerd.service... Apr 12 18:41:35.941409 systemd[1]: Starting dbus.service... Apr 12 18:41:35.943003 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:41:35.946442 jq[1088]: false Apr 12 18:41:35.944943 systemd[1]: Starting extend-filesystems.service... Apr 12 18:41:35.945942 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:41:35.946967 systemd[1]: Starting motdgen.service... Apr 12 18:41:35.949440 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:41:35.951327 systemd[1]: Starting prepare-critools.service... Apr 12 18:41:35.953237 systemd[1]: Starting prepare-helm.service... Apr 12 18:41:35.955508 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:41:35.957573 systemd[1]: Starting sshd-keygen.service... Apr 12 18:41:35.959119 dbus-daemon[1087]: [system] SELinux support is enabled Apr 12 18:41:35.961430 systemd[1]: Starting systemd-logind.service... Apr 12 18:41:35.961897 extend-filesystems[1089]: Found sr0 Apr 12 18:41:35.961897 extend-filesystems[1089]: Found vda Apr 12 18:41:35.961897 extend-filesystems[1089]: Found vda1 Apr 12 18:41:35.961897 extend-filesystems[1089]: Found vda2 Apr 12 18:41:35.961897 extend-filesystems[1089]: Found vda3 Apr 12 18:41:35.961897 extend-filesystems[1089]: Found usr Apr 12 18:41:35.961897 extend-filesystems[1089]: Found vda4 Apr 12 18:41:35.962883 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:41:35.975401 extend-filesystems[1089]: Found vda6 Apr 12 18:41:35.975401 extend-filesystems[1089]: Found vda7 Apr 12 18:41:35.975401 extend-filesystems[1089]: Found vda9 Apr 12 18:41:35.975401 extend-filesystems[1089]: Checking size of /dev/vda9 Apr 12 18:41:35.962949 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:41:36.001979 extend-filesystems[1089]: Resized partition /dev/vda9 Apr 12 18:41:35.966310 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:41:36.003025 extend-filesystems[1116]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:41:35.967030 systemd[1]: Starting update-engine.service... Apr 12 18:41:36.012977 jq[1111]: true Apr 12 18:41:35.974207 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:41:36.013229 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:41:35.975766 systemd[1]: Started dbus.service. Apr 12 18:41:35.979489 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:41:35.979639 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:41:35.979858 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:41:35.979966 systemd[1]: Finished motdgen.service. Apr 12 18:41:36.010365 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:41:36.010519 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:41:36.020338 tar[1117]: ./ Apr 12 18:41:36.020338 tar[1117]: ./loopback Apr 12 18:41:36.022384 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:41:36.022407 systemd[1]: Reached target system-config.target. Apr 12 18:41:36.023522 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:41:36.023541 systemd[1]: Reached target user-config.target. Apr 12 18:41:36.029677 tar[1121]: linux-amd64/helm Apr 12 18:41:36.029905 jq[1124]: true Apr 12 18:41:36.056719 tar[1118]: crictl Apr 12 18:41:36.066376 systemd-logind[1104]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:41:36.066402 systemd-logind[1104]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:41:36.067429 systemd-logind[1104]: New seat seat0. Apr 12 18:41:36.069116 systemd[1]: Created slice system-sshd.slice. Apr 12 18:41:36.073225 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:41:36.105731 update_engine[1109]: I0412 18:41:36.074864 1109 main.cc:92] Flatcar Update Engine starting Apr 12 18:41:36.105731 update_engine[1109]: I0412 18:41:36.080525 1109 update_check_scheduler.cc:74] Next update check in 10m9s Apr 12 18:41:36.106156 env[1122]: time="2024-04-12T18:41:36.104200802Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:41:36.076240 systemd[1]: Started systemd-logind.service. Apr 12 18:41:36.080451 systemd[1]: Started update-engine.service. Apr 12 18:41:36.083271 systemd[1]: Started locksmithd.service. Apr 12 18:41:36.092431 systemd-networkd[1014]: eth0: Gained IPv6LL Apr 12 18:41:36.112027 extend-filesystems[1116]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:41:36.112027 extend-filesystems[1116]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:41:36.112027 extend-filesystems[1116]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:41:36.118950 extend-filesystems[1089]: Resized filesystem in /dev/vda9 Apr 12 18:41:36.125512 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:41:36.125660 systemd[1]: Finished extend-filesystems.service. Apr 12 18:41:36.131458 bash[1151]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:41:36.132174 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:41:36.156148 tar[1117]: ./bandwidth Apr 12 18:41:36.187713 env[1122]: time="2024-04-12T18:41:36.187589854Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:41:36.188423 env[1122]: time="2024-04-12T18:41:36.188404779Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.189901 env[1122]: time="2024-04-12T18:41:36.189877056Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:36.189993 env[1122]: time="2024-04-12T18:41:36.189974438Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.190286 env[1122]: time="2024-04-12T18:41:36.190260432Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:36.190373 env[1122]: time="2024-04-12T18:41:36.190355133Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.190468 env[1122]: time="2024-04-12T18:41:36.190439780Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:41:36.190553 env[1122]: time="2024-04-12T18:41:36.190533362Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.190723 env[1122]: time="2024-04-12T18:41:36.190702273Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.191044 env[1122]: time="2024-04-12T18:41:36.191025756Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:41:36.191383 env[1122]: time="2024-04-12T18:41:36.191363496Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:41:36.191462 env[1122]: time="2024-04-12T18:41:36.191442232Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:41:36.191575 env[1122]: time="2024-04-12T18:41:36.191556562Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:41:36.191667 env[1122]: time="2024-04-12T18:41:36.191647782Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199533274Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199566270Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199580163Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199629351Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199645947Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199662761Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199674542Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199688675Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199700798Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199720965Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199734860Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199746093Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199841901Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:41:36.201333 env[1122]: time="2024-04-12T18:41:36.199922541Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200137648Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200165322Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200178533Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200249938Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200262610Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200278989Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200289166Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200300141Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200313651Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200324656Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200335817Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200347216Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200456825Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200473027Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.201675 env[1122]: time="2024-04-12T18:41:36.200483815Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.202092 env[1122]: time="2024-04-12T18:41:36.200495691Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:41:36.202092 env[1122]: time="2024-04-12T18:41:36.200521366Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:41:36.202092 env[1122]: time="2024-04-12T18:41:36.200531253Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:41:36.202092 env[1122]: time="2024-04-12T18:41:36.200549930Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:41:36.202092 env[1122]: time="2024-04-12T18:41:36.200587968Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:41:36.202191 env[1122]: time="2024-04-12T18:41:36.200789564Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:41:36.202191 env[1122]: time="2024-04-12T18:41:36.200846216Z" level=info msg="Connect containerd service" Apr 12 18:41:36.202191 env[1122]: time="2024-04-12T18:41:36.200887680Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:41:36.203184 env[1122]: time="2024-04-12T18:41:36.202802678Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.203431703Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.203466758Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204155262Z" level=info msg="Start subscribing containerd event" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204243596Z" level=info msg="Start recovering state" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204306087Z" level=info msg="Start event monitor" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204332590Z" level=info msg="Start snapshots syncer" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204342923Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204349145Z" level=info msg="Start streaming server" Apr 12 18:41:36.204525 env[1122]: time="2024-04-12T18:41:36.204509143Z" level=info msg="containerd successfully booted in 0.118235s" Apr 12 18:41:36.203579 systemd[1]: Started containerd.service. Apr 12 18:41:36.259497 tar[1117]: ./ptp Apr 12 18:41:36.335959 tar[1117]: ./vlan Apr 12 18:41:36.403751 tar[1117]: ./host-device Apr 12 18:41:36.473988 tar[1117]: ./tuning Apr 12 18:41:36.564545 tar[1117]: ./vrf Apr 12 18:41:36.634632 tar[1117]: ./sbr Apr 12 18:41:36.682525 sshd_keygen[1110]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:41:36.688234 tar[1117]: ./tap Apr 12 18:41:36.711659 systemd[1]: Finished sshd-keygen.service. Apr 12 18:41:36.714586 systemd[1]: Starting issuegen.service... Apr 12 18:41:36.716587 systemd[1]: Started sshd@0-10.0.0.14:22-10.0.0.1:45206.service. Apr 12 18:41:36.726109 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:41:36.726289 systemd[1]: Finished issuegen.service. Apr 12 18:41:36.729078 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:41:36.754220 tar[1117]: ./dhcp Apr 12 18:41:36.755933 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:41:36.758864 systemd[1]: Started getty@tty1.service. Apr 12 18:41:36.761045 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:41:36.762448 systemd[1]: Reached target getty.target. Apr 12 18:41:36.800182 sshd[1165]: Accepted publickey for core from 10.0.0.1 port 45206 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:36.801220 sshd[1165]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:36.810954 systemd[1]: Created slice user-500.slice. Apr 12 18:41:36.813379 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:41:36.818563 systemd-logind[1104]: New session 1 of user core. Apr 12 18:41:36.848447 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:41:36.851648 systemd[1]: Starting user@500.service... Apr 12 18:41:36.857176 (systemd)[1174]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:36.970837 tar[1117]: ./static Apr 12 18:41:36.972480 systemd[1174]: Queued start job for default target default.target. Apr 12 18:41:36.972910 systemd[1174]: Reached target paths.target. Apr 12 18:41:36.972929 systemd[1174]: Reached target sockets.target. Apr 12 18:41:36.972940 systemd[1174]: Reached target timers.target. Apr 12 18:41:36.972950 systemd[1174]: Reached target basic.target. Apr 12 18:41:36.972982 systemd[1174]: Reached target default.target. Apr 12 18:41:36.973002 systemd[1174]: Startup finished in 104ms. Apr 12 18:41:36.973115 systemd[1]: Started user@500.service. Apr 12 18:41:36.975807 systemd[1]: Started session-1.scope. Apr 12 18:41:37.003348 locksmithd[1147]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:41:37.024225 tar[1117]: ./firewall Apr 12 18:41:37.034522 systemd[1]: Started sshd@1-10.0.0.14:22-10.0.0.1:45212.service. Apr 12 18:41:37.069821 tar[1121]: linux-amd64/LICENSE Apr 12 18:41:37.072286 tar[1121]: linux-amd64/README.md Apr 12 18:41:37.074607 systemd[1]: Finished prepare-helm.service. Apr 12 18:41:37.087922 tar[1117]: ./macvlan Apr 12 18:41:37.090478 systemd[1]: Finished prepare-critools.service. Apr 12 18:41:37.105862 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 45212 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:37.105453 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:37.110686 systemd-logind[1104]: New session 2 of user core. Apr 12 18:41:37.110749 systemd[1]: Started session-2.scope. Apr 12 18:41:37.122600 tar[1117]: ./dummy Apr 12 18:41:37.157702 tar[1117]: ./bridge Apr 12 18:41:37.171714 sshd[1186]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:37.176603 systemd[1]: sshd@1-10.0.0.14:22-10.0.0.1:45212.service: Deactivated successfully. Apr 12 18:41:37.177253 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:41:37.178937 systemd[1]: Started sshd@2-10.0.0.14:22-10.0.0.1:45220.service. Apr 12 18:41:37.182982 systemd-logind[1104]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:41:37.184101 systemd-logind[1104]: Removed session 2. Apr 12 18:41:37.196859 tar[1117]: ./ipvlan Apr 12 18:41:37.220952 sshd[1194]: Accepted publickey for core from 10.0.0.1 port 45220 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:37.221988 sshd[1194]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:37.226129 systemd-logind[1104]: New session 3 of user core. Apr 12 18:41:37.226252 systemd[1]: Started session-3.scope. Apr 12 18:41:37.229500 tar[1117]: ./portmap Apr 12 18:41:37.260869 tar[1117]: ./host-local Apr 12 18:41:37.281617 sshd[1194]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:37.284422 systemd[1]: sshd@2-10.0.0.14:22-10.0.0.1:45220.service: Deactivated successfully. Apr 12 18:41:37.285118 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:41:37.285674 systemd-logind[1104]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:41:37.286404 systemd-logind[1104]: Removed session 3. Apr 12 18:41:37.298469 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:41:37.300001 systemd[1]: Reached target multi-user.target. Apr 12 18:41:37.302453 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:41:37.308926 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:41:37.309107 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:41:37.310365 systemd[1]: Startup finished in 578ms (kernel) + 28.873s (initrd) + 8.763s (userspace) = 38.215s. Apr 12 18:41:47.449717 systemd[1]: Started sshd@3-10.0.0.14:22-10.0.0.1:44760.service. Apr 12 18:41:47.490864 sshd[1203]: Accepted publickey for core from 10.0.0.1 port 44760 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:47.492096 sshd[1203]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.495694 systemd-logind[1104]: New session 4 of user core. Apr 12 18:41:47.496711 systemd[1]: Started session-4.scope. Apr 12 18:41:47.551569 sshd[1203]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:47.555251 systemd[1]: Started sshd@4-10.0.0.14:22-10.0.0.1:44774.service. Apr 12 18:41:47.555682 systemd[1]: sshd@3-10.0.0.14:22-10.0.0.1:44760.service: Deactivated successfully. Apr 12 18:41:47.556356 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:41:47.556919 systemd-logind[1104]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:41:47.557698 systemd-logind[1104]: Removed session 4. Apr 12 18:41:47.595332 sshd[1208]: Accepted publickey for core from 10.0.0.1 port 44774 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:47.596435 sshd[1208]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.599981 systemd-logind[1104]: New session 5 of user core. Apr 12 18:41:47.600734 systemd[1]: Started session-5.scope. Apr 12 18:41:47.650471 sshd[1208]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:47.653636 systemd[1]: sshd@4-10.0.0.14:22-10.0.0.1:44774.service: Deactivated successfully. Apr 12 18:41:47.654263 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:41:47.654821 systemd-logind[1104]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:41:47.655996 systemd[1]: Started sshd@5-10.0.0.14:22-10.0.0.1:44790.service. Apr 12 18:41:47.656734 systemd-logind[1104]: Removed session 5. Apr 12 18:41:47.695706 sshd[1216]: Accepted publickey for core from 10.0.0.1 port 44790 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:47.696805 sshd[1216]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.700162 systemd-logind[1104]: New session 6 of user core. Apr 12 18:41:47.701170 systemd[1]: Started session-6.scope. Apr 12 18:41:47.755146 sshd[1216]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:47.758087 systemd[1]: sshd@5-10.0.0.14:22-10.0.0.1:44790.service: Deactivated successfully. Apr 12 18:41:47.758593 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:41:47.759109 systemd-logind[1104]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:41:47.760057 systemd[1]: Started sshd@6-10.0.0.14:22-10.0.0.1:44800.service. Apr 12 18:41:47.760645 systemd-logind[1104]: Removed session 6. Apr 12 18:41:47.799729 sshd[1222]: Accepted publickey for core from 10.0.0.1 port 44800 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:47.800839 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.804222 systemd-logind[1104]: New session 7 of user core. Apr 12 18:41:47.805072 systemd[1]: Started session-7.scope. Apr 12 18:41:47.861114 sudo[1225]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:41:47.861350 sudo[1225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:41:47.870394 dbus-daemon[1087]: \xd0]\xab\xc5dU: received setenforce notice (enforcing=-523796112) Apr 12 18:41:47.872534 sudo[1225]: pam_unix(sudo:session): session closed for user root Apr 12 18:41:47.874208 sshd[1222]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:47.877198 systemd[1]: sshd@6-10.0.0.14:22-10.0.0.1:44800.service: Deactivated successfully. Apr 12 18:41:47.877765 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:41:47.878371 systemd-logind[1104]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:41:47.879421 systemd[1]: Started sshd@7-10.0.0.14:22-10.0.0.1:44804.service. Apr 12 18:41:47.880200 systemd-logind[1104]: Removed session 7. Apr 12 18:41:47.921394 sshd[1229]: Accepted publickey for core from 10.0.0.1 port 44804 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:47.922485 sshd[1229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.926191 systemd-logind[1104]: New session 8 of user core. Apr 12 18:41:47.927248 systemd[1]: Started session-8.scope. Apr 12 18:41:47.978730 sudo[1233]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:41:47.978881 sudo[1233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:41:47.981806 sudo[1233]: pam_unix(sudo:session): session closed for user root Apr 12 18:41:47.986117 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:41:47.986331 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:41:47.995046 systemd[1]: Stopping audit-rules.service... Apr 12 18:41:47.994000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:41:47.995954 auditctl[1236]: No rules Apr 12 18:41:47.996244 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:41:47.996362 systemd[1]: Stopped audit-rules.service. Apr 12 18:41:47.996720 kernel: kauditd_printk_skb: 158 callbacks suppressed Apr 12 18:41:47.996778 kernel: audit: type=1305 audit(1712947307.994:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:41:47.997456 systemd[1]: Starting audit-rules.service... Apr 12 18:41:47.994000 audit[1236]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc5bf8dd50 a2=420 a3=0 items=0 ppid=1 pid=1236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.003596 kernel: audit: type=1300 audit(1712947307.994:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc5bf8dd50 a2=420 a3=0 items=0 ppid=1 pid=1236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.003658 kernel: audit: type=1327 audit(1712947307.994:157): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:41:47.994000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:41:48.005020 kernel: audit: type=1131 audit(1712947307.995:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:47.995000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.013973 augenrules[1253]: No rules Apr 12 18:41:48.014658 systemd[1]: Finished audit-rules.service. Apr 12 18:41:48.013000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.015694 sudo[1232]: pam_unix(sudo:session): session closed for user root Apr 12 18:41:48.017024 sshd[1229]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:48.014000 audit[1232]: USER_END pid=1232 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.020024 systemd[1]: sshd@7-10.0.0.14:22-10.0.0.1:44804.service: Deactivated successfully. Apr 12 18:41:48.020633 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:41:48.021239 systemd-logind[1104]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:41:48.022422 systemd[1]: Started sshd@8-10.0.0.14:22-10.0.0.1:44820.service. Apr 12 18:41:48.023332 systemd-logind[1104]: Removed session 8. Apr 12 18:41:48.024113 kernel: audit: type=1130 audit(1712947308.013:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.024169 kernel: audit: type=1106 audit(1712947308.014:160): pid=1232 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.024199 kernel: audit: type=1104 audit(1712947308.014:161): pid=1232 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.014000 audit[1232]: CRED_DISP pid=1232 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.028460 kernel: audit: type=1106 audit(1712947308.017:162): pid=1229 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.017000 audit[1229]: USER_END pid=1229 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.034947 kernel: audit: type=1104 audit(1712947308.017:163): pid=1229 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.017000 audit[1229]: CRED_DISP pid=1229 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.038809 kernel: audit: type=1131 audit(1712947308.019:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.14:22-10.0.0.1:44804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.14:22-10.0.0.1:44804 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.14:22-10.0.0.1:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.069000 audit[1259]: USER_ACCT pid=1259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.070961 sshd[1259]: Accepted publickey for core from 10.0.0.1 port 44820 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:41:48.070000 audit[1259]: CRED_ACQ pid=1259 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.070000 audit[1259]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8c2f1230 a2=3 a3=0 items=0 ppid=1 pid=1259 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.070000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:48.072386 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:48.075443 systemd-logind[1104]: New session 9 of user core. Apr 12 18:41:48.076162 systemd[1]: Started session-9.scope. Apr 12 18:41:48.077000 audit[1259]: USER_START pid=1259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.079000 audit[1261]: CRED_ACQ pid=1261 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.126000 audit[1262]: USER_ACCT pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.127000 audit[1262]: CRED_REFR pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.128268 sudo[1262]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:41:48.128479 sudo[1262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:41:48.128000 audit[1262]: USER_START pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.655467 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:41:48.660334 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:41:48.659000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.660604 systemd[1]: Reached target network-online.target. Apr 12 18:41:48.661862 systemd[1]: Starting docker.service... Apr 12 18:41:48.695604 env[1280]: time="2024-04-12T18:41:48.695537390Z" level=info msg="Starting up" Apr 12 18:41:48.697011 env[1280]: time="2024-04-12T18:41:48.696959303Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:41:48.697011 env[1280]: time="2024-04-12T18:41:48.696994100Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:41:48.697197 env[1280]: time="2024-04-12T18:41:48.697022755Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:41:48.697197 env[1280]: time="2024-04-12T18:41:48.697034414Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:41:48.698890 env[1280]: time="2024-04-12T18:41:48.698856939Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:41:48.698890 env[1280]: time="2024-04-12T18:41:48.698882305Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:41:48.698942 env[1280]: time="2024-04-12T18:41:48.698899189Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:41:48.698942 env[1280]: time="2024-04-12T18:41:48.698909144Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:41:48.731814 env[1280]: time="2024-04-12T18:41:48.731782515Z" level=info msg="Loading containers: start." Apr 12 18:41:48.778000 audit[1314]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.778000 audit[1314]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffde938da90 a2=0 a3=7ffde938da7c items=0 ppid=1280 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.778000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:41:48.780000 audit[1316]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.780000 audit[1316]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffdfc8da2a0 a2=0 a3=7ffdfc8da28c items=0 ppid=1280 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.780000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:41:48.783000 audit[1318]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.783000 audit[1318]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc278e6e50 a2=0 a3=7ffc278e6e3c items=0 ppid=1280 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.783000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:41:48.784000 audit[1320]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.784000 audit[1320]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffe61a4d870 a2=0 a3=7ffe61a4d85c items=0 ppid=1280 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.784000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:41:48.786000 audit[1322]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.786000 audit[1322]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe9415ab70 a2=0 a3=7ffe9415ab5c items=0 ppid=1280 pid=1322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.786000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:41:48.807000 audit[1327]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.807000 audit[1327]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc47ddd1d0 a2=0 a3=7ffc47ddd1bc items=0 ppid=1280 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.807000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:41:48.813000 audit[1329]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.813000 audit[1329]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe68626310 a2=0 a3=7ffe686262fc items=0 ppid=1280 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.813000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:41:48.815000 audit[1331]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.815000 audit[1331]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffc119495e0 a2=0 a3=7ffc119495cc items=0 ppid=1280 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.815000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:41:48.816000 audit[1333]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1333 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.816000 audit[1333]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffeaf3e0630 a2=0 a3=7ffeaf3e061c items=0 ppid=1280 pid=1333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.816000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:41:48.825000 audit[1337]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.825000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff85afe230 a2=0 a3=7fff85afe21c items=0 ppid=1280 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:41:48.825000 audit[1338]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.825000 audit[1338]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd878f2300 a2=0 a3=7ffd878f22ec items=0 ppid=1280 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.825000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:41:48.835220 kernel: Initializing XFRM netlink socket Apr 12 18:41:48.862117 env[1280]: time="2024-04-12T18:41:48.862075539Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:41:48.875000 audit[1346]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.875000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff1e92c940 a2=0 a3=7fff1e92c92c items=0 ppid=1280 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.875000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:41:48.885000 audit[1349]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.885000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe4bbccc00 a2=0 a3=7ffe4bbccbec items=0 ppid=1280 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.885000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:41:48.888000 audit[1352]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1352 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.888000 audit[1352]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffeb86f6e80 a2=0 a3=7ffeb86f6e6c items=0 ppid=1280 pid=1352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.888000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:41:48.889000 audit[1354]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1354 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.889000 audit[1354]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffdcc6ff880 a2=0 a3=7ffdcc6ff86c items=0 ppid=1280 pid=1354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.889000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:41:48.891000 audit[1356]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1356 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.891000 audit[1356]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd1047fdb0 a2=0 a3=7ffd1047fd9c items=0 ppid=1280 pid=1356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.891000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:41:48.892000 audit[1358]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.892000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fff7e27b500 a2=0 a3=7fff7e27b4ec items=0 ppid=1280 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.892000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:41:48.894000 audit[1360]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.894000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd7f955870 a2=0 a3=7ffd7f95585c items=0 ppid=1280 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.894000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:41:48.900000 audit[1363]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.900000 audit[1363]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffe03249c40 a2=0 a3=7ffe03249c2c items=0 ppid=1280 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.900000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:41:48.902000 audit[1365]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1365 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.902000 audit[1365]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffdf28f8e00 a2=0 a3=7ffdf28f8dec items=0 ppid=1280 pid=1365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.902000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:41:48.903000 audit[1367]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1367 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.903000 audit[1367]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7fff3c24f7b0 a2=0 a3=7fff3c24f79c items=0 ppid=1280 pid=1367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.903000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:41:48.905000 audit[1369]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.905000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe12fe4100 a2=0 a3=7ffe12fe40ec items=0 ppid=1280 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.905000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:41:48.906703 systemd-networkd[1014]: docker0: Link UP Apr 12 18:41:48.914000 audit[1373]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1373 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.914000 audit[1373]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcf6423d20 a2=0 a3=7ffcf6423d0c items=0 ppid=1280 pid=1373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.914000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:41:48.915000 audit[1374]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1374 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:48.915000 audit[1374]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffce4e1b5a0 a2=0 a3=7ffce4e1b58c items=0 ppid=1280 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.915000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:41:48.917266 env[1280]: time="2024-04-12T18:41:48.917160230Z" level=info msg="Loading containers: done." Apr 12 18:41:48.926264 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2848292633-merged.mount: Deactivated successfully. Apr 12 18:41:48.931200 env[1280]: time="2024-04-12T18:41:48.931139702Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:41:48.931374 env[1280]: time="2024-04-12T18:41:48.931347345Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:41:48.931464 env[1280]: time="2024-04-12T18:41:48.931441539Z" level=info msg="Daemon has completed initialization" Apr 12 18:41:48.948913 systemd[1]: Started docker.service. Apr 12 18:41:48.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.958469 env[1280]: time="2024-04-12T18:41:48.958392121Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:41:48.974177 systemd[1]: Reloading. Apr 12 18:41:49.034885 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-04-12T18:41:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:41:49.034909 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-04-12T18:41:49Z" level=info msg="torcx already run" Apr 12 18:41:49.091362 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:41:49.091377 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:41:49.107771 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit: BPF prog-id=31 op=LOAD Apr 12 18:41:49.166000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit: BPF prog-id=32 op=LOAD Apr 12 18:41:49.166000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.166000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit: BPF prog-id=33 op=LOAD Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit: BPF prog-id=34 op=LOAD Apr 12 18:41:49.167000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:41:49.167000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit: BPF prog-id=35 op=LOAD Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.167000 audit: BPF prog-id=36 op=LOAD Apr 12 18:41:49.167000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:41:49.167000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit: BPF prog-id=37 op=LOAD Apr 12 18:41:49.168000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit: BPF prog-id=38 op=LOAD Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.168000 audit: BPF prog-id=39 op=LOAD Apr 12 18:41:49.168000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:41:49.168000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.169000 audit: BPF prog-id=40 op=LOAD Apr 12 18:41:49.169000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:41:49.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit: BPF prog-id=41 op=LOAD Apr 12 18:41:49.171000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit: BPF prog-id=42 op=LOAD Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.171000 audit: BPF prog-id=43 op=LOAD Apr 12 18:41:49.171000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:41:49.171000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit: BPF prog-id=44 op=LOAD Apr 12 18:41:49.172000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:49.172000 audit: BPF prog-id=45 op=LOAD Apr 12 18:41:49.172000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:41:49.180730 systemd[1]: Started kubelet.service. Apr 12 18:41:49.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:49.226486 kubelet[1463]: E0412 18:41:49.226409 1463 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:41:49.228514 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:41:49.228637 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:41:49.227000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:41:49.847503 env[1122]: time="2024-04-12T18:41:49.847451562Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 18:41:50.433646 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2014547322.mount: Deactivated successfully. Apr 12 18:41:52.055500 env[1122]: time="2024-04-12T18:41:52.055370155Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:52.057229 env[1122]: time="2024-04-12T18:41:52.057163423Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:52.058911 env[1122]: time="2024-04-12T18:41:52.058852025Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:52.060926 env[1122]: time="2024-04-12T18:41:52.060894789Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:52.061844 env[1122]: time="2024-04-12T18:41:52.061793525Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:394383b7bc9634d67978b735802d4039f702efd9e5cc2499eac1a8ad78184809\"" Apr 12 18:41:52.070773 env[1122]: time="2024-04-12T18:41:52.070718556Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 18:41:54.759931 env[1122]: time="2024-04-12T18:41:54.759854959Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:54.762717 env[1122]: time="2024-04-12T18:41:54.762641842Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:54.764658 env[1122]: time="2024-04-12T18:41:54.764587130Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:54.767707 env[1122]: time="2024-04-12T18:41:54.767663023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:54.768756 env[1122]: time="2024-04-12T18:41:54.768708081Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:b68567f81c92edc7c53449e3958d8cf5ad474ac00bbbdfcd2bd47558a9bba5d7\"" Apr 12 18:41:54.812986 env[1122]: time="2024-04-12T18:41:54.812924742Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 18:41:57.246799 env[1122]: time="2024-04-12T18:41:57.246691768Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:57.337478 env[1122]: time="2024-04-12T18:41:57.337399145Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:57.359509 env[1122]: time="2024-04-12T18:41:57.359449029Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:57.369837 env[1122]: time="2024-04-12T18:41:57.369646956Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:57.371790 env[1122]: time="2024-04-12T18:41:57.371738068Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5fab684ed62aaef7130a9e5533c28699a5be380abc7cdbcd32502cca8b56e833\"" Apr 12 18:41:57.388988 env[1122]: time="2024-04-12T18:41:57.388942130Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:41:59.448103 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:41:59.448422 systemd[1]: Stopped kubelet.service. Apr 12 18:41:59.450914 systemd[1]: Started kubelet.service. Apr 12 18:41:59.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.452748 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:41:59.452812 kernel: audit: type=1130 audit(1712947319.447:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.447000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.464638 kernel: audit: type=1131 audit(1712947319.447:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.464735 kernel: audit: type=1130 audit(1712947319.450:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.450000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.925624 kubelet[1506]: E0412 18:41:59.925545 1506 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:41:59.941649 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:41:59.941805 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:41:59.939000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:41:59.948327 kernel: audit: type=1131 audit(1712947319.939:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:00.572926 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1074583956.mount: Deactivated successfully. Apr 12 18:42:02.433122 env[1122]: time="2024-04-12T18:42:02.432252989Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:02.442071 env[1122]: time="2024-04-12T18:42:02.440335072Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:02.443365 env[1122]: time="2024-04-12T18:42:02.443206505Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:02.446999 env[1122]: time="2024-04-12T18:42:02.446841460Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:02.449318 env[1122]: time="2024-04-12T18:42:02.448526653Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:2b5590cbba38a0f4f32cbe39a2d3a1a1348612e7550f8b68af937ba5b6e9ba3d\"" Apr 12 18:42:02.607557 env[1122]: time="2024-04-12T18:42:02.607482680Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:42:03.293388 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount805874296.mount: Deactivated successfully. Apr 12 18:42:03.319360 env[1122]: time="2024-04-12T18:42:03.319052551Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:03.329990 env[1122]: time="2024-04-12T18:42:03.323853949Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:03.329990 env[1122]: time="2024-04-12T18:42:03.328645049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:03.335919 env[1122]: time="2024-04-12T18:42:03.331515349Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:03.335919 env[1122]: time="2024-04-12T18:42:03.332289552Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:42:03.603303 env[1122]: time="2024-04-12T18:42:03.603139003Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 18:42:05.043465 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3645001656.mount: Deactivated successfully. Apr 12 18:42:10.025609 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:42:10.025867 systemd[1]: Stopped kubelet.service. Apr 12 18:42:10.027988 systemd[1]: Started kubelet.service. Apr 12 18:42:10.024000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.024000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.049088 kernel: audit: type=1130 audit(1712947330.024:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.049249 kernel: audit: type=1131 audit(1712947330.024:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.049309 kernel: audit: type=1130 audit(1712947330.030:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.262085 kubelet[1527]: E0412 18:42:10.262001 1527 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:42:10.264934 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:10.265119 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:10.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:10.273567 kernel: audit: type=1131 audit(1712947330.264:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:16.059384 env[1122]: time="2024-04-12T18:42:16.059239084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:16.064502 env[1122]: time="2024-04-12T18:42:16.064422460Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:16.068290 env[1122]: time="2024-04-12T18:42:16.068220486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:16.071224 env[1122]: time="2024-04-12T18:42:16.071121469Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:16.072117 env[1122]: time="2024-04-12T18:42:16.072083340Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Apr 12 18:42:16.093917 env[1122]: time="2024-04-12T18:42:16.093863012Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:42:17.467369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount710906385.mount: Deactivated successfully. Apr 12 18:42:19.612471 env[1122]: time="2024-04-12T18:42:19.612340051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:19.616430 env[1122]: time="2024-04-12T18:42:19.616290285Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:19.618604 env[1122]: time="2024-04-12T18:42:19.618541918Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:19.622553 env[1122]: time="2024-04-12T18:42:19.622474073Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:19.622891 env[1122]: time="2024-04-12T18:42:19.622841244Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 18:42:20.275544 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Apr 12 18:42:20.275793 systemd[1]: Stopped kubelet.service. Apr 12 18:42:20.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.284652 systemd[1]: Started kubelet.service. Apr 12 18:42:20.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.294673 kernel: audit: type=1130 audit(1712947340.275:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.294811 kernel: audit: type=1131 audit(1712947340.275:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.294839 kernel: audit: type=1130 audit(1712947340.284:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:20.459004 kubelet[1548]: E0412 18:42:20.456786 1548 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:42:20.480629 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:20.480786 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:20.480000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:20.487532 kernel: audit: type=1131 audit(1712947340.480:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:21.127984 update_engine[1109]: I0412 18:42:21.127847 1109 update_attempter.cc:509] Updating boot flags... Apr 12 18:42:23.113708 systemd[1]: Stopped kubelet.service. Apr 12 18:42:23.113000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.113000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.121079 kernel: audit: type=1130 audit(1712947343.113:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.121221 kernel: audit: type=1131 audit(1712947343.113:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.132721 systemd[1]: Reloading. Apr 12 18:42:23.327646 /usr/lib/systemd/system-generators/torcx-generator[1663]: time="2024-04-12T18:42:23Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:23.327681 /usr/lib/systemd/system-generators/torcx-generator[1663]: time="2024-04-12T18:42:23Z" level=info msg="torcx already run" Apr 12 18:42:23.740426 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:23.740449 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:23.766515 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864698 kernel: audit: type=1400 audit(1712947343.857:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864759 kernel: audit: type=1400 audit(1712947343.857:389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864783 kernel: audit: type=1400 audit(1712947343.857:390): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.867752 kernel: audit: type=1400 audit(1712947343.857:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.863000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.863000 audit: BPF prog-id=46 op=LOAD Apr 12 18:42:23.863000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.864000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit: BPF prog-id=47 op=LOAD Apr 12 18:42:23.869000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit: BPF prog-id=48 op=LOAD Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.869000 audit: BPF prog-id=49 op=LOAD Apr 12 18:42:23.869000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:42:23.869000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit: BPF prog-id=50 op=LOAD Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.870000 audit: BPF prog-id=51 op=LOAD Apr 12 18:42:23.870000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:42:23.870000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit: BPF prog-id=52 op=LOAD Apr 12 18:42:23.872000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit: BPF prog-id=53 op=LOAD Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.872000 audit: BPF prog-id=54 op=LOAD Apr 12 18:42:23.872000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:42:23.872000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.873000 audit: BPF prog-id=55 op=LOAD Apr 12 18:42:23.873000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.875000 audit: BPF prog-id=56 op=LOAD Apr 12 18:42:23.875000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit: BPF prog-id=57 op=LOAD Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit: BPF prog-id=58 op=LOAD Apr 12 18:42:23.876000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:42:23.876000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit: BPF prog-id=59 op=LOAD Apr 12 18:42:23.877000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:23.877000 audit: BPF prog-id=60 op=LOAD Apr 12 18:42:23.877000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:42:23.892634 systemd[1]: Started kubelet.service. Apr 12 18:42:23.891000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.940375 kubelet[1705]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:23.940375 kubelet[1705]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:42:23.940375 kubelet[1705]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:23.940829 kubelet[1705]: I0412 18:42:23.940416 1705 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:42:24.091942 kubelet[1705]: I0412 18:42:24.091894 1705 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:42:24.091942 kubelet[1705]: I0412 18:42:24.091922 1705 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:42:24.092190 kubelet[1705]: I0412 18:42:24.092164 1705 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:42:24.096390 kubelet[1705]: I0412 18:42:24.096356 1705 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:42:24.097399 kubelet[1705]: E0412 18:42:24.097385 1705 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.099969 kubelet[1705]: I0412 18:42:24.099955 1705 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:42:24.100155 kubelet[1705]: I0412 18:42:24.100141 1705 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:42:24.100253 kubelet[1705]: I0412 18:42:24.100239 1705 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:42:24.100351 kubelet[1705]: I0412 18:42:24.100258 1705 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:42:24.100351 kubelet[1705]: I0412 18:42:24.100271 1705 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:42:24.100398 kubelet[1705]: I0412 18:42:24.100353 1705 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:24.102597 kubelet[1705]: I0412 18:42:24.102566 1705 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:42:24.102597 kubelet[1705]: I0412 18:42:24.102593 1705 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:42:24.102701 kubelet[1705]: I0412 18:42:24.102617 1705 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:42:24.102701 kubelet[1705]: I0412 18:42:24.102632 1705 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:42:24.104342 kubelet[1705]: I0412 18:42:24.104316 1705 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:42:24.104645 kubelet[1705]: W0412 18:42:24.104340 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.104715 kubelet[1705]: E0412 18:42:24.104664 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.104715 kubelet[1705]: W0412 18:42:24.104374 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.104715 kubelet[1705]: E0412 18:42:24.104694 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.104885 kubelet[1705]: W0412 18:42:24.104846 1705 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:42:24.105508 kubelet[1705]: I0412 18:42:24.105489 1705 server.go:1168] "Started kubelet" Apr 12 18:42:24.106381 kubelet[1705]: E0412 18:42:24.105940 1705 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17c59c88ac5af255", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 42, 24, 105468501, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 42, 24, 105468501, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.14:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.14:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:42:24.106381 kubelet[1705]: I0412 18:42:24.106102 1705 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:42:24.105000 audit[1705]: AVC avc: denied { mac_admin } for pid=1705 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:24.105000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:24.105000 audit[1705]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005af740 a1=c00055d848 a2=c0005af710 a3=25 items=0 ppid=1 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.105000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:24.105000 audit[1705]: AVC avc: denied { mac_admin } for pid=1705 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:24.105000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:24.105000 audit[1705]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a42400 a1=c00055d860 a2=c0005af7d0 a3=25 items=0 ppid=1 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.105000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:24.106931 kubelet[1705]: I0412 18:42:24.106434 1705 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:42:24.106931 kubelet[1705]: I0412 18:42:24.106467 1705 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:42:24.106931 kubelet[1705]: I0412 18:42:24.106514 1705 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:42:24.106931 kubelet[1705]: I0412 18:42:24.106604 1705 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:42:24.107340 kubelet[1705]: I0412 18:42:24.107316 1705 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:42:24.108399 kubelet[1705]: E0412 18:42:24.108371 1705 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:42:24.108399 kubelet[1705]: E0412 18:42:24.108399 1705 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:42:24.108512 kubelet[1705]: E0412 18:42:24.108468 1705 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:42:24.108512 kubelet[1705]: I0412 18:42:24.108489 1705 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:42:24.107000 audit[1717]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.107000 audit[1717]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff1e466910 a2=0 a3=7fff1e4668fc items=0 ppid=1705 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.107000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:42:24.109085 kubelet[1705]: I0412 18:42:24.108606 1705 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:42:24.109085 kubelet[1705]: W0412 18:42:24.108987 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.109085 kubelet[1705]: E0412 18:42:24.109027 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.108000 audit[1718]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.108000 audit[1718]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffac76efb0 a2=0 a3=7fffac76ef9c items=0 ppid=1705 pid=1718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.108000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:42:24.110304 kubelet[1705]: E0412 18:42:24.109704 1705 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.14:6443: connect: connection refused" interval="200ms" Apr 12 18:42:24.111000 audit[1720]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.111000 audit[1720]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff9896c220 a2=0 a3=7fff9896c20c items=0 ppid=1705 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.111000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:24.113000 audit[1722]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.113000 audit[1722]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffefb84bfb0 a2=0 a3=7ffefb84bf9c items=0 ppid=1705 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.113000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:24.122000 audit[1727]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.122000 audit[1727]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcd41aef50 a2=0 a3=7ffcd41aef3c items=0 ppid=1705 pid=1727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.122000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:42:24.123993 kubelet[1705]: I0412 18:42:24.123955 1705 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:42:24.123000 audit[1728]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:24.123000 audit[1728]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd3fd4de50 a2=0 a3=7ffd3fd4de3c items=0 ppid=1705 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:42:24.123000 audit[1729]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.123000 audit[1729]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe34a33f90 a2=0 a3=10e3 items=0 ppid=1705 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:42:24.125189 kubelet[1705]: I0412 18:42:24.125068 1705 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:42:24.125189 kubelet[1705]: I0412 18:42:24.125098 1705 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:42:24.125189 kubelet[1705]: I0412 18:42:24.125128 1705 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:42:24.125272 kubelet[1705]: E0412 18:42:24.125197 1705 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:42:24.125955 kubelet[1705]: W0412 18:42:24.125778 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.125955 kubelet[1705]: E0412 18:42:24.125830 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:24.125000 audit[1730]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:24.125000 audit[1730]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff40eb01f0 a2=0 a3=7fff40eb01dc items=0 ppid=1705 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.125000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:42:24.125000 audit[1731]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.125000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff81f0bad0 a2=0 a3=7fff81f0babc items=0 ppid=1705 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.125000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:42:24.126000 audit[1732]: NETFILTER_CFG table=nat:35 family=10 entries=2 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:24.126000 audit[1732]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffc440d8c90 a2=0 a3=7ffc440d8c7c items=0 ppid=1705 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.126000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:42:24.127000 audit[1733]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_chain pid=1733 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:24.127000 audit[1733]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe7c324a20 a2=0 a3=7ffe7c324a0c items=0 ppid=1705 pid=1733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.127000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:42:24.127000 audit[1734]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:24.127000 audit[1734]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe412b79e0 a2=0 a3=7ffe412b79cc items=0 ppid=1705 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.127000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:42:24.133381 kubelet[1705]: I0412 18:42:24.133349 1705 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:42:24.133381 kubelet[1705]: I0412 18:42:24.133370 1705 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:42:24.133381 kubelet[1705]: I0412 18:42:24.133383 1705 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:24.209912 kubelet[1705]: I0412 18:42:24.209876 1705 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:24.210345 kubelet[1705]: E0412 18:42:24.210308 1705 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.14:6443/api/v1/nodes\": dial tcp 10.0.0.14:6443: connect: connection refused" node="localhost" Apr 12 18:42:24.225550 kubelet[1705]: E0412 18:42:24.225510 1705 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:42:24.255327 kubelet[1705]: I0412 18:42:24.255282 1705 policy_none.go:49] "None policy: Start" Apr 12 18:42:24.256254 kubelet[1705]: I0412 18:42:24.256215 1705 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:42:24.256303 kubelet[1705]: I0412 18:42:24.256265 1705 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:42:24.311288 kubelet[1705]: E0412 18:42:24.311237 1705 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.14:6443: connect: connection refused" interval="400ms" Apr 12 18:42:24.368220 systemd[1]: Created slice kubepods.slice. Apr 12 18:42:24.372541 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:42:24.375303 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:42:24.379916 kubelet[1705]: I0412 18:42:24.379867 1705 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:42:24.378000 audit[1705]: AVC avc: denied { mac_admin } for pid=1705 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:24.378000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:24.378000 audit[1705]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00082ac60 a1=c0009ae918 a2=c00082ac30 a3=25 items=0 ppid=1 pid=1705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.378000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:24.380223 kubelet[1705]: I0412 18:42:24.379970 1705 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:42:24.380223 kubelet[1705]: I0412 18:42:24.380202 1705 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:42:24.380832 kubelet[1705]: E0412 18:42:24.380812 1705 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:42:24.413813 kubelet[1705]: I0412 18:42:24.413746 1705 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:24.414111 kubelet[1705]: E0412 18:42:24.414063 1705 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.14:6443/api/v1/nodes\": dial tcp 10.0.0.14:6443: connect: connection refused" node="localhost" Apr 12 18:42:24.426596 kubelet[1705]: I0412 18:42:24.426517 1705 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:24.427971 kubelet[1705]: I0412 18:42:24.427954 1705 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:24.428942 kubelet[1705]: I0412 18:42:24.428915 1705 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:24.433394 systemd[1]: Created slice kubepods-burstable-pod49a1c6c17aa25392d4f6dee59016c574.slice. Apr 12 18:42:24.453757 systemd[1]: Created slice kubepods-burstable-podb23ea803843027eb81926493bf073366.slice. Apr 12 18:42:24.457019 systemd[1]: Created slice kubepods-burstable-pod2f7d78630cba827a770c684e2dbe6ce6.slice. Apr 12 18:42:24.510750 kubelet[1705]: I0412 18:42:24.510710 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:24.510750 kubelet[1705]: I0412 18:42:24.510755 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:24.510952 kubelet[1705]: I0412 18:42:24.510776 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:24.510952 kubelet[1705]: I0412 18:42:24.510795 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:24.510952 kubelet[1705]: I0412 18:42:24.510813 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:24.511017 kubelet[1705]: I0412 18:42:24.510960 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2f7d78630cba827a770c684e2dbe6ce6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2f7d78630cba827a770c684e2dbe6ce6\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:42:24.511017 kubelet[1705]: I0412 18:42:24.511013 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:24.511062 kubelet[1705]: I0412 18:42:24.511032 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:24.511062 kubelet[1705]: I0412 18:42:24.511059 1705 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:24.712692 kubelet[1705]: E0412 18:42:24.712530 1705 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.14:6443: connect: connection refused" interval="800ms" Apr 12 18:42:24.752858 kubelet[1705]: E0412 18:42:24.752796 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:24.753770 env[1122]: time="2024-04-12T18:42:24.753710001Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:49a1c6c17aa25392d4f6dee59016c574,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:24.755933 kubelet[1705]: E0412 18:42:24.755887 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:24.756573 env[1122]: time="2024-04-12T18:42:24.756530311Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b23ea803843027eb81926493bf073366,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:24.758660 kubelet[1705]: E0412 18:42:24.758641 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:24.759128 env[1122]: time="2024-04-12T18:42:24.759091548Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2f7d78630cba827a770c684e2dbe6ce6,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:24.815619 kubelet[1705]: I0412 18:42:24.815584 1705 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:24.816005 kubelet[1705]: E0412 18:42:24.815976 1705 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.14:6443/api/v1/nodes\": dial tcp 10.0.0.14:6443: connect: connection refused" node="localhost" Apr 12 18:42:25.024382 kubelet[1705]: W0412 18:42:25.024221 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.024382 kubelet[1705]: E0412 18:42:25.024289 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.14:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.229963 kubelet[1705]: W0412 18:42:25.229888 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.229963 kubelet[1705]: E0412 18:42:25.229955 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.14:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.233273 kubelet[1705]: W0412 18:42:25.233199 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.233273 kubelet[1705]: E0412 18:42:25.233271 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.14:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.247622 kubelet[1705]: W0412 18:42:25.247578 1705 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.247622 kubelet[1705]: E0412 18:42:25.247612 1705 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.14:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:25.368848 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2594521635.mount: Deactivated successfully. Apr 12 18:42:25.377023 env[1122]: time="2024-04-12T18:42:25.376949157Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.379840 env[1122]: time="2024-04-12T18:42:25.379804717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.381789 env[1122]: time="2024-04-12T18:42:25.381727618Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.382660 env[1122]: time="2024-04-12T18:42:25.382616144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.384739 env[1122]: time="2024-04-12T18:42:25.384693212Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.385959 env[1122]: time="2024-04-12T18:42:25.385910285Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.387697 env[1122]: time="2024-04-12T18:42:25.387659577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.389866 env[1122]: time="2024-04-12T18:42:25.389836027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.392453 env[1122]: time="2024-04-12T18:42:25.392422706Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.392982 env[1122]: time="2024-04-12T18:42:25.392953513Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.393574 env[1122]: time="2024-04-12T18:42:25.393545820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.394342 env[1122]: time="2024-04-12T18:42:25.394305953Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:25.412871 env[1122]: time="2024-04-12T18:42:25.412774439Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:25.412871 env[1122]: time="2024-04-12T18:42:25.412842975Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:25.412871 env[1122]: time="2024-04-12T18:42:25.412857616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:25.413065 env[1122]: time="2024-04-12T18:42:25.412989445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/518924d776b6f5e31e391974664a5fa654646657abce9e1bdbb00b95defb76f6 pid=1745 runtime=io.containerd.runc.v2 Apr 12 18:42:25.421856 env[1122]: time="2024-04-12T18:42:25.421640235Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:25.421856 env[1122]: time="2024-04-12T18:42:25.421675520Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:25.421856 env[1122]: time="2024-04-12T18:42:25.421684919Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:25.422120 env[1122]: time="2024-04-12T18:42:25.422074397Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f9ec53a5f0e883276cd44d54c66c3eba7538e3d535659bcdd650ee96706df80 pid=1761 runtime=io.containerd.runc.v2 Apr 12 18:42:25.426458 env[1122]: time="2024-04-12T18:42:25.426388211Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:25.426458 env[1122]: time="2024-04-12T18:42:25.426422214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:25.426458 env[1122]: time="2024-04-12T18:42:25.426432004Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:25.426578 env[1122]: time="2024-04-12T18:42:25.426529972Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ffb5a9660c4d1e277b2a23649093bdd58472883fda84b1e14ce83272a618658 pid=1776 runtime=io.containerd.runc.v2 Apr 12 18:42:25.431101 systemd[1]: Started cri-containerd-518924d776b6f5e31e391974664a5fa654646657abce9e1bdbb00b95defb76f6.scope. Apr 12 18:42:25.433693 systemd[1]: Started cri-containerd-1f9ec53a5f0e883276cd44d54c66c3eba7538e3d535659bcdd650ee96706df80.scope. Apr 12 18:42:25.443363 systemd[1]: Started cri-containerd-1ffb5a9660c4d1e277b2a23649093bdd58472883fda84b1e14ce83272a618658.scope. Apr 12 18:42:25.455158 kernel: kauditd_printk_skb: 217 callbacks suppressed Apr 12 18:42:25.455294 kernel: audit: type=1400 audit(1712947345.447:576): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.455316 kernel: audit: type=1400 audit(1712947345.447:577): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.461577 kernel: audit: type=1400 audit(1712947345.447:578): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.461623 kernel: audit: type=1400 audit(1712947345.447:579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.464611 kernel: audit: type=1400 audit(1712947345.447:580): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.464646 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:42:25.464683 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:42:25.464731 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:42:25.464753 kernel: audit: backlog limit exceeded Apr 12 18:42:25.464768 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.447000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.450000 audit: BPF prog-id=61 op=LOAD Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=1745 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383932346437373662366635653331653339313937343636346135 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=1745 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383932346437373662366635653331653339313937343636346135 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.454000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.457000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.457000 audit: BPF prog-id=62 op=LOAD Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166396563353361356630653838333237366364343464353463363663 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166396563353361356630653838333237366364343464353463363663 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.451000 audit: BPF prog-id=63 op=LOAD Apr 12 18:42:25.459000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.459000 audit: BPF prog-id=64 op=LOAD Apr 12 18:42:25.451000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000301d90 items=0 ppid=1745 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.451000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383932346437373662366635653331653339313937343636346135 Apr 12 18:42:25.459000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000329f60 items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.459000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166396563353361356630653838333237366364343464353463363663 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit: BPF prog-id=65 op=LOAD Apr 12 18:42:25.460000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000301dd8 items=0 ppid=1745 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383932346437373662366635653331653339313937343636346135 Apr 12 18:42:25.465000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:42:25.465000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { perfmon } for pid=1764 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit[1764]: AVC avc: denied { bpf } for pid=1764 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.465000 audit: BPF prog-id=66 op=LOAD Apr 12 18:42:25.465000 audit[1764]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003741e8 items=0 ppid=1745 pid=1764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531383932346437373662366635653331653339313937343636346135 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.460000 audit: BPF prog-id=67 op=LOAD Apr 12 18:42:25.460000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000329fa8 items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166396563353361356630653838333237366364343464353463363663 Apr 12 18:42:25.468000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:42:25.468000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { perfmon } for pid=1790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit[1790]: AVC avc: denied { bpf } for pid=1790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.468000 audit: BPF prog-id=68 op=LOAD Apr 12 18:42:25.468000 audit[1790]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00040a3b8 items=0 ppid=1761 pid=1790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.468000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166396563353361356630653838333237366364343464353463363663 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit: BPF prog-id=69 op=LOAD Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1776 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666235613936363063346431653237376232613233363439303933 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1776 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666235613936363063346431653237376232613233363439303933 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit: BPF prog-id=70 op=LOAD Apr 12 18:42:25.472000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003f7160 items=0 ppid=1776 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666235613936363063346431653237376232613233363439303933 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit: BPF prog-id=71 op=LOAD Apr 12 18:42:25.472000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003f71a8 items=0 ppid=1776 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666235613936363063346431653237376232613233363439303933 Apr 12 18:42:25.472000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:42:25.472000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { perfmon } for pid=1807 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit[1807]: AVC avc: denied { bpf } for pid=1807 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:25.472000 audit: BPF prog-id=72 op=LOAD Apr 12 18:42:25.472000 audit[1807]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003f75b8 items=0 ppid=1776 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:25.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166666235613936363063346431653237376232613233363439303933 Apr 12 18:42:26.048959 kubelet[1705]: E0412 18:42:26.048921 1705 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.14:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.14:6443: connect: connection refused" interval="1.6s" Apr 12 18:42:26.057676 kubelet[1705]: I0412 18:42:26.057623 1705 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:26.057965 kubelet[1705]: E0412 18:42:26.057939 1705 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.14:6443/api/v1/nodes\": dial tcp 10.0.0.14:6443: connect: connection refused" node="localhost" Apr 12 18:42:26.073144 env[1122]: time="2024-04-12T18:42:26.073098717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2f7d78630cba827a770c684e2dbe6ce6,Namespace:kube-system,Attempt:0,} returns sandbox id \"518924d776b6f5e31e391974664a5fa654646657abce9e1bdbb00b95defb76f6\"" Apr 12 18:42:26.073711 env[1122]: time="2024-04-12T18:42:26.073673590Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b23ea803843027eb81926493bf073366,Namespace:kube-system,Attempt:0,} returns sandbox id \"1f9ec53a5f0e883276cd44d54c66c3eba7538e3d535659bcdd650ee96706df80\"" Apr 12 18:42:26.075169 kubelet[1705]: E0412 18:42:26.074962 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:26.075169 kubelet[1705]: E0412 18:42:26.074999 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:26.077929 env[1122]: time="2024-04-12T18:42:26.077891123Z" level=info msg="CreateContainer within sandbox \"518924d776b6f5e31e391974664a5fa654646657abce9e1bdbb00b95defb76f6\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:42:26.079137 env[1122]: time="2024-04-12T18:42:26.079102401Z" level=info msg="CreateContainer within sandbox \"1f9ec53a5f0e883276cd44d54c66c3eba7538e3d535659bcdd650ee96706df80\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:42:26.080836 env[1122]: time="2024-04-12T18:42:26.080794472Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:49a1c6c17aa25392d4f6dee59016c574,Namespace:kube-system,Attempt:0,} returns sandbox id \"1ffb5a9660c4d1e277b2a23649093bdd58472883fda84b1e14ce83272a618658\"" Apr 12 18:42:26.081458 kubelet[1705]: E0412 18:42:26.081433 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:26.083167 env[1122]: time="2024-04-12T18:42:26.083133088Z" level=info msg="CreateContainer within sandbox \"1ffb5a9660c4d1e277b2a23649093bdd58472883fda84b1e14ce83272a618658\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:42:26.103984 env[1122]: time="2024-04-12T18:42:26.103934188Z" level=info msg="CreateContainer within sandbox \"518924d776b6f5e31e391974664a5fa654646657abce9e1bdbb00b95defb76f6\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"bcf1fc4abdcd76e0357b95f24d4c379caeaac3823520d1865a456ab0b4f25e4b\"" Apr 12 18:42:26.104509 env[1122]: time="2024-04-12T18:42:26.104477896Z" level=info msg="StartContainer for \"bcf1fc4abdcd76e0357b95f24d4c379caeaac3823520d1865a456ab0b4f25e4b\"" Apr 12 18:42:26.108287 env[1122]: time="2024-04-12T18:42:26.108262495Z" level=info msg="CreateContainer within sandbox \"1f9ec53a5f0e883276cd44d54c66c3eba7538e3d535659bcdd650ee96706df80\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"3baecda800892434b6f16842729dd1cec33458a43616e5b62d768eac5b6413e9\"" Apr 12 18:42:26.108860 env[1122]: time="2024-04-12T18:42:26.108829873Z" level=info msg="StartContainer for \"3baecda800892434b6f16842729dd1cec33458a43616e5b62d768eac5b6413e9\"" Apr 12 18:42:26.115610 env[1122]: time="2024-04-12T18:42:26.115570902Z" level=info msg="CreateContainer within sandbox \"1ffb5a9660c4d1e277b2a23649093bdd58472883fda84b1e14ce83272a618658\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"baa3d23ee4d847819ff2c5c96464b84c7723d73cb02ccf6a3ef655d8e12a0a7b\"" Apr 12 18:42:26.116059 env[1122]: time="2024-04-12T18:42:26.116034260Z" level=info msg="StartContainer for \"baa3d23ee4d847819ff2c5c96464b84c7723d73cb02ccf6a3ef655d8e12a0a7b\"" Apr 12 18:42:26.120809 systemd[1]: Started cri-containerd-bcf1fc4abdcd76e0357b95f24d4c379caeaac3823520d1865a456ab0b4f25e4b.scope. Apr 12 18:42:26.129618 systemd[1]: Started cri-containerd-3baecda800892434b6f16842729dd1cec33458a43616e5b62d768eac5b6413e9.scope. Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.136000 audit: BPF prog-id=73 op=LOAD Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1745 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263663166633461626463643736653033353762393566323464346333 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1745 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263663166633461626463643736653033353762393566323464346333 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit: BPF prog-id=74 op=LOAD Apr 12 18:42:26.137000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00028ebb0 items=0 ppid=1745 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263663166633461626463643736653033353762393566323464346333 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit: BPF prog-id=75 op=LOAD Apr 12 18:42:26.137000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00028ebf8 items=0 ppid=1745 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263663166633461626463643736653033353762393566323464346333 Apr 12 18:42:26.137000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:42:26.137000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { perfmon } for pid=1873 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit[1873]: AVC avc: denied { bpf } for pid=1873 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.137000 audit: BPF prog-id=76 op=LOAD Apr 12 18:42:26.137000 audit[1873]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00028f008 items=0 ppid=1745 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.137000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263663166633461626463643736653033353762393566323464346333 Apr 12 18:42:26.143031 systemd[1]: Started cri-containerd-baa3d23ee4d847819ff2c5c96464b84c7723d73cb02ccf6a3ef655d8e12a0a7b.scope. Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit: BPF prog-id=77 op=LOAD Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001c5c48 a2=10 a3=1c items=0 ppid=1761 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616563646138303038393234333462366631363834323732396464 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001c56b0 a2=3c a3=8 items=0 ppid=1761 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616563646138303038393234333462366631363834323732396464 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit: BPF prog-id=78 op=LOAD Apr 12 18:42:26.147000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c59d8 a2=78 a3=c00025df70 items=0 ppid=1761 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616563646138303038393234333462366631363834323732396464 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit: BPF prog-id=79 op=LOAD Apr 12 18:42:26.147000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001c5770 a2=78 a3=c00025dfb8 items=0 ppid=1761 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616563646138303038393234333462366631363834323732396464 Apr 12 18:42:26.147000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:42:26.147000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { perfmon } for pid=1890 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit[1890]: AVC avc: denied { bpf } for pid=1890 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.147000 audit: BPF prog-id=80 op=LOAD Apr 12 18:42:26.147000 audit[1890]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001c5c30 a2=78 a3=c0003aa3c8 items=0 ppid=1761 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362616563646138303038393234333462366631363834323732396464 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit: BPF prog-id=81 op=LOAD Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1776 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613364323365653464383437383139666632633563393634363462 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1776 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613364323365653464383437383139666632633563393634363462 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit: BPF prog-id=82 op=LOAD Apr 12 18:42:26.206000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002c5df0 items=0 ppid=1776 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613364323365653464383437383139666632633563393634363462 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.206000 audit: BPF prog-id=83 op=LOAD Apr 12 18:42:26.206000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002c5e38 items=0 ppid=1776 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613364323365653464383437383139666632633563393634363462 Apr 12 18:42:26.206000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:42:26.207000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { perfmon } for pid=1913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit[1913]: AVC avc: denied { bpf } for pid=1913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:26.207000 audit: BPF prog-id=84 op=LOAD Apr 12 18:42:26.207000 audit[1913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003bc248 items=0 ppid=1776 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:26.207000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613364323365653464383437383139666632633563393634363462 Apr 12 18:42:26.209509 kubelet[1705]: E0412 18:42:26.208278 1705 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.14:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.14:6443: connect: connection refused Apr 12 18:42:26.231597 env[1122]: time="2024-04-12T18:42:26.231551167Z" level=info msg="StartContainer for \"bcf1fc4abdcd76e0357b95f24d4c379caeaac3823520d1865a456ab0b4f25e4b\" returns successfully" Apr 12 18:42:26.234908 env[1122]: time="2024-04-12T18:42:26.234861304Z" level=info msg="StartContainer for \"3baecda800892434b6f16842729dd1cec33458a43616e5b62d768eac5b6413e9\" returns successfully" Apr 12 18:42:26.247768 env[1122]: time="2024-04-12T18:42:26.247707832Z" level=info msg="StartContainer for \"baa3d23ee4d847819ff2c5c96464b84c7723d73cb02ccf6a3ef655d8e12a0a7b\" returns successfully" Apr 12 18:42:26.829000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:26.829000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00078c600 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:26.829000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:26.830000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:26.830000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000b0a020 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:26.830000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:27.141069 kubelet[1705]: E0412 18:42:27.140937 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:27.143447 kubelet[1705]: E0412 18:42:27.143418 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:27.145541 kubelet[1705]: E0412 18:42:27.145514 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:27.496000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.496000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003f9c030 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.496000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.496000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3f a1=c00488c0a0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.496000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.496000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=3e a1=c003dfc090 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.496000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.505000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.505000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c0046901b0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.505000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.523000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.523000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004726c00 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.523000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:27.523000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c004ab0510 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:42:27.523000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:42:27.660342 kubelet[1705]: I0412 18:42:27.660295 1705 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:27.697046 kubelet[1705]: I0412 18:42:27.696998 1705 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:42:28.105608 kubelet[1705]: I0412 18:42:28.105573 1705 apiserver.go:52] "Watching apiserver" Apr 12 18:42:28.109105 kubelet[1705]: I0412 18:42:28.109051 1705 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:42:28.151270 kubelet[1705]: E0412 18:42:28.151222 1705 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:28.151270 kubelet[1705]: E0412 18:42:28.151249 1705 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:28.151270 kubelet[1705]: E0412 18:42:28.151222 1705 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Apr 12 18:42:28.151659 kubelet[1705]: E0412 18:42:28.151582 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:28.151708 kubelet[1705]: E0412 18:42:28.151695 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:28.151776 kubelet[1705]: E0412 18:42:28.151719 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:28.165418 kubelet[1705]: I0412 18:42:28.165380 1705 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:42:29.152091 kubelet[1705]: E0412 18:42:29.152049 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:29.988231 systemd[1]: Reloading. Apr 12 18:42:30.049139 /usr/lib/systemd/system-generators/torcx-generator[2006]: time="2024-04-12T18:42:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:30.049168 /usr/lib/systemd/system-generators/torcx-generator[2006]: time="2024-04-12T18:42:30Z" level=info msg="torcx already run" Apr 12 18:42:30.126038 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:30.126054 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:30.143456 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:30.149640 kubelet[1705]: E0412 18:42:30.149613 1705 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.212000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.212000 audit: BPF prog-id=85 op=LOAD Apr 12 18:42:30.212000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.213000 audit: BPF prog-id=86 op=LOAD Apr 12 18:42:30.213000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit: BPF prog-id=87 op=LOAD Apr 12 18:42:30.214000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit: BPF prog-id=88 op=LOAD Apr 12 18:42:30.214000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.214000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit: BPF prog-id=89 op=LOAD Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit: BPF prog-id=90 op=LOAD Apr 12 18:42:30.215000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:42:30.215000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit: BPF prog-id=91 op=LOAD Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.215000 audit: BPF prog-id=92 op=LOAD Apr 12 18:42:30.215000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:42:30.215000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit: BPF prog-id=93 op=LOAD Apr 12 18:42:30.216000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.216000 audit: BPF prog-id=94 op=LOAD Apr 12 18:42:30.216000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:42:30.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit: BPF prog-id=95 op=LOAD Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit: BPF prog-id=96 op=LOAD Apr 12 18:42:30.217000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:42:30.217000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.217000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit: BPF prog-id=97 op=LOAD Apr 12 18:42:30.218000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit: BPF prog-id=98 op=LOAD Apr 12 18:42:30.218000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.218000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.219000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.219000 audit: BPF prog-id=99 op=LOAD Apr 12 18:42:30.219000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit: BPF prog-id=100 op=LOAD Apr 12 18:42:30.220000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit: BPF prog-id=101 op=LOAD Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.220000 audit: BPF prog-id=102 op=LOAD Apr 12 18:42:30.220000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:42:30.220000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit: BPF prog-id=103 op=LOAD Apr 12 18:42:30.221000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit: BPF prog-id=104 op=LOAD Apr 12 18:42:30.222000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.222000 audit: BPF prog-id=105 op=LOAD Apr 12 18:42:30.222000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:42:30.233347 kubelet[1705]: I0412 18:42:30.233312 1705 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:42:30.233495 systemd[1]: Stopping kubelet.service... Apr 12 18:42:30.256550 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:42:30.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:30.256771 systemd[1]: Stopped kubelet.service. Apr 12 18:42:30.258543 systemd[1]: Started kubelet.service. Apr 12 18:42:30.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:30.302609 kubelet[2046]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:30.302609 kubelet[2046]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:42:30.302609 kubelet[2046]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:42:30.303015 kubelet[2046]: I0412 18:42:30.302657 2046 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:42:30.307338 kubelet[2046]: I0412 18:42:30.307315 2046 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:42:30.307338 kubelet[2046]: I0412 18:42:30.307333 2046 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:42:30.307515 kubelet[2046]: I0412 18:42:30.307498 2046 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:42:30.308739 kubelet[2046]: I0412 18:42:30.308714 2046 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:42:30.309860 kubelet[2046]: I0412 18:42:30.309821 2046 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:42:30.312773 kubelet[2046]: I0412 18:42:30.312753 2046 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:42:30.312917 kubelet[2046]: I0412 18:42:30.312899 2046 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:42:30.312971 kubelet[2046]: I0412 18:42:30.312958 2046 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:42:30.313052 kubelet[2046]: I0412 18:42:30.312978 2046 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:42:30.313052 kubelet[2046]: I0412 18:42:30.312988 2046 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:42:30.313052 kubelet[2046]: I0412 18:42:30.313012 2046 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:30.316270 kubelet[2046]: I0412 18:42:30.316255 2046 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:42:30.316270 kubelet[2046]: I0412 18:42:30.316272 2046 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:42:30.316346 kubelet[2046]: I0412 18:42:30.316290 2046 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:42:30.316346 kubelet[2046]: I0412 18:42:30.316300 2046 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:42:30.318000 audit[2046]: AVC avc: denied { mac_admin } for pid=2046 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.318000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:30.318000 audit[2046]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007c5380 a1=c0009526d8 a2=c0007c5350 a3=25 items=0 ppid=1 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:30.318000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:30.318000 audit[2046]: AVC avc: denied { mac_admin } for pid=2046 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.318000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:30.318000 audit[2046]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005293a0 a1=c0009526f0 a2=c0007c5410 a3=25 items=0 ppid=1 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:30.318000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.316959 2046 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.317595 2046 server.go:1168] "Started kubelet" Apr 12 18:42:30.323053 kubelet[2046]: E0412 18:42:30.318343 2046 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:42:30.323053 kubelet[2046]: E0412 18:42:30.318363 2046 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.319822 2046 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.319850 2046 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.319867 2046 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.320976 2046 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.321100 2046 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:42:30.323053 kubelet[2046]: I0412 18:42:30.321263 2046 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:42:30.323279 kubelet[2046]: I0412 18:42:30.323249 2046 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:42:30.331895 kubelet[2046]: I0412 18:42:30.331866 2046 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:42:30.345237 kubelet[2046]: I0412 18:42:30.345212 2046 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:42:30.345986 kubelet[2046]: I0412 18:42:30.345964 2046 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:42:30.345986 kubelet[2046]: I0412 18:42:30.345983 2046 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:42:30.346050 kubelet[2046]: I0412 18:42:30.345997 2046 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:42:30.346050 kubelet[2046]: E0412 18:42:30.346037 2046 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:42:30.369195 kubelet[2046]: I0412 18:42:30.369151 2046 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:42:30.369195 kubelet[2046]: I0412 18:42:30.369168 2046 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:42:30.369195 kubelet[2046]: I0412 18:42:30.369193 2046 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:42:30.369393 kubelet[2046]: I0412 18:42:30.369309 2046 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:42:30.369393 kubelet[2046]: I0412 18:42:30.369320 2046 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 18:42:30.369393 kubelet[2046]: I0412 18:42:30.369325 2046 policy_none.go:49] "None policy: Start" Apr 12 18:42:30.369878 kubelet[2046]: I0412 18:42:30.369865 2046 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:42:30.369878 kubelet[2046]: I0412 18:42:30.369879 2046 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:42:30.369987 kubelet[2046]: I0412 18:42:30.369972 2046 state_mem.go:75] "Updated machine memory state" Apr 12 18:42:30.373429 kubelet[2046]: I0412 18:42:30.373404 2046 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:42:30.372000 audit[2046]: AVC avc: denied { mac_admin } for pid=2046 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:30.372000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:42:30.372000 audit[2046]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0013dbec0 a1=c001433aa0 a2=c0013dbe90 a3=25 items=0 ppid=1 pid=2046 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:30.372000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:42:30.373642 kubelet[2046]: I0412 18:42:30.373467 2046 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:42:30.373670 kubelet[2046]: I0412 18:42:30.373645 2046 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:42:30.427524 kubelet[2046]: I0412 18:42:30.427491 2046 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:42:30.446695 kubelet[2046]: I0412 18:42:30.446656 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:30.446794 kubelet[2046]: I0412 18:42:30.446762 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:30.446818 kubelet[2046]: I0412 18:42:30.446794 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:30.601727 kubelet[2046]: E0412 18:42:30.601695 2046 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:30.603955 kubelet[2046]: I0412 18:42:30.603934 2046 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Apr 12 18:42:30.604022 kubelet[2046]: I0412 18:42:30.603997 2046 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:42:30.623356 kubelet[2046]: I0412 18:42:30.623336 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:30.623540 kubelet[2046]: I0412 18:42:30.623515 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:30.623669 kubelet[2046]: I0412 18:42:30.623644 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:30.623740 kubelet[2046]: I0412 18:42:30.623673 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:30.623740 kubelet[2046]: I0412 18:42:30.623692 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:30.623740 kubelet[2046]: I0412 18:42:30.623709 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2f7d78630cba827a770c684e2dbe6ce6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2f7d78630cba827a770c684e2dbe6ce6\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:42:30.623740 kubelet[2046]: I0412 18:42:30.623726 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:30.623838 kubelet[2046]: I0412 18:42:30.623743 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/49a1c6c17aa25392d4f6dee59016c574-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"49a1c6c17aa25392d4f6dee59016c574\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:42:30.623838 kubelet[2046]: I0412 18:42:30.623760 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:42:30.774756 kubelet[2046]: E0412 18:42:30.774707 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:30.775055 kubelet[2046]: E0412 18:42:30.775033 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:30.903504 kubelet[2046]: E0412 18:42:30.903367 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:31.268000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:42:31.270725 kernel: kauditd_printk_skb: 632 callbacks suppressed Apr 12 18:42:31.270778 kernel: audit: type=1400 audit(1712947351.268:941): avc: denied { watch } for pid=1925 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:42:31.268000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009bfbc0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:31.279892 kernel: audit: type=1300 audit(1712947351.268:941): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009bfbc0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:31.268000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:31.285203 kernel: audit: type=1327 audit(1712947351.268:941): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:31.316918 kubelet[2046]: I0412 18:42:31.316780 2046 apiserver.go:52] "Watching apiserver" Apr 12 18:42:31.354069 kubelet[2046]: E0412 18:42:31.354024 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:31.354955 kubelet[2046]: E0412 18:42:31.354930 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:31.355356 kubelet[2046]: E0412 18:42:31.355338 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:31.416407 kubelet[2046]: I0412 18:42:31.416362 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.4163212760000001 podCreationTimestamp="2024-04-12 18:42:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:42:31.415947294 +0000 UTC m=+1.154500063" watchObservedRunningTime="2024-04-12 18:42:31.416321276 +0000 UTC m=+1.154874045" Apr 12 18:42:31.421445 kubelet[2046]: I0412 18:42:31.421410 2046 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:42:31.429388 kubelet[2046]: I0412 18:42:31.429340 2046 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:42:31.440712 kubelet[2046]: I0412 18:42:31.440662 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.440626876 podCreationTimestamp="2024-04-12 18:42:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:42:31.439994581 +0000 UTC m=+1.178547350" watchObservedRunningTime="2024-04-12 18:42:31.440626876 +0000 UTC m=+1.179179655" Apr 12 18:42:31.440866 kubelet[2046]: I0412 18:42:31.440744 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.440731492 podCreationTimestamp="2024-04-12 18:42:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:42:31.428287952 +0000 UTC m=+1.166840721" watchObservedRunningTime="2024-04-12 18:42:31.440731492 +0000 UTC m=+1.179284271" Apr 12 18:42:32.354844 kubelet[2046]: E0412 18:42:32.354814 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:33.205800 sudo[1262]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:33.204000 audit[1262]: USER_END pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.207544 sshd[1259]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:33.209577 systemd[1]: sshd@8-10.0.0.14:22-10.0.0.1:44820.service: Deactivated successfully. Apr 12 18:42:33.204000 audit[1262]: CRED_DISP pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.210373 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:42:33.210534 systemd[1]: session-9.scope: Consumed 5.284s CPU time. Apr 12 18:42:33.210869 systemd-logind[1104]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:42:33.211511 systemd-logind[1104]: Removed session 9. Apr 12 18:42:33.213857 kernel: audit: type=1106 audit(1712947353.204:942): pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.213909 kernel: audit: type=1104 audit(1712947353.204:943): pid=1262 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.213927 kernel: audit: type=1106 audit(1712947353.207:944): pid=1259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:33.207000 audit[1259]: USER_END pid=1259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:33.207000 audit[1259]: CRED_DISP pid=1259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:33.221760 kernel: audit: type=1104 audit(1712947353.207:945): pid=1259 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:33.221802 kernel: audit: type=1131 audit(1712947353.208:946): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.14:22-10.0.0.1:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.14:22-10.0.0.1:44820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:33.356620 kubelet[2046]: E0412 18:42:33.356581 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:34.358165 kubelet[2046]: E0412 18:42:34.358137 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:34.508625 kubelet[2046]: E0412 18:42:34.508590 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:39.946464 kubelet[2046]: E0412 18:42:39.946420 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:40.366127 kubelet[2046]: E0412 18:42:40.366090 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:43.127000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.127000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001025ec0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.141125 kernel: audit: type=1400 audit(1712947363.127:947): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.141258 kernel: audit: type=1300 audit(1712947363.127:947): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001025ec0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.127000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.132000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.152087 kernel: audit: type=1327 audit(1712947363.127:947): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.152209 kernel: audit: type=1400 audit(1712947363.132:948): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.152233 kernel: audit: type=1300 audit(1712947363.132:948): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001155920 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.132000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001155920 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.158955 kernel: audit: type=1327 audit(1712947363.132:948): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.163803 kernel: audit: type=1400 audit(1712947363.132:949): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.132000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.168323 kernel: audit: type=1300 audit(1712947363.132:949): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011a9ea0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.132000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011a9ea0 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.174209 kernel: audit: type=1327 audit(1712947363.132:949): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.132000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.183317 kernel: audit: type=1400 audit(1712947363.132:950): avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:43.132000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001025f00 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:42:43.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:43.261295 kubelet[2046]: I0412 18:42:43.261256 2046 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:42:43.261655 env[1122]: time="2024-04-12T18:42:43.261623038Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:42:43.261971 kubelet[2046]: I0412 18:42:43.261935 2046 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:42:43.288388 kubelet[2046]: I0412 18:42:43.288343 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:43.294124 systemd[1]: Created slice kubepods-besteffort-podd87e2bea_3178_4ff1_8fdf_411fa748f9cb.slice. Apr 12 18:42:43.313459 kubelet[2046]: I0412 18:42:43.313404 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4htzs\" (UniqueName: \"kubernetes.io/projected/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-kube-api-access-4htzs\") pod \"kube-proxy-2522g\" (UID: \"d87e2bea-3178-4ff1-8fdf-411fa748f9cb\") " pod="kube-system/kube-proxy-2522g" Apr 12 18:42:43.313459 kubelet[2046]: I0412 18:42:43.313446 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-kube-proxy\") pod \"kube-proxy-2522g\" (UID: \"d87e2bea-3178-4ff1-8fdf-411fa748f9cb\") " pod="kube-system/kube-proxy-2522g" Apr 12 18:42:43.313459 kubelet[2046]: I0412 18:42:43.313463 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-xtables-lock\") pod \"kube-proxy-2522g\" (UID: \"d87e2bea-3178-4ff1-8fdf-411fa748f9cb\") " pod="kube-system/kube-proxy-2522g" Apr 12 18:42:43.313681 kubelet[2046]: I0412 18:42:43.313481 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-lib-modules\") pod \"kube-proxy-2522g\" (UID: \"d87e2bea-3178-4ff1-8fdf-411fa748f9cb\") " pod="kube-system/kube-proxy-2522g" Apr 12 18:42:43.419527 kubelet[2046]: E0412 18:42:43.419404 2046 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Apr 12 18:42:43.419527 kubelet[2046]: E0412 18:42:43.419429 2046 projected.go:198] Error preparing data for projected volume kube-api-access-4htzs for pod kube-system/kube-proxy-2522g: configmap "kube-root-ca.crt" not found Apr 12 18:42:43.419527 kubelet[2046]: E0412 18:42:43.419501 2046 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-kube-api-access-4htzs podName:d87e2bea-3178-4ff1-8fdf-411fa748f9cb nodeName:}" failed. No retries permitted until 2024-04-12 18:42:43.91946693 +0000 UTC m=+13.658019689 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-4htzs" (UniqueName: "kubernetes.io/projected/d87e2bea-3178-4ff1-8fdf-411fa748f9cb-kube-api-access-4htzs") pod "kube-proxy-2522g" (UID: "d87e2bea-3178-4ff1-8fdf-411fa748f9cb") : configmap "kube-root-ca.crt" not found Apr 12 18:42:44.066198 kubelet[2046]: E0412 18:42:44.066142 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:44.083136 kubelet[2046]: I0412 18:42:44.083101 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:44.087761 systemd[1]: Created slice kubepods-besteffort-pod2f8b6fc3_0551_4e85_9cb8_6d5780cd6013.slice. Apr 12 18:42:44.120066 kubelet[2046]: I0412 18:42:44.120010 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/2f8b6fc3-0551-4e85-9cb8-6d5780cd6013-var-lib-calico\") pod \"tigera-operator-786dc9d695-6hmfn\" (UID: \"2f8b6fc3-0551-4e85-9cb8-6d5780cd6013\") " pod="tigera-operator/tigera-operator-786dc9d695-6hmfn" Apr 12 18:42:44.120066 kubelet[2046]: I0412 18:42:44.120073 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qsn48\" (UniqueName: \"kubernetes.io/projected/2f8b6fc3-0551-4e85-9cb8-6d5780cd6013-kube-api-access-qsn48\") pod \"tigera-operator-786dc9d695-6hmfn\" (UID: \"2f8b6fc3-0551-4e85-9cb8-6d5780cd6013\") " pod="tigera-operator/tigera-operator-786dc9d695-6hmfn" Apr 12 18:42:44.205342 kubelet[2046]: E0412 18:42:44.205286 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:44.206055 env[1122]: time="2024-04-12T18:42:44.205994654Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2522g,Uid:d87e2bea-3178-4ff1-8fdf-411fa748f9cb,Namespace:kube-system,Attempt:0,}" Apr 12 18:42:44.221222 env[1122]: time="2024-04-12T18:42:44.221135975Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:44.221222 env[1122]: time="2024-04-12T18:42:44.221192027Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:44.221415 env[1122]: time="2024-04-12T18:42:44.221234642Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:44.221609 env[1122]: time="2024-04-12T18:42:44.221526293Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2446f9f966bd524fae880a2e13348becbc89c1bc25972562ec8d110a1e8718e9 pid=2139 runtime=io.containerd.runc.v2 Apr 12 18:42:44.238041 systemd[1]: Started cri-containerd-2446f9f966bd524fae880a2e13348becbc89c1bc25972562ec8d110a1e8718e9.scope. Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.245000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit: BPF prog-id=106 op=LOAD Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2139 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234343666396639363662643532346661653838306132653133333438 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2139 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234343666396639363662643532346661653838306132653133333438 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit: BPF prog-id=107 op=LOAD Apr 12 18:42:44.246000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00039ed30 items=0 ppid=2139 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234343666396639363662643532346661653838306132653133333438 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit: BPF prog-id=108 op=LOAD Apr 12 18:42:44.246000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00039ed78 items=0 ppid=2139 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234343666396639363662643532346661653838306132653133333438 Apr 12 18:42:44.246000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:42:44.246000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { perfmon } for pid=2149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit[2149]: AVC avc: denied { bpf } for pid=2149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.246000 audit: BPF prog-id=109 op=LOAD Apr 12 18:42:44.246000 audit[2149]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00039f188 items=0 ppid=2139 pid=2149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.246000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234343666396639363662643532346661653838306132653133333438 Apr 12 18:42:44.256950 env[1122]: time="2024-04-12T18:42:44.256902000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2522g,Uid:d87e2bea-3178-4ff1-8fdf-411fa748f9cb,Namespace:kube-system,Attempt:0,} returns sandbox id \"2446f9f966bd524fae880a2e13348becbc89c1bc25972562ec8d110a1e8718e9\"" Apr 12 18:42:44.258382 kubelet[2046]: E0412 18:42:44.257918 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:44.260645 env[1122]: time="2024-04-12T18:42:44.260611574Z" level=info msg="CreateContainer within sandbox \"2446f9f966bd524fae880a2e13348becbc89c1bc25972562ec8d110a1e8718e9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:42:44.277344 env[1122]: time="2024-04-12T18:42:44.277262816Z" level=info msg="CreateContainer within sandbox \"2446f9f966bd524fae880a2e13348becbc89c1bc25972562ec8d110a1e8718e9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a8c39c969bf10a8f488322394711965ae642c75f13e3a0482a933842fd27ec8e\"" Apr 12 18:42:44.278823 env[1122]: time="2024-04-12T18:42:44.278788778Z" level=info msg="StartContainer for \"a8c39c969bf10a8f488322394711965ae642c75f13e3a0482a933842fd27ec8e\"" Apr 12 18:42:44.292865 systemd[1]: Started cri-containerd-a8c39c969bf10a8f488322394711965ae642c75f13e3a0482a933842fd27ec8e.scope. Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f3b3e81db18 items=0 ppid=2139 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633339633936396266313061386634383833323233393437313139 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit: BPF prog-id=110 op=LOAD Apr 12 18:42:44.306000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003a6768 items=0 ppid=2139 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633339633936396266313061386634383833323233393437313139 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.306000 audit: BPF prog-id=111 op=LOAD Apr 12 18:42:44.306000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003a67b8 items=0 ppid=2139 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.306000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633339633936396266313061386634383833323233393437313139 Apr 12 18:42:44.307000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:42:44.307000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { perfmon } for pid=2181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit[2181]: AVC avc: denied { bpf } for pid=2181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.307000 audit: BPF prog-id=112 op=LOAD Apr 12 18:42:44.307000 audit[2181]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003a6848 items=0 ppid=2139 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138633339633936396266313061386634383833323233393437313139 Apr 12 18:42:44.321669 env[1122]: time="2024-04-12T18:42:44.320006079Z" level=info msg="StartContainer for \"a8c39c969bf10a8f488322394711965ae642c75f13e3a0482a933842fd27ec8e\" returns successfully" Apr 12 18:42:44.372417 kubelet[2046]: E0412 18:42:44.372379 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:44.375000 audit[2233]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.375000 audit[2233]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffbaadd400 a2=0 a3=7fffbaadd3ec items=0 ppid=2193 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.375000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:42:44.380000 audit[2234]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.380000 audit[2234]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe114d8db0 a2=0 a3=7ffe114d8d9c items=0 ppid=2193 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.380000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:42:44.381000 audit[2235]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.381000 audit[2235]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe79d693c0 a2=0 a3=7ffe79d693ac items=0 ppid=2193 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.381000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:42:44.381000 audit[2236]: NETFILTER_CFG table=nat:41 family=10 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.381000 audit[2236]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce4d7b950 a2=0 a3=7ffce4d7b93c items=0 ppid=2193 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.381000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:42:44.382000 audit[2237]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.382000 audit[2237]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc54c8bd60 a2=0 a3=7ffc54c8bd4c items=0 ppid=2193 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.382000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:42:44.383000 audit[2238]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2238 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.383000 audit[2238]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff6eb89640 a2=0 a3=7fff6eb8962c items=0 ppid=2193 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.383000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:42:44.384984 kubelet[2046]: I0412 18:42:44.384859 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2522g" podStartSLOduration=1.38481692 podCreationTimestamp="2024-04-12 18:42:43 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:42:44.383795645 +0000 UTC m=+14.122348424" watchObservedRunningTime="2024-04-12 18:42:44.38481692 +0000 UTC m=+14.123369690" Apr 12 18:42:44.391366 env[1122]: time="2024-04-12T18:42:44.391310464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-6hmfn,Uid:2f8b6fc3-0551-4e85-9cb8-6d5780cd6013,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:42:44.410119 env[1122]: time="2024-04-12T18:42:44.410047955Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:44.410119 env[1122]: time="2024-04-12T18:42:44.410100189Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:44.410119 env[1122]: time="2024-04-12T18:42:44.410116562Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:44.410443 env[1122]: time="2024-04-12T18:42:44.410391870Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/15e0b57e77abf7c3dcddc792c1c41357e6ebc520963872ea19dc6e2ffcef3823 pid=2247 runtime=io.containerd.runc.v2 Apr 12 18:42:44.421783 systemd[1]: Started cri-containerd-15e0b57e77abf7c3dcddc792c1c41357e6ebc520963872ea19dc6e2ffcef3823.scope. Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.435000 audit: BPF prog-id=113 op=LOAD Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2247 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135653062353765373761626637633364636464633739326331633431 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2247 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135653062353765373761626637633364636464633739326331633431 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit: BPF prog-id=114 op=LOAD Apr 12 18:42:44.436000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024b20 items=0 ppid=2247 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135653062353765373761626637633364636464633739326331633431 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit: BPF prog-id=115 op=LOAD Apr 12 18:42:44.436000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000024b68 items=0 ppid=2247 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135653062353765373761626637633364636464633739326331633431 Apr 12 18:42:44.436000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:42:44.436000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { perfmon } for pid=2257 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit[2257]: AVC avc: denied { bpf } for pid=2257 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:44.436000 audit: BPF prog-id=116 op=LOAD Apr 12 18:42:44.436000 audit[2257]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024f78 items=0 ppid=2247 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.436000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135653062353765373761626637633364636464633739326331633431 Apr 12 18:42:44.457793 env[1122]: time="2024-04-12T18:42:44.457743008Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-6hmfn,Uid:2f8b6fc3-0551-4e85-9cb8-6d5780cd6013,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"15e0b57e77abf7c3dcddc792c1c41357e6ebc520963872ea19dc6e2ffcef3823\"" Apr 12 18:42:44.461044 env[1122]: time="2024-04-12T18:42:44.460242521Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:42:44.477000 audit[2280]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.477000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1ca0aad0 a2=0 a3=7ffe1ca0aabc items=0 ppid=2193 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.477000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:42:44.479000 audit[2282]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.479000 audit[2282]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd8846fa80 a2=0 a3=7ffd8846fa6c items=0 ppid=2193 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.479000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:42:44.482000 audit[2285]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.482000 audit[2285]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd4929dd10 a2=0 a3=7ffd4929dcfc items=0 ppid=2193 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.482000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:42:44.483000 audit[2286]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.483000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce31befb0 a2=0 a3=7ffce31bef9c items=0 ppid=2193 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.483000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:42:44.484000 audit[2288]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.484000 audit[2288]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc6dac210 a2=0 a3=7ffcc6dac1fc items=0 ppid=2193 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.484000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:42:44.485000 audit[2289]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.485000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc1a8fbf40 a2=0 a3=7ffc1a8fbf2c items=0 ppid=2193 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.485000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:42:44.488000 audit[2291]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.488000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff1326f3a0 a2=0 a3=7fff1326f38c items=0 ppid=2193 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.488000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:42:44.491000 audit[2294]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2294 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.491000 audit[2294]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffde1f2b3e0 a2=0 a3=7ffde1f2b3cc items=0 ppid=2193 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.491000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:42:44.492000 audit[2295]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.492000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcf87e64b0 a2=0 a3=7ffcf87e649c items=0 ppid=2193 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.492000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:42:44.494000 audit[2297]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.494000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc69b28f80 a2=0 a3=7ffc69b28f6c items=0 ppid=2193 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.494000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:42:44.495000 audit[2298]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.495000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffc2500c60 a2=0 a3=7fffc2500c4c items=0 ppid=2193 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.495000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:42:44.497000 audit[2300]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.497000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeb9d0d460 a2=0 a3=7ffeb9d0d44c items=0 ppid=2193 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.497000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:42:44.499000 audit[2303]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.499000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd1722d270 a2=0 a3=7ffd1722d25c items=0 ppid=2193 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.499000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:42:44.502000 audit[2306]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.502000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc42fa8870 a2=0 a3=7ffc42fa885c items=0 ppid=2193 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.502000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:42:44.503000 audit[2307]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.503000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffb4c11d30 a2=0 a3=7fffb4c11d1c items=0 ppid=2193 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.503000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:42:44.505000 audit[2309]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.505000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffd307903c0 a2=0 a3=7ffd307903ac items=0 ppid=2193 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.505000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:42:44.507000 audit[2312]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.507000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcc3758ce0 a2=0 a3=7ffcc3758ccc items=0 ppid=2193 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.507000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:42:44.513000 audit[2317]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.513000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc3a96bf40 a2=0 a3=7ffc3a96bf2c items=0 ppid=2193 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.513000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:42:44.515217 kubelet[2046]: E0412 18:42:44.514773 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:44.516000 audit[2319]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:44.516000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffeac89bfd0 a2=0 a3=7ffeac89bfbc items=0 ppid=2193 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:42:44.529000 audit[2321]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:44.529000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc515a5230 a2=0 a3=7ffc515a521c items=0 ppid=2193 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.529000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:44.537000 audit[2321]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2321 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:44.537000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffc515a5230 a2=0 a3=7ffc515a521c items=0 ppid=2193 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.537000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:44.538000 audit[2327]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.538000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe246e7f40 a2=0 a3=7ffe246e7f2c items=0 ppid=2193 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:42:44.540000 audit[2329]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.540000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff6d74d3e0 a2=0 a3=7fff6d74d3cc items=0 ppid=2193 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:42:44.543000 audit[2332]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2332 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.543000 audit[2332]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc05708350 a2=0 a3=7ffc0570833c items=0 ppid=2193 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:42:44.544000 audit[2333]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.544000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc07be910 a2=0 a3=7fffc07be8fc items=0 ppid=2193 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.544000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:42:44.546000 audit[2335]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2335 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.546000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe1e9de150 a2=0 a3=7ffe1e9de13c items=0 ppid=2193 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.546000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:42:44.547000 audit[2336]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.547000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff534ab330 a2=0 a3=7fff534ab31c items=0 ppid=2193 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:42:44.549000 audit[2338]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.549000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffed03f4c40 a2=0 a3=7ffed03f4c2c items=0 ppid=2193 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.549000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:42:44.552000 audit[2341]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2341 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.552000 audit[2341]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffd94f368f0 a2=0 a3=7ffd94f368dc items=0 ppid=2193 pid=2341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.552000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:42:44.553000 audit[2342]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.553000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7361e730 a2=0 a3=7ffd7361e71c items=0 ppid=2193 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.553000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:42:44.555000 audit[2344]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.555000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd956e4fc0 a2=0 a3=7ffd956e4fac items=0 ppid=2193 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:42:44.556000 audit[2345]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2345 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.556000 audit[2345]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc8c0d3480 a2=0 a3=7ffc8c0d346c items=0 ppid=2193 pid=2345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:42:44.558000 audit[2347]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2347 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.558000 audit[2347]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffece552f10 a2=0 a3=7ffece552efc items=0 ppid=2193 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.558000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:42:44.561000 audit[2350]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2350 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.561000 audit[2350]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdf15b7530 a2=0 a3=7ffdf15b751c items=0 ppid=2193 pid=2350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.561000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:42:44.564000 audit[2353]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2353 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.564000 audit[2353]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc6df784f0 a2=0 a3=7ffc6df784dc items=0 ppid=2193 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:42:44.564000 audit[2354]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.564000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc47eda9e0 a2=0 a3=7ffc47eda9cc items=0 ppid=2193 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.564000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:42:44.566000 audit[2356]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.566000 audit[2356]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc9791ba00 a2=0 a3=7ffc9791b9ec items=0 ppid=2193 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.566000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:42:44.569000 audit[2359]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2359 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.569000 audit[2359]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff0ab5bc90 a2=0 a3=7fff0ab5bc7c items=0 ppid=2193 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:42:44.570000 audit[2360]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.570000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff00972c20 a2=0 a3=7fff00972c0c items=0 ppid=2193 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:42:44.573000 audit[2362]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.573000 audit[2362]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffead15cef0 a2=0 a3=7ffead15cedc items=0 ppid=2193 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:44.576000 audit[2365]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.576000 audit[2365]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc7cabfe30 a2=0 a3=7ffc7cabfe1c items=0 ppid=2193 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:42:44.576000 audit[2366]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.576000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbba6a060 a2=0 a3=7ffdbba6a04c items=0 ppid=2193 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:42:44.578000 audit[2368]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2368 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:42:44.578000 audit[2368]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7fff53e60cb0 a2=0 a3=7fff53e60c9c items=0 ppid=2193 pid=2368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:42:44.580000 audit[2370]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:42:44.580000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd5b5eaf30 a2=0 a3=7ffd5b5eaf1c items=0 ppid=2193 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.580000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:44.581000 audit[2370]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:42:44.581000 audit[2370]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd5b5eaf30 a2=0 a3=7ffd5b5eaf1c items=0 ppid=2193 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:44.581000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:47.801300 env[1122]: time="2024-04-12T18:42:47.801245330Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.803646 env[1122]: time="2024-04-12T18:42:47.803615252Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.805602 env[1122]: time="2024-04-12T18:42:47.805551092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.807246 env[1122]: time="2024-04-12T18:42:47.807218992Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.807875 env[1122]: time="2024-04-12T18:42:47.807844733Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:42:47.809664 env[1122]: time="2024-04-12T18:42:47.809617069Z" level=info msg="CreateContainer within sandbox \"15e0b57e77abf7c3dcddc792c1c41357e6ebc520963872ea19dc6e2ffcef3823\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:42:47.823743 env[1122]: time="2024-04-12T18:42:47.823695570Z" level=info msg="CreateContainer within sandbox \"15e0b57e77abf7c3dcddc792c1c41357e6ebc520963872ea19dc6e2ffcef3823\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"41958375d9c7ba6535b15f8463450b2d52ec36dc2c3870f697ced5739b9a26cd\"" Apr 12 18:42:47.824146 env[1122]: time="2024-04-12T18:42:47.824108539Z" level=info msg="StartContainer for \"41958375d9c7ba6535b15f8463450b2d52ec36dc2c3870f697ced5739b9a26cd\"" Apr 12 18:42:47.841102 systemd[1]: Started cri-containerd-41958375d9c7ba6535b15f8463450b2d52ec36dc2c3870f697ced5739b9a26cd.scope. Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit: BPF prog-id=117 op=LOAD Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:47.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393538333735643963376261363533356231356638343633343530 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:47.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393538333735643963376261363533356231356638343633343530 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit: BPF prog-id=118 op=LOAD Apr 12 18:42:47.851000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00030c750 items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:47.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393538333735643963376261363533356231356638343633343530 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.851000 audit: BPF prog-id=119 op=LOAD Apr 12 18:42:47.851000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00030c798 items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:47.851000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393538333735643963376261363533356231356638343633343530 Apr 12 18:42:47.851000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:42:47.852000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:47.852000 audit: BPF prog-id=120 op=LOAD Apr 12 18:42:47.852000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00030cba8 items=0 ppid=2247 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:47.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3431393538333735643963376261363533356231356638343633343530 Apr 12 18:42:47.868191 env[1122]: time="2024-04-12T18:42:47.868130846Z" level=info msg="StartContainer for \"41958375d9c7ba6535b15f8463450b2d52ec36dc2c3870f697ced5739b9a26cd\" returns successfully" Apr 12 18:42:48.819733 systemd[1]: run-containerd-runc-k8s.io-41958375d9c7ba6535b15f8463450b2d52ec36dc2c3870f697ced5739b9a26cd-runc.jNglmP.mount: Deactivated successfully. Apr 12 18:42:49.624131 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 18:42:49.624280 kernel: audit: type=1325 audit(1712947369.619:1062): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.619000 audit[2411]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.619000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcb6611f90 a2=0 a3=7ffcb6611f7c items=0 ppid=2193 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.631929 kernel: audit: type=1300 audit(1712947369.619:1062): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcb6611f90 a2=0 a3=7ffcb6611f7c items=0 ppid=2193 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.631983 kernel: audit: type=1327 audit(1712947369.619:1062): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.632004 kernel: audit: type=1325 audit(1712947369.619:1063): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.619000 audit[2411]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2411 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.619000 audit[2411]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb6611f90 a2=0 a3=0 items=0 ppid=2193 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.638782 kernel: audit: type=1300 audit(1712947369.619:1063): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcb6611f90 a2=0 a3=0 items=0 ppid=2193 pid=2411 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.638834 kernel: audit: type=1327 audit(1712947369.619:1063): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.619000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.629000 audit[2413]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.629000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd330dff00 a2=0 a3=7ffd330dfeec items=0 ppid=2193 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.652601 kernel: audit: type=1325 audit(1712947369.629:1064): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.652647 kernel: audit: type=1300 audit(1712947369.629:1064): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd330dff00 a2=0 a3=7ffd330dfeec items=0 ppid=2193 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.652664 kernel: audit: type=1327 audit(1712947369.629:1064): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.629000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.652000 audit[2413]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.657188 kernel: audit: type=1325 audit(1712947369.652:1065): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2413 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:49.652000 audit[2413]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd330dff00 a2=0 a3=0 items=0 ppid=2193 pid=2413 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:49.652000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:49.752310 kubelet[2046]: I0412 18:42:49.752270 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-6hmfn" podStartSLOduration=2.4033815 podCreationTimestamp="2024-04-12 18:42:44 +0000 UTC" firstStartedPulling="2024-04-12 18:42:44.459296354 +0000 UTC m=+14.197849123" lastFinishedPulling="2024-04-12 18:42:47.808137774 +0000 UTC m=+17.546690543" observedRunningTime="2024-04-12 18:42:48.385778007 +0000 UTC m=+18.124330786" watchObservedRunningTime="2024-04-12 18:42:49.75222292 +0000 UTC m=+19.490775689" Apr 12 18:42:49.752776 kubelet[2046]: I0412 18:42:49.752427 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:49.756683 systemd[1]: Created slice kubepods-besteffort-podd46077be_1311_4fe3_b547_50d776ec9320.slice. Apr 12 18:42:49.803730 kubelet[2046]: I0412 18:42:49.803683 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:49.808349 systemd[1]: Created slice kubepods-besteffort-pod8b1b95e3_d2db_4154_811a_8c9c117289c3.slice. Apr 12 18:42:49.858291 kubelet[2046]: I0412 18:42:49.858247 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-lib-modules\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858291 kubelet[2046]: I0412 18:42:49.858305 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-flexvol-driver-host\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858517 kubelet[2046]: I0412 18:42:49.858384 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-cni-log-dir\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858517 kubelet[2046]: I0412 18:42:49.858412 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-policysync\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858517 kubelet[2046]: I0412 18:42:49.858440 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-cni-net-dir\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858586 kubelet[2046]: I0412 18:42:49.858524 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x85w8\" (UniqueName: \"kubernetes.io/projected/8b1b95e3-d2db-4154-811a-8c9c117289c3-kube-api-access-x85w8\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858586 kubelet[2046]: I0412 18:42:49.858556 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/8b1b95e3-d2db-4154-811a-8c9c117289c3-node-certs\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858586 kubelet[2046]: I0412 18:42:49.858580 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-var-lib-calico\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858680 kubelet[2046]: I0412 18:42:49.858667 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d46077be-1311-4fe3-b547-50d776ec9320-tigera-ca-bundle\") pod \"calico-typha-745549668b-cjk2k\" (UID: \"d46077be-1311-4fe3-b547-50d776ec9320\") " pod="calico-system/calico-typha-745549668b-cjk2k" Apr 12 18:42:49.858711 kubelet[2046]: I0412 18:42:49.858696 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-xtables-lock\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858762 kubelet[2046]: I0412 18:42:49.858744 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-var-run-calico\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858788 kubelet[2046]: I0412 18:42:49.858780 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/8b1b95e3-d2db-4154-811a-8c9c117289c3-cni-bin-dir\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.858813 kubelet[2046]: I0412 18:42:49.858806 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d46077be-1311-4fe3-b547-50d776ec9320-typha-certs\") pod \"calico-typha-745549668b-cjk2k\" (UID: \"d46077be-1311-4fe3-b547-50d776ec9320\") " pod="calico-system/calico-typha-745549668b-cjk2k" Apr 12 18:42:49.858841 kubelet[2046]: I0412 18:42:49.858829 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-prjwd\" (UniqueName: \"kubernetes.io/projected/d46077be-1311-4fe3-b547-50d776ec9320-kube-api-access-prjwd\") pod \"calico-typha-745549668b-cjk2k\" (UID: \"d46077be-1311-4fe3-b547-50d776ec9320\") " pod="calico-system/calico-typha-745549668b-cjk2k" Apr 12 18:42:49.858867 kubelet[2046]: I0412 18:42:49.858857 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/8b1b95e3-d2db-4154-811a-8c9c117289c3-tigera-ca-bundle\") pod \"calico-node-vd95g\" (UID: \"8b1b95e3-d2db-4154-811a-8c9c117289c3\") " pod="calico-system/calico-node-vd95g" Apr 12 18:42:49.916041 kubelet[2046]: I0412 18:42:49.915925 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:42:49.916205 kubelet[2046]: E0412 18:42:49.916197 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:42:49.960108 kubelet[2046]: I0412 18:42:49.960069 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/5bc50be2-c8a7-46d0-8144-d6770bdc0466-kubelet-dir\") pod \"csi-node-driver-7fg2s\" (UID: \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\") " pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:42:49.960405 kubelet[2046]: I0412 18:42:49.960389 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/5bc50be2-c8a7-46d0-8144-d6770bdc0466-registration-dir\") pod \"csi-node-driver-7fg2s\" (UID: \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\") " pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:42:49.960526 kubelet[2046]: I0412 18:42:49.960509 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/5bc50be2-c8a7-46d0-8144-d6770bdc0466-varrun\") pod \"csi-node-driver-7fg2s\" (UID: \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\") " pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:42:49.960673 kubelet[2046]: I0412 18:42:49.960657 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/5bc50be2-c8a7-46d0-8144-d6770bdc0466-socket-dir\") pod \"csi-node-driver-7fg2s\" (UID: \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\") " pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:42:49.960842 kubelet[2046]: I0412 18:42:49.960826 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l4ms9\" (UniqueName: \"kubernetes.io/projected/5bc50be2-c8a7-46d0-8144-d6770bdc0466-kube-api-access-l4ms9\") pod \"csi-node-driver-7fg2s\" (UID: \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\") " pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:42:49.971813 kubelet[2046]: E0412 18:42:49.971785 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.971813 kubelet[2046]: W0412 18:42:49.971805 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.972015 kubelet[2046]: E0412 18:42:49.971836 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.978768 kubelet[2046]: E0412 18:42:49.978739 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.978768 kubelet[2046]: W0412 18:42:49.978756 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.978940 kubelet[2046]: E0412 18:42:49.978817 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.979156 kubelet[2046]: E0412 18:42:49.979144 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.979156 kubelet[2046]: W0412 18:42:49.979153 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.979282 kubelet[2046]: E0412 18:42:49.979234 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.979443 kubelet[2046]: E0412 18:42:49.979430 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.979443 kubelet[2046]: W0412 18:42:49.979441 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.979538 kubelet[2046]: E0412 18:42:49.979483 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.979682 kubelet[2046]: E0412 18:42:49.979670 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.979682 kubelet[2046]: W0412 18:42:49.979679 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.979841 kubelet[2046]: E0412 18:42:49.979718 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.980000 kubelet[2046]: E0412 18:42:49.979987 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.980000 kubelet[2046]: W0412 18:42:49.979997 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.980109 kubelet[2046]: E0412 18:42:49.980032 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980211 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.980684 kubelet[2046]: W0412 18:42:49.980220 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980299 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980364 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.980684 kubelet[2046]: W0412 18:42:49.980369 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980455 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980519 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.980684 kubelet[2046]: W0412 18:42:49.980528 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980556 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.980684 kubelet[2046]: E0412 18:42:49.980676 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.981012 kubelet[2046]: W0412 18:42:49.980684 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.981012 kubelet[2046]: E0412 18:42:49.980777 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.981012 kubelet[2046]: E0412 18:42:49.980955 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.981012 kubelet[2046]: W0412 18:42:49.980964 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.981012 kubelet[2046]: E0412 18:42:49.980983 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.981127 kubelet[2046]: E0412 18:42:49.981113 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.981127 kubelet[2046]: W0412 18:42:49.981120 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.981171 kubelet[2046]: E0412 18:42:49.981132 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:49.981325 kubelet[2046]: E0412 18:42:49.981303 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:49.981325 kubelet[2046]: W0412 18:42:49.981323 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:49.981399 kubelet[2046]: E0412 18:42:49.981333 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.061697 kubelet[2046]: E0412 18:42:50.061665 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.061697 kubelet[2046]: W0412 18:42:50.061687 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.061926 kubelet[2046]: E0412 18:42:50.061714 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.061926 kubelet[2046]: E0412 18:42:50.061903 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.061926 kubelet[2046]: W0412 18:42:50.061912 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.061926 kubelet[2046]: E0412 18:42:50.061926 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.062080 kubelet[2046]: E0412 18:42:50.062065 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.062121 kubelet[2046]: W0412 18:42:50.062087 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.062121 kubelet[2046]: E0412 18:42:50.062101 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.062282 kubelet[2046]: E0412 18:42:50.062270 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.062282 kubelet[2046]: W0412 18:42:50.062280 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.062371 kubelet[2046]: E0412 18:42:50.062296 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.062473 kubelet[2046]: E0412 18:42:50.062460 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.062473 kubelet[2046]: W0412 18:42:50.062473 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.062546 kubelet[2046]: E0412 18:42:50.062487 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.062701 kubelet[2046]: E0412 18:42:50.062677 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.062701 kubelet[2046]: W0412 18:42:50.062700 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.062793 kubelet[2046]: E0412 18:42:50.062717 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.062886 kubelet[2046]: E0412 18:42:50.062874 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.062972 kubelet[2046]: W0412 18:42:50.062945 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.062972 kubelet[2046]: E0412 18:42:50.062970 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063115 kubelet[2046]: E0412 18:42:50.063103 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063115 kubelet[2046]: W0412 18:42:50.063114 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063213 kubelet[2046]: E0412 18:42:50.063129 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063282 kubelet[2046]: E0412 18:42:50.063269 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063282 kubelet[2046]: W0412 18:42:50.063279 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063353 kubelet[2046]: E0412 18:42:50.063314 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063440 kubelet[2046]: E0412 18:42:50.063429 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063525 kubelet[2046]: W0412 18:42:50.063504 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063609 kubelet[2046]: E0412 18:42:50.063576 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063675 kubelet[2046]: E0412 18:42:50.063655 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063675 kubelet[2046]: W0412 18:42:50.063665 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063783 kubelet[2046]: E0412 18:42:50.063715 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063814 kubelet[2046]: E0412 18:42:50.063792 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063814 kubelet[2046]: W0412 18:42:50.063797 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063880 kubelet[2046]: E0412 18:42:50.063849 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.063955 kubelet[2046]: E0412 18:42:50.063925 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.063955 kubelet[2046]: W0412 18:42:50.063936 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.063955 kubelet[2046]: E0412 18:42:50.063946 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064116 kubelet[2046]: E0412 18:42:50.064096 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064116 kubelet[2046]: W0412 18:42:50.064106 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064116 kubelet[2046]: E0412 18:42:50.064115 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064277 kubelet[2046]: E0412 18:42:50.064247 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064277 kubelet[2046]: W0412 18:42:50.064254 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064277 kubelet[2046]: E0412 18:42:50.064266 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064416 kubelet[2046]: E0412 18:42:50.064402 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064416 kubelet[2046]: W0412 18:42:50.064410 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064416 kubelet[2046]: E0412 18:42:50.064419 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064556 kubelet[2046]: E0412 18:42:50.064518 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064556 kubelet[2046]: W0412 18:42:50.064524 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064556 kubelet[2046]: E0412 18:42:50.064534 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064654 kubelet[2046]: E0412 18:42:50.064640 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064654 kubelet[2046]: W0412 18:42:50.064646 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064654 kubelet[2046]: E0412 18:42:50.064654 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064793 kubelet[2046]: E0412 18:42:50.064779 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064793 kubelet[2046]: W0412 18:42:50.064787 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064793 kubelet[2046]: E0412 18:42:50.064797 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.064931 kubelet[2046]: E0412 18:42:50.064899 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.064931 kubelet[2046]: W0412 18:42:50.064904 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.064931 kubelet[2046]: E0412 18:42:50.064914 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.065065 kubelet[2046]: E0412 18:42:50.065051 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.065065 kubelet[2046]: W0412 18:42:50.065060 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.065175 kubelet[2046]: E0412 18:42:50.065106 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.065238 kubelet[2046]: E0412 18:42:50.065233 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.065274 kubelet[2046]: W0412 18:42:50.065240 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.065274 kubelet[2046]: E0412 18:42:50.065249 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.065362 kubelet[2046]: E0412 18:42:50.065343 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.065434 kubelet[2046]: W0412 18:42:50.065365 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.065434 kubelet[2046]: E0412 18:42:50.065374 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.065636 kubelet[2046]: E0412 18:42:50.065621 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.065729 kubelet[2046]: W0412 18:42:50.065711 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.065833 kubelet[2046]: E0412 18:42:50.065820 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.066265 kubelet[2046]: E0412 18:42:50.066250 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.066492 kubelet[2046]: W0412 18:42:50.066474 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.066555 kubelet[2046]: E0412 18:42:50.066497 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.067150 kubelet[2046]: E0412 18:42:50.067135 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:50.067871 env[1122]: time="2024-04-12T18:42:50.067831249Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-745549668b-cjk2k,Uid:d46077be-1311-4fe3-b547-50d776ec9320,Namespace:calico-system,Attempt:0,}" Apr 12 18:42:50.075979 kubelet[2046]: E0412 18:42:50.075947 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:50.075979 kubelet[2046]: W0412 18:42:50.075967 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:50.076145 kubelet[2046]: E0412 18:42:50.075995 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:50.110581 kubelet[2046]: E0412 18:42:50.110552 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:50.111021 env[1122]: time="2024-04-12T18:42:50.110980749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vd95g,Uid:8b1b95e3-d2db-4154-811a-8c9c117289c3,Namespace:calico-system,Attempt:0,}" Apr 12 18:42:50.112394 env[1122]: time="2024-04-12T18:42:50.112338552Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:50.112490 env[1122]: time="2024-04-12T18:42:50.112377409Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:50.112490 env[1122]: time="2024-04-12T18:42:50.112387118Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:50.112681 env[1122]: time="2024-04-12T18:42:50.112649907Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57b6810befce7136ba8e2eff00e1f91dec91f70ff9eff864b4e5f5741543b475 pid=2465 runtime=io.containerd.runc.v2 Apr 12 18:42:50.129195 systemd[1]: Started cri-containerd-57b6810befce7136ba8e2eff00e1f91dec91f70ff9eff864b4e5f5741543b475.scope. Apr 12 18:42:50.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit: BPF prog-id=121 op=LOAD Apr 12 18:42:50.142000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.142000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623638313062656663653731333662613865326566663030653166 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623638313062656663653731333662613865326566663030653166 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.143000 audit: BPF prog-id=122 op=LOAD Apr 12 18:42:50.143000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00039ef90 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623638313062656663653731333662613865326566663030653166 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.144000 audit: BPF prog-id=123 op=LOAD Apr 12 18:42:50.144000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00039efd8 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623638313062656663653731333662613865326566663030653166 Apr 12 18:42:50.144000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:42:50.144000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { perfmon } for pid=2475 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit[2475]: AVC avc: denied { bpf } for pid=2475 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.145000 audit: BPF prog-id=124 op=LOAD Apr 12 18:42:50.145000 audit[2475]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00039f3e8 items=0 ppid=2465 pid=2475 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.145000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537623638313062656663653731333662613865326566663030653166 Apr 12 18:42:50.151957 env[1122]: time="2024-04-12T18:42:50.151862307Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:50.152140 env[1122]: time="2024-04-12T18:42:50.151985140Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:50.152140 env[1122]: time="2024-04-12T18:42:50.152019929Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:50.152455 env[1122]: time="2024-04-12T18:42:50.152392555Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b pid=2501 runtime=io.containerd.runc.v2 Apr 12 18:42:50.162960 systemd[1]: Started cri-containerd-a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b.scope. Apr 12 18:42:50.178154 env[1122]: time="2024-04-12T18:42:50.178020420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-745549668b-cjk2k,Uid:d46077be-1311-4fe3-b547-50d776ec9320,Namespace:calico-system,Attempt:0,} returns sandbox id \"57b6810befce7136ba8e2eff00e1f91dec91f70ff9eff864b4e5f5741543b475\"" Apr 12 18:42:50.179721 kubelet[2046]: E0412 18:42:50.179140 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:50.181100 env[1122]: time="2024-04-12T18:42:50.180414221Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.186000 audit: BPF prog-id=125 op=LOAD Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653231323031393034643732616133636239646137366139356663 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653231323031393034643732616133636239646137366139356663 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit: BPF prog-id=126 op=LOAD Apr 12 18:42:50.187000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a16d0 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653231323031393034643732616133636239646137366139356663 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit: BPF prog-id=127 op=LOAD Apr 12 18:42:50.187000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a1718 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653231323031393034643732616133636239646137366139356663 Apr 12 18:42:50.187000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:42:50.187000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:50.187000 audit: BPF prog-id=128 op=LOAD Apr 12 18:42:50.187000 audit[2511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a1b28 items=0 ppid=2501 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.187000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134653231323031393034643732616133636239646137366139356663 Apr 12 18:42:50.202188 env[1122]: time="2024-04-12T18:42:50.202119804Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vd95g,Uid:8b1b95e3-d2db-4154-811a-8c9c117289c3,Namespace:calico-system,Attempt:0,} returns sandbox id \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\"" Apr 12 18:42:50.203210 kubelet[2046]: E0412 18:42:50.203004 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:50.657000 audit[2541]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:50.657000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffd4a4ede90 a2=0 a3=7ffd4a4ede7c items=0 ppid=2193 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:50.657000 audit[2541]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:50.657000 audit[2541]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd4a4ede90 a2=0 a3=0 items=0 ppid=2193 pid=2541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:50.657000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:51.347527 kubelet[2046]: E0412 18:42:51.347021 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:42:52.033974 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2235103825.mount: Deactivated successfully. Apr 12 18:42:53.310417 env[1122]: time="2024-04-12T18:42:53.310354983Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:53.313738 env[1122]: time="2024-04-12T18:42:53.313698119Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:53.316407 env[1122]: time="2024-04-12T18:42:53.316371595Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:53.319613 env[1122]: time="2024-04-12T18:42:53.319575536Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:53.319993 env[1122]: time="2024-04-12T18:42:53.319948100Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:42:53.322498 env[1122]: time="2024-04-12T18:42:53.322453695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:42:53.346535 kubelet[2046]: E0412 18:42:53.346493 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:42:53.346966 env[1122]: time="2024-04-12T18:42:53.346917633Z" level=info msg="CreateContainer within sandbox \"57b6810befce7136ba8e2eff00e1f91dec91f70ff9eff864b4e5f5741543b475\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:42:53.365301 env[1122]: time="2024-04-12T18:42:53.365235044Z" level=info msg="CreateContainer within sandbox \"57b6810befce7136ba8e2eff00e1f91dec91f70ff9eff864b4e5f5741543b475\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"0dd47a006f0a00dac378ae56c27224ebce38904f9bf018b0af8e429b07903e53\"" Apr 12 18:42:53.366154 env[1122]: time="2024-04-12T18:42:53.366113785Z" level=info msg="StartContainer for \"0dd47a006f0a00dac378ae56c27224ebce38904f9bf018b0af8e429b07903e53\"" Apr 12 18:42:53.394080 systemd[1]: Started cri-containerd-0dd47a006f0a00dac378ae56c27224ebce38904f9bf018b0af8e429b07903e53.scope. Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.403000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit: BPF prog-id=129 op=LOAD Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2465 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064643437613030366630613030646163333738616535366332373232 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2465 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064643437613030366630613030646163333738616535366332373232 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit: BPF prog-id=130 op=LOAD Apr 12 18:42:53.404000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000269d10 items=0 ppid=2465 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064643437613030366630613030646163333738616535366332373232 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit: BPF prog-id=131 op=LOAD Apr 12 18:42:53.404000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000269d58 items=0 ppid=2465 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064643437613030366630613030646163333738616535366332373232 Apr 12 18:42:53.404000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:42:53.404000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { perfmon } for pid=2550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit[2550]: AVC avc: denied { bpf } for pid=2550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:53.404000 audit: BPF prog-id=132 op=LOAD Apr 12 18:42:53.404000 audit[2550]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003d0168 items=0 ppid=2465 pid=2550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:53.404000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3064643437613030366630613030646163333738616535366332373232 Apr 12 18:42:53.430354 env[1122]: time="2024-04-12T18:42:53.430303494Z" level=info msg="StartContainer for \"0dd47a006f0a00dac378ae56c27224ebce38904f9bf018b0af8e429b07903e53\" returns successfully" Apr 12 18:42:54.339314 systemd[1]: run-containerd-runc-k8s.io-0dd47a006f0a00dac378ae56c27224ebce38904f9bf018b0af8e429b07903e53-runc.DnKTen.mount: Deactivated successfully. Apr 12 18:42:54.392885 kubelet[2046]: E0412 18:42:54.392851 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:54.400553 kubelet[2046]: I0412 18:42:54.400520 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-745549668b-cjk2k" podStartSLOduration=2.259386313 podCreationTimestamp="2024-04-12 18:42:49 +0000 UTC" firstStartedPulling="2024-04-12 18:42:50.180123386 +0000 UTC m=+19.918676155" lastFinishedPulling="2024-04-12 18:42:53.32121257 +0000 UTC m=+23.059765339" observedRunningTime="2024-04-12 18:42:54.399970372 +0000 UTC m=+24.138523141" watchObservedRunningTime="2024-04-12 18:42:54.400475497 +0000 UTC m=+24.139028256" Apr 12 18:42:54.484040 kubelet[2046]: E0412 18:42:54.484011 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484040 kubelet[2046]: W0412 18:42:54.484030 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484040 kubelet[2046]: E0412 18:42:54.484048 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.484312 kubelet[2046]: E0412 18:42:54.484219 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484312 kubelet[2046]: W0412 18:42:54.484226 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484312 kubelet[2046]: E0412 18:42:54.484236 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.484420 kubelet[2046]: E0412 18:42:54.484386 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484420 kubelet[2046]: W0412 18:42:54.484394 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484420 kubelet[2046]: E0412 18:42:54.484407 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.484571 kubelet[2046]: E0412 18:42:54.484560 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484571 kubelet[2046]: W0412 18:42:54.484567 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484666 kubelet[2046]: E0412 18:42:54.484575 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.484703 kubelet[2046]: E0412 18:42:54.484680 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484703 kubelet[2046]: W0412 18:42:54.484684 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484703 kubelet[2046]: E0412 18:42:54.484692 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.484821 kubelet[2046]: E0412 18:42:54.484809 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.484862 kubelet[2046]: W0412 18:42:54.484819 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.484862 kubelet[2046]: E0412 18:42:54.484841 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485024 kubelet[2046]: E0412 18:42:54.485006 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485024 kubelet[2046]: W0412 18:42:54.485014 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485024 kubelet[2046]: E0412 18:42:54.485022 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485161 kubelet[2046]: E0412 18:42:54.485150 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485161 kubelet[2046]: W0412 18:42:54.485159 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485244 kubelet[2046]: E0412 18:42:54.485170 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485335 kubelet[2046]: E0412 18:42:54.485313 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485335 kubelet[2046]: W0412 18:42:54.485322 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485335 kubelet[2046]: E0412 18:42:54.485333 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485480 kubelet[2046]: E0412 18:42:54.485469 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485480 kubelet[2046]: W0412 18:42:54.485477 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485550 kubelet[2046]: E0412 18:42:54.485485 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485639 kubelet[2046]: E0412 18:42:54.485630 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485639 kubelet[2046]: W0412 18:42:54.485637 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485710 kubelet[2046]: E0412 18:42:54.485645 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.485763 kubelet[2046]: E0412 18:42:54.485754 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.485763 kubelet[2046]: W0412 18:42:54.485761 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.485824 kubelet[2046]: E0412 18:42:54.485775 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495029 kubelet[2046]: E0412 18:42:54.495011 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495029 kubelet[2046]: W0412 18:42:54.495023 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.495123 kubelet[2046]: E0412 18:42:54.495037 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495251 kubelet[2046]: E0412 18:42:54.495236 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495251 kubelet[2046]: W0412 18:42:54.495247 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.495306 kubelet[2046]: E0412 18:42:54.495263 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495425 kubelet[2046]: E0412 18:42:54.495413 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495425 kubelet[2046]: W0412 18:42:54.495425 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.495508 kubelet[2046]: E0412 18:42:54.495437 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495627 kubelet[2046]: E0412 18:42:54.495615 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495676 kubelet[2046]: W0412 18:42:54.495627 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.495676 kubelet[2046]: E0412 18:42:54.495654 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495819 kubelet[2046]: E0412 18:42:54.495807 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495819 kubelet[2046]: W0412 18:42:54.495818 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.495891 kubelet[2046]: E0412 18:42:54.495836 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.495998 kubelet[2046]: E0412 18:42:54.495984 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.495998 kubelet[2046]: W0412 18:42:54.495995 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.496097 kubelet[2046]: E0412 18:42:54.496014 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.496224 kubelet[2046]: E0412 18:42:54.496210 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.496224 kubelet[2046]: W0412 18:42:54.496220 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.496307 kubelet[2046]: E0412 18:42:54.496236 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.496465 kubelet[2046]: E0412 18:42:54.496454 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.496465 kubelet[2046]: W0412 18:42:54.496465 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.496539 kubelet[2046]: E0412 18:42:54.496479 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.496711 kubelet[2046]: E0412 18:42:54.496656 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.496711 kubelet[2046]: W0412 18:42:54.496668 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.496711 kubelet[2046]: E0412 18:42:54.496693 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.496839 kubelet[2046]: E0412 18:42:54.496821 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.496839 kubelet[2046]: W0412 18:42:54.496834 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.496959 kubelet[2046]: E0412 18:42:54.496926 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497007 kubelet[2046]: E0412 18:42:54.496961 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497007 kubelet[2046]: W0412 18:42:54.496970 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.497007 kubelet[2046]: E0412 18:42:54.496986 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497162 kubelet[2046]: E0412 18:42:54.497148 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497162 kubelet[2046]: W0412 18:42:54.497159 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.497284 kubelet[2046]: E0412 18:42:54.497170 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497359 kubelet[2046]: E0412 18:42:54.497346 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497359 kubelet[2046]: W0412 18:42:54.497355 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.497468 kubelet[2046]: E0412 18:42:54.497368 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497602 kubelet[2046]: E0412 18:42:54.497581 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497602 kubelet[2046]: W0412 18:42:54.497596 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.497694 kubelet[2046]: E0412 18:42:54.497610 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497775 kubelet[2046]: E0412 18:42:54.497761 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497775 kubelet[2046]: W0412 18:42:54.497771 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.497886 kubelet[2046]: E0412 18:42:54.497784 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.497961 kubelet[2046]: E0412 18:42:54.497951 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.497961 kubelet[2046]: W0412 18:42:54.497961 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.498082 kubelet[2046]: E0412 18:42:54.497978 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.498220 kubelet[2046]: E0412 18:42:54.498204 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.498220 kubelet[2046]: W0412 18:42:54.498215 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.498336 kubelet[2046]: E0412 18:42:54.498232 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:54.498381 kubelet[2046]: E0412 18:42:54.498360 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:54.498381 kubelet[2046]: W0412 18:42:54.498366 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:54.498381 kubelet[2046]: E0412 18:42:54.498374 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.346850 kubelet[2046]: E0412 18:42:55.346805 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:42:55.393397 kubelet[2046]: I0412 18:42:55.393371 2046 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:42:55.393873 kubelet[2046]: E0412 18:42:55.393860 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:55.494335 kubelet[2046]: E0412 18:42:55.494303 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.494335 kubelet[2046]: W0412 18:42:55.494326 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.494530 kubelet[2046]: E0412 18:42:55.494382 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.494630 kubelet[2046]: E0412 18:42:55.494615 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.494630 kubelet[2046]: W0412 18:42:55.494628 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.494711 kubelet[2046]: E0412 18:42:55.494642 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.494821 kubelet[2046]: E0412 18:42:55.494807 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.494821 kubelet[2046]: W0412 18:42:55.494817 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.494899 kubelet[2046]: E0412 18:42:55.494828 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495072 kubelet[2046]: E0412 18:42:55.495048 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495072 kubelet[2046]: W0412 18:42:55.495057 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495072 kubelet[2046]: E0412 18:42:55.495066 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495339 kubelet[2046]: E0412 18:42:55.495203 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495339 kubelet[2046]: W0412 18:42:55.495210 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495339 kubelet[2046]: E0412 18:42:55.495218 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495339 kubelet[2046]: E0412 18:42:55.495335 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495339 kubelet[2046]: W0412 18:42:55.495342 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495462 kubelet[2046]: E0412 18:42:55.495353 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495539 kubelet[2046]: E0412 18:42:55.495524 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495539 kubelet[2046]: W0412 18:42:55.495535 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495612 kubelet[2046]: E0412 18:42:55.495546 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495669 kubelet[2046]: E0412 18:42:55.495656 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495669 kubelet[2046]: W0412 18:42:55.495665 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495720 kubelet[2046]: E0412 18:42:55.495674 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495790 kubelet[2046]: E0412 18:42:55.495775 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495790 kubelet[2046]: W0412 18:42:55.495783 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495790 kubelet[2046]: E0412 18:42:55.495791 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.495918 kubelet[2046]: E0412 18:42:55.495903 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.495918 kubelet[2046]: W0412 18:42:55.495912 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.495918 kubelet[2046]: E0412 18:42:55.495921 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.496053 kubelet[2046]: E0412 18:42:55.496036 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.496104 kubelet[2046]: W0412 18:42:55.496056 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.496104 kubelet[2046]: E0412 18:42:55.496067 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.496301 kubelet[2046]: E0412 18:42:55.496275 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.496301 kubelet[2046]: W0412 18:42:55.496298 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.496403 kubelet[2046]: E0412 18:42:55.496327 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.503501 kubelet[2046]: E0412 18:42:55.503477 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.503501 kubelet[2046]: W0412 18:42:55.503488 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.503501 kubelet[2046]: E0412 18:42:55.503499 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.503704 kubelet[2046]: E0412 18:42:55.503685 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.503704 kubelet[2046]: W0412 18:42:55.503694 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.503770 kubelet[2046]: E0412 18:42:55.503709 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.503954 kubelet[2046]: E0412 18:42:55.503933 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.503954 kubelet[2046]: W0412 18:42:55.503945 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.503954 kubelet[2046]: E0412 18:42:55.503965 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.504170 kubelet[2046]: E0412 18:42:55.504153 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.504170 kubelet[2046]: W0412 18:42:55.504165 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.504268 kubelet[2046]: E0412 18:42:55.504191 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.504344 kubelet[2046]: E0412 18:42:55.504328 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.504344 kubelet[2046]: W0412 18:42:55.504339 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.504409 kubelet[2046]: E0412 18:42:55.504352 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.504482 kubelet[2046]: E0412 18:42:55.504469 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.504482 kubelet[2046]: W0412 18:42:55.504479 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.504545 kubelet[2046]: E0412 18:42:55.504491 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.504737 kubelet[2046]: E0412 18:42:55.504719 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.504737 kubelet[2046]: W0412 18:42:55.504730 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.504825 kubelet[2046]: E0412 18:42:55.504743 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.505012 kubelet[2046]: E0412 18:42:55.504982 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.505012 kubelet[2046]: W0412 18:42:55.505006 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.505149 kubelet[2046]: E0412 18:42:55.505050 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.505329 kubelet[2046]: E0412 18:42:55.505313 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.505329 kubelet[2046]: W0412 18:42:55.505323 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.505417 kubelet[2046]: E0412 18:42:55.505389 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.505494 kubelet[2046]: E0412 18:42:55.505480 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.505494 kubelet[2046]: W0412 18:42:55.505488 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.505588 kubelet[2046]: E0412 18:42:55.505524 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.505673 kubelet[2046]: E0412 18:42:55.505660 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.505673 kubelet[2046]: W0412 18:42:55.505668 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.505752 kubelet[2046]: E0412 18:42:55.505684 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.505867 kubelet[2046]: E0412 18:42:55.505850 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.505867 kubelet[2046]: W0412 18:42:55.505863 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.505932 kubelet[2046]: E0412 18:42:55.505880 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.506072 kubelet[2046]: E0412 18:42:55.506060 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.506072 kubelet[2046]: W0412 18:42:55.506070 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.506171 kubelet[2046]: E0412 18:42:55.506082 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.506462 kubelet[2046]: E0412 18:42:55.506451 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.506462 kubelet[2046]: W0412 18:42:55.506459 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.506544 kubelet[2046]: E0412 18:42:55.506475 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.506646 kubelet[2046]: E0412 18:42:55.506634 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.506646 kubelet[2046]: W0412 18:42:55.506642 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.506710 kubelet[2046]: E0412 18:42:55.506652 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.506797 kubelet[2046]: E0412 18:42:55.506783 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.506797 kubelet[2046]: W0412 18:42:55.506791 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.506797 kubelet[2046]: E0412 18:42:55.506799 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.506965 kubelet[2046]: E0412 18:42:55.506955 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.506965 kubelet[2046]: W0412 18:42:55.506962 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.507026 kubelet[2046]: E0412 18:42:55.506971 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.507250 kubelet[2046]: E0412 18:42:55.507235 2046 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:42:55.507250 kubelet[2046]: W0412 18:42:55.507244 2046 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:42:55.507250 kubelet[2046]: E0412 18:42:55.507253 2046 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:42:55.664530 env[1122]: time="2024-04-12T18:42:55.664379979Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.667413 env[1122]: time="2024-04-12T18:42:55.667356772Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.669631 env[1122]: time="2024-04-12T18:42:55.669580554Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.671619 env[1122]: time="2024-04-12T18:42:55.671583121Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:55.672686 env[1122]: time="2024-04-12T18:42:55.672647685Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:42:55.675207 env[1122]: time="2024-04-12T18:42:55.675144484Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:42:55.687047 env[1122]: time="2024-04-12T18:42:55.687004572Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46\"" Apr 12 18:42:55.687672 env[1122]: time="2024-04-12T18:42:55.687618048Z" level=info msg="StartContainer for \"7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46\"" Apr 12 18:42:55.707469 systemd[1]: Started cri-containerd-7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46.scope. Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.721677 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:42:55.721754 kernel: audit: type=1400 audit(1712947375.720:1122): avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa24c2376c8 items=0 ppid=2501 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.733262 kernel: audit: type=1300 audit(1712947375.720:1122): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fa24c2376c8 items=0 ppid=2501 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.733461 kernel: audit: type=1327 audit(1712947375.720:1122): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763626163653235613939363332303138623762643062646636656336 Apr 12 18:42:55.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763626163653235613939363332303138623762643062646636656336 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.736694 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.736754 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.742756 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.745908 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.748940 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.748973 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.755341 kernel: audit: type=1400 audit(1712947375.720:1123): avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.755441 env[1122]: time="2024-04-12T18:42:55.754863693Z" level=info msg="StartContainer for \"7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46\" returns successfully" Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.720000 audit: BPF prog-id=133 op=LOAD Apr 12 18:42:55.720000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000271ba8 items=0 ppid=2501 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.720000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763626163653235613939363332303138623762643062646636656336 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.729000 audit: BPF prog-id=134 op=LOAD Apr 12 18:42:55.729000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000271bf8 items=0 ppid=2501 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.729000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763626163653235613939363332303138623762643062646636656336 Apr 12 18:42:55.733000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:42:55.733000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { perfmon } for pid=2653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit[2653]: AVC avc: denied { bpf } for pid=2653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:55.733000 audit: BPF prog-id=135 op=LOAD Apr 12 18:42:55.733000 audit[2653]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000271c88 items=0 ppid=2501 pid=2653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:55.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763626163653235613939363332303138623762643062646636656336 Apr 12 18:42:55.762207 systemd[1]: cri-containerd-7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46.scope: Deactivated successfully. Apr 12 18:42:55.767000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:42:55.780683 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46-rootfs.mount: Deactivated successfully. Apr 12 18:42:56.397130 kubelet[2046]: E0412 18:42:56.397073 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:56.398920 env[1122]: time="2024-04-12T18:42:56.398851688Z" level=info msg="shim disconnected" id=7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46 Apr 12 18:42:56.398920 env[1122]: time="2024-04-12T18:42:56.398907658Z" level=warning msg="cleaning up after shim disconnected" id=7cbace25a99632018b7bd0bdf6ec6b2beeccf177ee56bf50b952ca66a3969b46 namespace=k8s.io Apr 12 18:42:56.399041 env[1122]: time="2024-04-12T18:42:56.398921956Z" level=info msg="cleaning up dead shim" Apr 12 18:42:56.406477 env[1122]: time="2024-04-12T18:42:56.406409485Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:42:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2692 runtime=io.containerd.runc.v2\n" Apr 12 18:42:57.346386 kubelet[2046]: E0412 18:42:57.346337 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:42:57.399213 kubelet[2046]: E0412 18:42:57.399170 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:57.400170 env[1122]: time="2024-04-12T18:42:57.400095719Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:42:57.792258 kubelet[2046]: I0412 18:42:57.792223 2046 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:42:57.793203 kubelet[2046]: E0412 18:42:57.793170 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:57.826000 audit[2709]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:57.826000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffc34c893f0 a2=0 a3=7ffc34c893dc items=0 ppid=2193 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:57.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:57.826000 audit[2709]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:57.826000 audit[2709]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc34c893f0 a2=0 a3=7ffc34c893dc items=0 ppid=2193 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:57.826000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:58.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.14:22-10.0.0.1:52158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:58.150755 systemd[1]: Started sshd@9-10.0.0.14:22-10.0.0.1:52158.service. Apr 12 18:42:58.191000 audit[2711]: USER_ACCT pid=2711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.192558 sshd[2711]: Accepted publickey for core from 10.0.0.1 port 52158 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:58.192000 audit[2711]: CRED_ACQ pid=2711 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.192000 audit[2711]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49bffe30 a2=3 a3=0 items=0 ppid=1 pid=2711 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:58.192000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:58.193668 sshd[2711]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:58.197623 systemd-logind[1104]: New session 10 of user core. Apr 12 18:42:58.198655 systemd[1]: Started session-10.scope. Apr 12 18:42:58.201000 audit[2711]: USER_START pid=2711 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.202000 audit[2713]: CRED_ACQ pid=2713 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.322726 sshd[2711]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:58.322000 audit[2711]: USER_END pid=2711 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.322000 audit[2711]: CRED_DISP pid=2711 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:58.325041 systemd[1]: sshd@9-10.0.0.14:22-10.0.0.1:52158.service: Deactivated successfully. Apr 12 18:42:58.325752 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:42:58.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.14:22-10.0.0.1:52158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:58.326235 systemd-logind[1104]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:42:58.326911 systemd-logind[1104]: Removed session 10. Apr 12 18:42:58.400989 kubelet[2046]: E0412 18:42:58.400941 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:58.630639 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1597570494.mount: Deactivated successfully. Apr 12 18:42:59.346475 kubelet[2046]: E0412 18:42:59.346430 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:01.347314 kubelet[2046]: E0412 18:43:01.347271 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:03.327938 systemd[1]: Started sshd@10-10.0.0.14:22-10.0.0.1:34128.service. Apr 12 18:43:03.329020 kernel: kauditd_printk_skb: 51 callbacks suppressed Apr 12 18:43:03.329065 kernel: audit: type=1130 audit(1712947383.326:1140): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.14:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:03.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.14:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:03.346404 kubelet[2046]: E0412 18:43:03.346341 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:03.761000 audit[2730]: USER_ACCT pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.763394 sshd[2730]: Accepted publickey for core from 10.0.0.1 port 34128 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:03.765743 sshd[2730]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:03.764000 audit[2730]: CRED_ACQ pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.769568 systemd-logind[1104]: New session 11 of user core. Apr 12 18:43:03.770362 systemd[1]: Started session-11.scope. Apr 12 18:43:03.772274 kernel: audit: type=1101 audit(1712947383.761:1141): pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.772339 kernel: audit: type=1103 audit(1712947383.764:1142): pid=2730 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.772359 kernel: audit: type=1006 audit(1712947383.764:1143): pid=2730 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:43:03.764000 audit[2730]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdddded1d0 a2=3 a3=0 items=0 ppid=1 pid=2730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.783589 kernel: audit: type=1300 audit(1712947383.764:1143): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdddded1d0 a2=3 a3=0 items=0 ppid=1 pid=2730 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.783781 kernel: audit: type=1327 audit(1712947383.764:1143): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:03.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:03.773000 audit[2730]: USER_START pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.791222 kernel: audit: type=1105 audit(1712947383.773:1144): pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.791283 kernel: audit: type=1103 audit(1712947383.774:1145): pid=2732 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.774000 audit[2732]: CRED_ACQ pid=2732 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.881140 env[1122]: time="2024-04-12T18:43:03.881037720Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:03.902639 sshd[2730]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:03.902000 audit[2730]: USER_END pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.905399 systemd[1]: sshd@10-10.0.0.14:22-10.0.0.1:34128.service: Deactivated successfully. Apr 12 18:43:03.906216 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:43:03.907088 systemd-logind[1104]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:43:03.907911 systemd-logind[1104]: Removed session 11. Apr 12 18:43:03.914111 env[1122]: time="2024-04-12T18:43:03.914064705Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:03.902000 audit[2730]: CRED_DISP pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.920476 kernel: audit: type=1106 audit(1712947383.902:1146): pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.920533 kernel: audit: type=1104 audit(1712947383.902:1147): pid=2730 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:03.902000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.14:22-10.0.0.1:34128 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:03.976271 env[1122]: time="2024-04-12T18:43:03.976200663Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:04.014241 env[1122]: time="2024-04-12T18:43:04.014073512Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:04.014824 env[1122]: time="2024-04-12T18:43:04.014765996Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:43:04.017100 env[1122]: time="2024-04-12T18:43:04.017065860Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:43:04.398154 env[1122]: time="2024-04-12T18:43:04.398091839Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527\"" Apr 12 18:43:04.398565 env[1122]: time="2024-04-12T18:43:04.398531969Z" level=info msg="StartContainer for \"3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527\"" Apr 12 18:43:04.416439 systemd[1]: Started cri-containerd-3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527.scope. Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f565821cac8 items=0 ppid=2501 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:04.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363466633536646333323064373333323133333463646662303433 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit: BPF prog-id=136 op=LOAD Apr 12 18:43:04.453000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c00034dba8 items=0 ppid=2501 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:04.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363466633536646333323064373333323133333463646662303433 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit: BPF prog-id=137 op=LOAD Apr 12 18:43:04.453000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c00034dbf8 items=0 ppid=2501 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:04.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363466633536646333323064373333323133333463646662303433 Apr 12 18:43:04.453000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:43:04.453000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { perfmon } for pid=2751 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit[2751]: AVC avc: denied { bpf } for pid=2751 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:04.453000 audit: BPF prog-id=138 op=LOAD Apr 12 18:43:04.453000 audit[2751]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c00034dc88 items=0 ppid=2501 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:04.453000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3331363466633536646333323064373333323133333463646662303433 Apr 12 18:43:05.347095 kubelet[2046]: E0412 18:43:05.346991 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:06.431293 env[1122]: time="2024-04-12T18:43:06.431229697Z" level=info msg="StartContainer for \"3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527\" returns successfully" Apr 12 18:43:06.434207 kubelet[2046]: E0412 18:43:06.434164 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:07.346789 kubelet[2046]: E0412 18:43:07.346740 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:07.436790 kubelet[2046]: E0412 18:43:07.436761 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.435446 systemd[1]: cri-containerd-3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527.scope: Deactivated successfully. Apr 12 18:43:08.440000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:43:08.441236 kernel: kauditd_printk_skb: 44 callbacks suppressed Apr 12 18:43:08.441291 kernel: audit: type=1334 audit(1712947388.440:1155): prog-id=138 op=UNLOAD Apr 12 18:43:08.451792 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527-rootfs.mount: Deactivated successfully. Apr 12 18:43:08.475785 kubelet[2046]: I0412 18:43:08.475763 2046 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:43:08.522727 kubelet[2046]: I0412 18:43:08.522693 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:43:08.523878 kubelet[2046]: I0412 18:43:08.523835 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:43:08.524555 kubelet[2046]: I0412 18:43:08.524524 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:43:08.528634 systemd[1]: Created slice kubepods-besteffort-pod54012af1_740b_4a66_a761_679d9c75885c.slice. Apr 12 18:43:08.531647 systemd[1]: Created slice kubepods-burstable-pod278e70b1_dad9_4b95_8b8a_ed2fa6fc1fa3.slice. Apr 12 18:43:08.535316 systemd[1]: Created slice kubepods-burstable-podc246aba7_de31_4705_bd17_166af7cef71b.slice. Apr 12 18:43:08.547718 env[1122]: time="2024-04-12T18:43:08.547679081Z" level=info msg="shim disconnected" id=3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527 Apr 12 18:43:08.547970 env[1122]: time="2024-04-12T18:43:08.547722676Z" level=warning msg="cleaning up after shim disconnected" id=3164fc56dc320d73321334cdfb0433fd5a79211fb68b565a44b6eaea506f4527 namespace=k8s.io Apr 12 18:43:08.547970 env[1122]: time="2024-04-12T18:43:08.547730952Z" level=info msg="cleaning up dead shim" Apr 12 18:43:08.553284 env[1122]: time="2024-04-12T18:43:08.553258207Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:43:08Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2793 runtime=io.containerd.runc.v2\n" Apr 12 18:43:08.605079 kubelet[2046]: I0412 18:43:08.605046 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c246aba7-de31-4705-bd17-166af7cef71b-config-volume\") pod \"coredns-5d78c9869d-mxd6w\" (UID: \"c246aba7-de31-4705-bd17-166af7cef71b\") " pod="kube-system/coredns-5d78c9869d-mxd6w" Apr 12 18:43:08.605279 kubelet[2046]: I0412 18:43:08.605123 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ft5jv\" (UniqueName: \"kubernetes.io/projected/278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3-kube-api-access-ft5jv\") pod \"coredns-5d78c9869d-dzb5m\" (UID: \"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3\") " pod="kube-system/coredns-5d78c9869d-dzb5m" Apr 12 18:43:08.605279 kubelet[2046]: I0412 18:43:08.605143 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3-config-volume\") pod \"coredns-5d78c9869d-dzb5m\" (UID: \"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3\") " pod="kube-system/coredns-5d78c9869d-dzb5m" Apr 12 18:43:08.605279 kubelet[2046]: I0412 18:43:08.605208 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/54012af1-740b-4a66-a761-679d9c75885c-tigera-ca-bundle\") pod \"calico-kube-controllers-7fbc698c7-7dzb5\" (UID: \"54012af1-740b-4a66-a761-679d9c75885c\") " pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" Apr 12 18:43:08.605279 kubelet[2046]: I0412 18:43:08.605230 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rfzmx\" (UniqueName: \"kubernetes.io/projected/54012af1-740b-4a66-a761-679d9c75885c-kube-api-access-rfzmx\") pod \"calico-kube-controllers-7fbc698c7-7dzb5\" (UID: \"54012af1-740b-4a66-a761-679d9c75885c\") " pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" Apr 12 18:43:08.605279 kubelet[2046]: I0412 18:43:08.605267 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2hxjb\" (UniqueName: \"kubernetes.io/projected/c246aba7-de31-4705-bd17-166af7cef71b-kube-api-access-2hxjb\") pod \"coredns-5d78c9869d-mxd6w\" (UID: \"c246aba7-de31-4705-bd17-166af7cef71b\") " pod="kube-system/coredns-5d78c9869d-mxd6w" Apr 12 18:43:08.831407 env[1122]: time="2024-04-12T18:43:08.831365525Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7fbc698c7-7dzb5,Uid:54012af1-740b-4a66-a761-679d9c75885c,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:08.833644 kubelet[2046]: E0412 18:43:08.833611 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.834172 env[1122]: time="2024-04-12T18:43:08.834144167Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dzb5m,Uid:278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:08.836602 kubelet[2046]: E0412 18:43:08.836575 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.836998 env[1122]: time="2024-04-12T18:43:08.836970461Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-mxd6w,Uid:c246aba7-de31-4705-bd17-166af7cef71b,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:08.907158 systemd[1]: Started sshd@11-10.0.0.14:22-10.0.0.1:34136.service. Apr 12 18:43:08.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.14:22-10.0.0.1:34136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:08.912216 kernel: audit: type=1130 audit(1712947388.907:1156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.14:22-10.0.0.1:34136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:08.950000 audit[2809]: USER_ACCT pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.950613 sshd[2809]: Accepted publickey for core from 10.0.0.1 port 34136 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:08.952782 sshd[2809]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:08.952000 audit[2809]: CRED_ACQ pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.956309 systemd-logind[1104]: New session 12 of user core. Apr 12 18:43:08.957006 systemd[1]: Started session-12.scope. Apr 12 18:43:08.958844 kernel: audit: type=1101 audit(1712947388.950:1157): pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.958918 kernel: audit: type=1103 audit(1712947388.952:1158): pid=2809 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.959202 kernel: audit: type=1006 audit(1712947388.952:1159): pid=2809 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:43:08.952000 audit[2809]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c2d3d90 a2=3 a3=0 items=0 ppid=1 pid=2809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.966325 kernel: audit: type=1300 audit(1712947388.952:1159): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0c2d3d90 a2=3 a3=0 items=0 ppid=1 pid=2809 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.966371 kernel: audit: type=1327 audit(1712947388.952:1159): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:08.952000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:08.960000 audit[2809]: USER_START pid=2809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.972751 kernel: audit: type=1105 audit(1712947388.960:1160): pid=2809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.972811 kernel: audit: type=1103 audit(1712947388.962:1161): pid=2811 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:08.962000 audit[2811]: CRED_ACQ pid=2811 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:09.085047 sshd[2809]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:09.086000 audit[2809]: USER_END pid=2809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:09.090630 systemd[1]: sshd@11-10.0.0.14:22-10.0.0.1:34136.service: Deactivated successfully. Apr 12 18:43:09.091349 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:43:09.091992 systemd-logind[1104]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:43:09.092884 systemd-logind[1104]: Removed session 12. Apr 12 18:43:09.086000 audit[2809]: CRED_DISP pid=2809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:09.090000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.14:22-10.0.0.1:34136 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:09.097201 kernel: audit: type=1106 audit(1712947389.086:1162): pid=2809 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:09.176617 env[1122]: time="2024-04-12T18:43:09.176514951Z" level=error msg="Failed to destroy network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.176925 env[1122]: time="2024-04-12T18:43:09.176886857Z" level=error msg="encountered an error cleaning up failed sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.177221 env[1122]: time="2024-04-12T18:43:09.177140742Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dzb5m,Uid:278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.177523 kubelet[2046]: E0412 18:43:09.177496 2046 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.177594 kubelet[2046]: E0412 18:43:09.177560 2046 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-dzb5m" Apr 12 18:43:09.177594 kubelet[2046]: E0412 18:43:09.177579 2046 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-dzb5m" Apr 12 18:43:09.177653 kubelet[2046]: E0412 18:43:09.177633 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-dzb5m_kube-system(278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-dzb5m_kube-system(278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-dzb5m" podUID=278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3 Apr 12 18:43:09.207845 env[1122]: time="2024-04-12T18:43:09.207779622Z" level=error msg="Failed to destroy network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.247555 env[1122]: time="2024-04-12T18:43:09.247440670Z" level=error msg="encountered an error cleaning up failed sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.247555 env[1122]: time="2024-04-12T18:43:09.247549672Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7fbc698c7-7dzb5,Uid:54012af1-740b-4a66-a761-679d9c75885c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.247889 kubelet[2046]: E0412 18:43:09.247865 2046 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.247962 kubelet[2046]: E0412 18:43:09.247933 2046 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" Apr 12 18:43:09.247962 kubelet[2046]: E0412 18:43:09.247953 2046 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" Apr 12 18:43:09.248020 kubelet[2046]: E0412 18:43:09.248012 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-7fbc698c7-7dzb5_calico-system(54012af1-740b-4a66-a761-679d9c75885c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-7fbc698c7-7dzb5_calico-system(54012af1-740b-4a66-a761-679d9c75885c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" podUID=54012af1-740b-4a66-a761-679d9c75885c Apr 12 18:43:09.338260 env[1122]: time="2024-04-12T18:43:09.338086211Z" level=error msg="Failed to destroy network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.338474 env[1122]: time="2024-04-12T18:43:09.338446995Z" level=error msg="encountered an error cleaning up failed sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.338595 env[1122]: time="2024-04-12T18:43:09.338494788Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-mxd6w,Uid:c246aba7-de31-4705-bd17-166af7cef71b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.339003 kubelet[2046]: E0412 18:43:09.338956 2046 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.339195 kubelet[2046]: E0412 18:43:09.339018 2046 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-mxd6w" Apr 12 18:43:09.339195 kubelet[2046]: E0412 18:43:09.339039 2046 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-mxd6w" Apr 12 18:43:09.339195 kubelet[2046]: E0412 18:43:09.339091 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-mxd6w_kube-system(c246aba7-de31-4705-bd17-166af7cef71b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-mxd6w_kube-system(c246aba7-de31-4705-bd17-166af7cef71b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-mxd6w" podUID=c246aba7-de31-4705-bd17-166af7cef71b Apr 12 18:43:09.352285 systemd[1]: Created slice kubepods-besteffort-pod5bc50be2_c8a7_46d0_8144_d6770bdc0466.slice. Apr 12 18:43:09.354677 env[1122]: time="2024-04-12T18:43:09.354644157Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7fg2s,Uid:5bc50be2-c8a7-46d0-8144-d6770bdc0466,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:09.441480 kubelet[2046]: I0412 18:43:09.441448 2046 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:09.442120 env[1122]: time="2024-04-12T18:43:09.442078554Z" level=info msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" Apr 12 18:43:09.442756 kubelet[2046]: I0412 18:43:09.442737 2046 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:09.443164 env[1122]: time="2024-04-12T18:43:09.443133181Z" level=info msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" Apr 12 18:43:09.446588 kubelet[2046]: E0412 18:43:09.446546 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:09.447535 env[1122]: time="2024-04-12T18:43:09.447427588Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:43:09.447922 kubelet[2046]: I0412 18:43:09.447885 2046 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:09.448293 env[1122]: time="2024-04-12T18:43:09.448267256Z" level=info msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" Apr 12 18:43:09.452478 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77-shm.mount: Deactivated successfully. Apr 12 18:43:09.481372 env[1122]: time="2024-04-12T18:43:09.481293563Z" level=error msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" failed" error="failed to destroy network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.481674 kubelet[2046]: E0412 18:43:09.481630 2046 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:09.481905 kubelet[2046]: E0412 18:43:09.481685 2046 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77} Apr 12 18:43:09.481905 kubelet[2046]: E0412 18:43:09.481723 2046 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:09.481905 kubelet[2046]: E0412 18:43:09.481751 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-dzb5m" podUID=278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3 Apr 12 18:43:09.488955 env[1122]: time="2024-04-12T18:43:09.488859790Z" level=error msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" failed" error="failed to destroy network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.489224 kubelet[2046]: E0412 18:43:09.489202 2046 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:09.489310 kubelet[2046]: E0412 18:43:09.489241 2046 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00} Apr 12 18:43:09.489310 kubelet[2046]: E0412 18:43:09.489274 2046 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c246aba7-de31-4705-bd17-166af7cef71b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:09.489310 kubelet[2046]: E0412 18:43:09.489301 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c246aba7-de31-4705-bd17-166af7cef71b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-mxd6w" podUID=c246aba7-de31-4705-bd17-166af7cef71b Apr 12 18:43:09.504727 env[1122]: time="2024-04-12T18:43:09.504652453Z" level=error msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" failed" error="failed to destroy network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.505034 kubelet[2046]: E0412 18:43:09.505006 2046 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:09.505082 kubelet[2046]: E0412 18:43:09.505053 2046 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418} Apr 12 18:43:09.505106 kubelet[2046]: E0412 18:43:09.505089 2046 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"54012af1-740b-4a66-a761-679d9c75885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:09.505187 kubelet[2046]: E0412 18:43:09.505119 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"54012af1-740b-4a66-a761-679d9c75885c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" podUID=54012af1-740b-4a66-a761-679d9c75885c Apr 12 18:43:09.556984 env[1122]: time="2024-04-12T18:43:09.556899429Z" level=error msg="Failed to destroy network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.557401 env[1122]: time="2024-04-12T18:43:09.557301073Z" level=error msg="encountered an error cleaning up failed sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.557401 env[1122]: time="2024-04-12T18:43:09.557349778Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7fg2s,Uid:5bc50be2-c8a7-46d0-8144-d6770bdc0466,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.559072 kubelet[2046]: E0412 18:43:09.559022 2046 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:09.559042 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa-shm.mount: Deactivated successfully. Apr 12 18:43:09.559250 kubelet[2046]: E0412 18:43:09.559097 2046 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:43:09.559250 kubelet[2046]: E0412 18:43:09.559130 2046 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-7fg2s" Apr 12 18:43:09.559250 kubelet[2046]: E0412 18:43:09.559218 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-7fg2s_calico-system(5bc50be2-c8a7-46d0-8144-d6770bdc0466)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-7fg2s_calico-system(5bc50be2-c8a7-46d0-8144-d6770bdc0466)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:10.451016 kubelet[2046]: I0412 18:43:10.450977 2046 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:10.451570 env[1122]: time="2024-04-12T18:43:10.451528558Z" level=info msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" Apr 12 18:43:10.475752 env[1122]: time="2024-04-12T18:43:10.475670400Z" level=error msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" failed" error="failed to destroy network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:10.476040 kubelet[2046]: E0412 18:43:10.476010 2046 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:10.476110 kubelet[2046]: E0412 18:43:10.476057 2046 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa} Apr 12 18:43:10.476110 kubelet[2046]: E0412 18:43:10.476095 2046 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:10.476239 kubelet[2046]: E0412 18:43:10.476127 2046 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5bc50be2-c8a7-46d0-8144-d6770bdc0466\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-7fg2s" podUID=5bc50be2-c8a7-46d0-8144-d6770bdc0466 Apr 12 18:43:14.096352 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:43:14.096532 kernel: audit: type=1130 audit(1712947394.089:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.14:22-10.0.0.1:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:14.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.14:22-10.0.0.1:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:14.090510 systemd[1]: Started sshd@12-10.0.0.14:22-10.0.0.1:34970.service. Apr 12 18:43:14.131000 audit[3066]: USER_ACCT pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.138067 sshd[3066]: Accepted publickey for core from 10.0.0.1 port 34970 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:14.138336 kernel: audit: type=1101 audit(1712947394.131:1166): pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.138166 sshd[3066]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:14.146510 kernel: audit: type=1103 audit(1712947394.136:1167): pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.146568 kernel: audit: type=1006 audit(1712947394.136:1168): pid=3066 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:43:14.136000 audit[3066]: CRED_ACQ pid=3066 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.142923 systemd-logind[1104]: New session 13 of user core. Apr 12 18:43:14.143127 systemd[1]: Started session-13.scope. Apr 12 18:43:14.151722 kernel: audit: type=1300 audit(1712947394.136:1168): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69d03fa0 a2=3 a3=0 items=0 ppid=1 pid=3066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:14.136000 audit[3066]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe69d03fa0 a2=3 a3=0 items=0 ppid=1 pid=3066 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:14.136000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:14.153518 kernel: audit: type=1327 audit(1712947394.136:1168): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:14.153562 kernel: audit: type=1105 audit(1712947394.147:1169): pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.147000 audit[3066]: USER_START pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.148000 audit[3068]: CRED_ACQ pid=3068 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.162818 kernel: audit: type=1103 audit(1712947394.148:1170): pid=3068 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.257581 sshd[3066]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:14.257000 audit[3066]: USER_END pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.261000 audit[3066]: CRED_DISP pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.263223 kernel: audit: type=1106 audit(1712947394.257:1171): pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.263267 kernel: audit: type=1104 audit(1712947394.261:1172): pid=3066 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:14.264531 systemd[1]: sshd@12-10.0.0.14:22-10.0.0.1:34970.service: Deactivated successfully. Apr 12 18:43:14.265204 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:43:14.265726 systemd-logind[1104]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:43:14.266459 systemd-logind[1104]: Removed session 13. Apr 12 18:43:14.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.14:22-10.0.0.1:34970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:16.469569 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1922423237.mount: Deactivated successfully. Apr 12 18:43:19.262045 systemd[1]: Started sshd@13-10.0.0.14:22-10.0.0.1:41750.service. Apr 12 18:43:19.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.14:22-10.0.0.1:41750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:19.263307 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:43:19.263371 kernel: audit: type=1130 audit(1712947399.261:1174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.14:22-10.0.0.1:41750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:19.435000 audit[3084]: USER_ACCT pid=3084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.437373 sshd[3084]: Accepted publickey for core from 10.0.0.1 port 41750 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:19.440000 audit[3084]: CRED_ACQ pid=3084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.442078 sshd[3084]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:19.447087 kernel: audit: type=1101 audit(1712947399.435:1175): pid=3084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.447150 kernel: audit: type=1103 audit(1712947399.440:1176): pid=3084 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.447359 kernel: audit: type=1006 audit(1712947399.440:1177): pid=3084 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:43:19.446610 systemd-logind[1104]: New session 14 of user core. Apr 12 18:43:19.447941 systemd[1]: Started session-14.scope. Apr 12 18:43:19.449511 kernel: audit: type=1300 audit(1712947399.440:1177): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1ea76e20 a2=3 a3=0 items=0 ppid=1 pid=3084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:19.440000 audit[3084]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe1ea76e20 a2=3 a3=0 items=0 ppid=1 pid=3084 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:19.440000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:19.455908 kernel: audit: type=1327 audit(1712947399.440:1177): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:19.455940 kernel: audit: type=1105 audit(1712947399.451:1178): pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.451000 audit[3084]: USER_START pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.452000 audit[3086]: CRED_ACQ pid=3086 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.464974 kernel: audit: type=1103 audit(1712947399.452:1179): pid=3086 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.618254 sshd[3084]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:19.617000 audit[3084]: USER_END pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.623618 systemd-logind[1104]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:43:19.617000 audit[3084]: CRED_DISP pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.624922 systemd[1]: sshd@13-10.0.0.14:22-10.0.0.1:41750.service: Deactivated successfully. Apr 12 18:43:19.625699 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:43:19.626566 systemd-logind[1104]: Removed session 14. Apr 12 18:43:19.628888 kernel: audit: type=1106 audit(1712947399.617:1180): pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.628943 kernel: audit: type=1104 audit(1712947399.617:1181): pid=3084 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:19.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.14:22-10.0.0.1:41750 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:20.032756 env[1122]: time="2024-04-12T18:43:20.032696682Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.102700 env[1122]: time="2024-04-12T18:43:20.102639762Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.158674 env[1122]: time="2024-04-12T18:43:20.158622759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.203386 env[1122]: time="2024-04-12T18:43:20.203290203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:20.204043 env[1122]: time="2024-04-12T18:43:20.203999676Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:43:20.213446 env[1122]: time="2024-04-12T18:43:20.213394860Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:43:20.923877 env[1122]: time="2024-04-12T18:43:20.923811635Z" level=info msg="CreateContainer within sandbox \"a4e21201904d72aa3cb9da76a95fc9a0f6f2500afe24a8b9f085e01c22de738b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21\"" Apr 12 18:43:20.924500 env[1122]: time="2024-04-12T18:43:20.924462258Z" level=info msg="StartContainer for \"fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21\"" Apr 12 18:43:20.938623 systemd[1]: Started cri-containerd-fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21.scope. Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f71606484e8 items=0 ppid=2501 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363432353063643661303462326133313138623331653862326565 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit: BPF prog-id=139 op=LOAD Apr 12 18:43:20.977000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002fc0f8 items=0 ppid=2501 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363432353063643661303462326133313138623331653862326565 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit: BPF prog-id=140 op=LOAD Apr 12 18:43:20.977000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002fc148 items=0 ppid=2501 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363432353063643661303462326133313138623331653862326565 Apr 12 18:43:20.977000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:43:20.977000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { perfmon } for pid=3107 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit[3107]: AVC avc: denied { bpf } for pid=3107 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:20.977000 audit: BPF prog-id=141 op=LOAD Apr 12 18:43:20.977000 audit[3107]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002fc1d8 items=0 ppid=2501 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:20.977000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661363432353063643661303462326133313138623331653862326565 Apr 12 18:43:21.294201 env[1122]: time="2024-04-12T18:43:21.294124698Z" level=info msg="StartContainer for \"fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21\" returns successfully" Apr 12 18:43:21.327332 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:43:21.327518 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:43:21.476718 kubelet[2046]: E0412 18:43:21.476166 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:21.502014 systemd[1]: run-containerd-runc-k8s.io-fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21-runc.o71zMt.mount: Deactivated successfully. Apr 12 18:43:22.477647 kubelet[2046]: E0412 18:43:22.477614 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:22.493199 systemd[1]: run-containerd-runc-k8s.io-fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21-runc.uFc2r5.mount: Deactivated successfully. Apr 12 18:43:23.021000 audit[3261]: AVC avc: denied { write } for pid=3261 comm="tee" name="fd" dev="proc" ino=24370 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.021000 audit[3261]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8da6f97b a2=241 a3=1b6 items=1 ppid=3226 pid=3261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.021000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:43:23.021000 audit: PATH item=0 name="/dev/fd/63" inode=25018 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.021000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.022000 audit[3264]: AVC avc: denied { write } for pid=3264 comm="tee" name="fd" dev="proc" ino=25761 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.022000 audit[3264]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffebd6098b a2=241 a3=1b6 items=1 ppid=3225 pid=3264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.022000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:43:23.022000 audit: PATH item=0 name="/dev/fd/63" inode=25021 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.022000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.034000 audit[3256]: AVC avc: denied { write } for pid=3256 comm="tee" name="fd" dev="proc" ino=25774 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.034000 audit[3256]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffe394498c a2=241 a3=1b6 items=1 ppid=3227 pid=3256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.034000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:43:23.034000 audit: PATH item=0 name="/dev/fd/63" inode=25015 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.034000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.047000 audit[3301]: AVC avc: denied { write } for pid=3301 comm="tee" name="fd" dev="proc" ino=25035 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.048000 audit[3287]: AVC avc: denied { write } for pid=3287 comm="tee" name="fd" dev="proc" ino=24377 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.048000 audit[3287]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe19de097c a2=241 a3=1b6 items=1 ppid=3251 pid=3287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.048000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:43:23.048000 audit: PATH item=0 name="/dev/fd/63" inode=23517 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.048000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.047000 audit[3301]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffaf33b98d a2=241 a3=1b6 items=1 ppid=3241 pid=3301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.047000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:43:23.047000 audit: PATH item=0 name="/dev/fd/63" inode=25032 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.047000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.051000 audit[3286]: AVC avc: denied { write } for pid=3286 comm="tee" name="fd" dev="proc" ino=24381 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.051000 audit[3286]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd7aca998b a2=241 a3=1b6 items=1 ppid=3243 pid=3286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.051000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:43:23.051000 audit: PATH item=0 name="/dev/fd/63" inode=25769 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.051000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.099000 audit[3308]: AVC avc: denied { write } for pid=3308 comm="tee" name="fd" dev="proc" ino=25797 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:43:23.099000 audit[3308]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc8583698b a2=241 a3=1b6 items=1 ppid=3242 pid=3308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.099000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:43:23.099000 audit: PATH item=0 name="/dev/fd/63" inode=25782 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:43:23.099000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.246000 audit: BPF prog-id=142 op=LOAD Apr 12 18:43:23.246000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2cd74050 a2=70 a3=7f5e6376c000 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.246000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.247000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit: BPF prog-id=143 op=LOAD Apr 12 18:43:23.247000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc2cd74050 a2=70 a3=6f items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.247000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:43:23.247000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.247000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc2cd74000 a2=70 a3=7ffc2cd74050 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.247000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit: BPF prog-id=144 op=LOAD Apr 12 18:43:23.248000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffc2cd73fe0 a2=70 a3=7ffc2cd74050 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.248000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.248000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:43:23.248000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.248000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd740c0 a2=70 a3=0 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.248000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.249000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.249000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd740b0 a2=70 a3=0 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.249000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.249000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc2cd74020 a2=70 a3=0 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.249000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.249000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc2cd740f0 a2=70 a3=134ee10 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.249000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc2cd740f0 a2=70 a3=134b880 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.250000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { perfmon } for pid=3368 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit[3368]: AVC avc: denied { bpf } for pid=3368 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.250000 audit: BPF prog-id=145 op=LOAD Apr 12 18:43:23.250000 audit[3368]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc2cd74010 a2=70 a3=0 items=0 ppid=3246 pid=3368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.250000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:43:23.256000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.256000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd05cdfd90 a2=70 a3=208 items=0 ppid=3246 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.256000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:43:23.256000 audit[3379]: AVC avc: denied { bpf } for pid=3379 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.256000 audit[3379]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd05cdfc60 a2=70 a3=3 items=0 ppid=3246 pid=3379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.256000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:43:23.262000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:43:23.318000 audit[3401]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3401 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:23.318000 audit[3401]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffd38a8ae80 a2=0 a3=7ffd38a8ae6c items=0 ppid=3246 pid=3401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.318000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:23.323000 audit[3399]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3399 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:23.323000 audit[3399]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc1a401980 a2=0 a3=7ffc1a40196c items=0 ppid=3246 pid=3399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.323000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:23.324000 audit[3402]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3402 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:23.324000 audit[3402]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffca60b0850 a2=0 a3=7ffca60b083c items=0 ppid=3246 pid=3402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.324000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:23.325000 audit[3400]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3400 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:23.325000 audit[3400]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe9c136f40 a2=0 a3=7ffe9c136f2c items=0 ppid=3246 pid=3400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.325000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:23.348465 env[1122]: time="2024-04-12T18:43:23.348417912Z" level=info msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" Apr 12 18:43:23.348856 env[1122]: time="2024-04-12T18:43:23.348418022Z" level=info msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" Apr 12 18:43:23.400553 kubelet[2046]: I0412 18:43:23.400505 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-vd95g" podStartSLOduration=4.399326588 podCreationTimestamp="2024-04-12 18:42:49 +0000 UTC" firstStartedPulling="2024-04-12 18:42:50.203611492 +0000 UTC m=+19.942164261" lastFinishedPulling="2024-04-12 18:43:20.204750717 +0000 UTC m=+49.943303486" observedRunningTime="2024-04-12 18:43:21.490485619 +0000 UTC m=+51.229038388" watchObservedRunningTime="2024-04-12 18:43:23.400465813 +0000 UTC m=+53.139018582" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.413 [INFO][3438] k8s.go 585: Cleaning up netns ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.413 [INFO][3438] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" iface="eth0" netns="/var/run/netns/cni-aef915d1-4c40-beb6-46e2-d46e3e8b7b2e" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.413 [INFO][3438] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" iface="eth0" netns="/var/run/netns/cni-aef915d1-4c40-beb6-46e2-d46e3e8b7b2e" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.414 [INFO][3438] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" iface="eth0" netns="/var/run/netns/cni-aef915d1-4c40-beb6-46e2-d46e3e8b7b2e" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.414 [INFO][3438] k8s.go 592: Releasing IP address(es) ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.414 [INFO][3438] utils.go 188: Calico CNI releasing IP address ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.446 [INFO][3459] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.446 [INFO][3459] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.446 [INFO][3459] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.456 [WARNING][3459] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.456 [INFO][3459] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.458 [INFO][3459] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:23.460960 env[1122]: 2024-04-12 18:43:23.459 [INFO][3438] k8s.go 598: Teardown processing complete. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:23.461814 env[1122]: time="2024-04-12T18:43:23.461772667Z" level=info msg="TearDown network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" successfully" Apr 12 18:43:23.461898 env[1122]: time="2024-04-12T18:43:23.461876532Z" level=info msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" returns successfully" Apr 12 18:43:23.463871 kubelet[2046]: E0412 18:43:23.462681 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:23.463513 systemd[1]: run-netns-cni\x2daef915d1\x2d4c40\x2dbeb6\x2d46e2\x2dd46e3e8b7b2e.mount: Deactivated successfully. Apr 12 18:43:23.464992 env[1122]: time="2024-04-12T18:43:23.464893346Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dzb5m,Uid:278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3,Namespace:kube-system,Attempt:1,}" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] k8s.go 585: Cleaning up netns ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" iface="eth0" netns="/var/run/netns/cni-f2a5506e-f799-2703-e6d7-64fc67b3cc60" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" iface="eth0" netns="/var/run/netns/cni-f2a5506e-f799-2703-e6d7-64fc67b3cc60" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" iface="eth0" netns="/var/run/netns/cni-f2a5506e-f799-2703-e6d7-64fc67b3cc60" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] k8s.go 592: Releasing IP address(es) ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.401 [INFO][3439] utils.go 188: Calico CNI releasing IP address ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.446 [INFO][3454] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.446 [INFO][3454] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.458 [INFO][3454] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.476 [WARNING][3454] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.476 [INFO][3454] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.478 [INFO][3454] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:23.481106 env[1122]: 2024-04-12 18:43:23.479 [INFO][3439] k8s.go 598: Teardown processing complete. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:23.481541 env[1122]: time="2024-04-12T18:43:23.481235612Z" level=info msg="TearDown network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" successfully" Apr 12 18:43:23.481541 env[1122]: time="2024-04-12T18:43:23.481264046Z" level=info msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" returns successfully" Apr 12 18:43:23.481586 kubelet[2046]: E0412 18:43:23.481476 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:23.482616 env[1122]: time="2024-04-12T18:43:23.482036301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-mxd6w,Uid:c246aba7-de31-4705-bd17-166af7cef71b,Namespace:kube-system,Attempt:1,}" Apr 12 18:43:23.483582 systemd[1]: run-netns-cni\x2df2a5506e\x2df799\x2d2703\x2de6d7\x2d64fc67b3cc60.mount: Deactivated successfully. Apr 12 18:43:23.883174 systemd-networkd[1014]: cali384dd3dbcb8: Link UP Apr 12 18:43:23.885535 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali384dd3dbcb8: link becomes ready Apr 12 18:43:23.887348 systemd-networkd[1014]: cali384dd3dbcb8: Gained carrier Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.818 [INFO][3480] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--mxd6w-eth0 coredns-5d78c9869d- kube-system c246aba7-de31-4705-bd17-166af7cef71b 790 0 2024-04-12 18:42:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-mxd6w eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali384dd3dbcb8 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.818 [INFO][3480] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.846 [INFO][3494] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" HandleID="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.855 [INFO][3494] ipam_plugin.go 268: Auto assigning IP ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" HandleID="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000330e20), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-mxd6w", "timestamp":"2024-04-12 18:43:23.846644371 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.855 [INFO][3494] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.855 [INFO][3494] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.855 [INFO][3494] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.857 [INFO][3494] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.861 [INFO][3494] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.866 [INFO][3494] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.868 [INFO][3494] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.870 [INFO][3494] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.870 [INFO][3494] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.871 [INFO][3494] ipam.go 1682: Creating new handle: k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2 Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.874 [INFO][3494] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.878 [INFO][3494] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.878 [INFO][3494] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" host="localhost" Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.878 [INFO][3494] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:23.908255 env[1122]: 2024-04-12 18:43:23.878 [INFO][3494] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" HandleID="k8s-pod-network.2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.880 [INFO][3480] k8s.go 385: Populated endpoint ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--mxd6w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c246aba7-de31-4705-bd17-166af7cef71b", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-mxd6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali384dd3dbcb8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.881 [INFO][3480] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.881 [INFO][3480] dataplane_linux.go 68: Setting the host side veth name to cali384dd3dbcb8 ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.884 [INFO][3480] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.884 [INFO][3480] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--mxd6w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c246aba7-de31-4705-bd17-166af7cef71b", ResourceVersion:"790", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2", Pod:"coredns-5d78c9869d-mxd6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali384dd3dbcb8", MAC:"be:36:01:af:33:89", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:23.909314 env[1122]: 2024-04-12 18:43:23.906 [INFO][3480] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2" Namespace="kube-system" Pod="coredns-5d78c9869d-mxd6w" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:23.926425 env[1122]: time="2024-04-12T18:43:23.926340066Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:23.926425 env[1122]: time="2024-04-12T18:43:23.926376875Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:23.926425 env[1122]: time="2024-04-12T18:43:23.926390682Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:23.926616 env[1122]: time="2024-04-12T18:43:23.926498304Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2 pid=3529 runtime=io.containerd.runc.v2 Apr 12 18:43:23.932950 systemd-networkd[1014]: cali18d041771fa: Link UP Apr 12 18:43:23.933530 systemd-networkd[1014]: cali18d041771fa: Gained carrier Apr 12 18:43:23.934230 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali18d041771fa: link becomes ready Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.820 [INFO][3470] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--dzb5m-eth0 coredns-5d78c9869d- kube-system 278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3 791 0 2024-04-12 18:42:44 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-dzb5m eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali18d041771fa [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.820 [INFO][3470] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.865 [INFO][3495] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" HandleID="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.877 [INFO][3495] ipam_plugin.go 268: Auto assigning IP ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" HandleID="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002bb5e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-dzb5m", "timestamp":"2024-04-12 18:43:23.865098425 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.877 [INFO][3495] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.878 [INFO][3495] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.878 [INFO][3495] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.880 [INFO][3495] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.884 [INFO][3495] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.889 [INFO][3495] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.890 [INFO][3495] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.911 [INFO][3495] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.911 [INFO][3495] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.913 [INFO][3495] ipam.go 1682: Creating new handle: k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.915 [INFO][3495] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.925 [INFO][3495] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.925 [INFO][3495] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" host="localhost" Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.925 [INFO][3495] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:23.952724 env[1122]: 2024-04-12 18:43:23.925 [INFO][3495] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" HandleID="k8s-pod-network.2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.952549 systemd[1]: Started cri-containerd-2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2.scope. Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.927 [INFO][3470] k8s.go 385: Populated endpoint ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--dzb5m-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-dzb5m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18d041771fa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.927 [INFO][3470] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.927 [INFO][3470] dataplane_linux.go 68: Setting the host side veth name to cali18d041771fa ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.938 [INFO][3470] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.943 [INFO][3470] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--dzb5m-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3", ResourceVersion:"791", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e", Pod:"coredns-5d78c9869d-dzb5m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18d041771fa", MAC:"8e:2e:74:dd:f5:49", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:23.953780 env[1122]: 2024-04-12 18:43:23.948 [INFO][3470] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e" Namespace="kube-system" Pod="coredns-5d78c9869d-dzb5m" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:23.952000 audit[3554]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3554 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:23.952000 audit[3554]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffd718b27e0 a2=0 a3=7ffd718b27cc items=0 ppid=3246 pid=3554 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.952000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.963000 audit: BPF prog-id=146 op=LOAD Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3529 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393664636232366437663835396263313930356236383838333338 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3529 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393664636232366437663835396263313930356236383838333338 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit: BPF prog-id=147 op=LOAD Apr 12 18:43:23.964000 audit[3538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000321b20 items=0 ppid=3529 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393664636232366437663835396263313930356236383838333338 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit: BPF prog-id=148 op=LOAD Apr 12 18:43:23.964000 audit[3538]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000321b68 items=0 ppid=3529 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393664636232366437663835396263313930356236383838333338 Apr 12 18:43:23.964000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:43:23.964000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:23.964000 audit: BPF prog-id=149 op=LOAD Apr 12 18:43:23.964000 audit[3538]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000321f78 items=0 ppid=3529 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:23.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234393664636232366437663835396263313930356236383838333338 Apr 12 18:43:23.966263 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:23.983598 env[1122]: time="2024-04-12T18:43:23.983528892Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:23.983849 env[1122]: time="2024-04-12T18:43:23.983576882Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:23.983849 env[1122]: time="2024-04-12T18:43:23.983768814Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:23.983982 env[1122]: time="2024-04-12T18:43:23.983932943Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e pid=3577 runtime=io.containerd.runc.v2 Apr 12 18:43:23.990662 env[1122]: time="2024-04-12T18:43:23.990594854Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-mxd6w,Uid:c246aba7-de31-4705-bd17-166af7cef71b,Namespace:kube-system,Attempt:1,} returns sandbox id \"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2\"" Apr 12 18:43:23.991657 kubelet[2046]: E0412 18:43:23.991242 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:23.995040 env[1122]: time="2024-04-12T18:43:23.994966148Z" level=info msg="CreateContainer within sandbox \"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:43:23.996993 systemd[1]: Started cri-containerd-2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e.scope. Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit: BPF prog-id=150 op=LOAD Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3577 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261346635363336396530393665323639626662366665383732323530 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3577 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261346635363336396530393665323639626662366665383732323530 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit: BPF prog-id=151 op=LOAD Apr 12 18:43:24.005000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000312370 items=0 ppid=3577 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261346635363336396530393665323639626662366665383732323530 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.005000 audit: BPF prog-id=152 op=LOAD Apr 12 18:43:24.005000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003123b8 items=0 ppid=3577 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261346635363336396530393665323639626662366665383732323530 Apr 12 18:43:24.006000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:43:24.006000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.006000 audit: BPF prog-id=153 op=LOAD Apr 12 18:43:24.006000 audit[3589]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003127c8 items=0 ppid=3577 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261346635363336396530393665323639626662366665383732323530 Apr 12 18:43:24.007973 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:24.029671 env[1122]: time="2024-04-12T18:43:24.029632518Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-dzb5m,Uid:278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3,Namespace:kube-system,Attempt:1,} returns sandbox id \"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e\"" Apr 12 18:43:24.030843 kubelet[2046]: E0412 18:43:24.030462 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:24.032538 env[1122]: time="2024-04-12T18:43:24.032509341Z" level=info msg="CreateContainer within sandbox \"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:43:24.038000 audit[3624]: NETFILTER_CFG table=filter:102 family=2 entries=30 op=nft_register_chain pid=3624 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:24.038000 audit[3624]: SYSCALL arch=c000003e syscall=46 success=yes exit=17032 a0=3 a1=7fffa2296b50 a2=0 a3=7fffa2296b3c items=0 ppid=3246 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.038000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:24.137661 env[1122]: time="2024-04-12T18:43:24.137534320Z" level=info msg="CreateContainer within sandbox \"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4635b2650e1087104dda0e9d897172690e9c26b23b8085de9eadfe4dd13af316\"" Apr 12 18:43:24.139316 env[1122]: time="2024-04-12T18:43:24.139278729Z" level=info msg="StartContainer for \"4635b2650e1087104dda0e9d897172690e9c26b23b8085de9eadfe4dd13af316\"" Apr 12 18:43:24.151812 env[1122]: time="2024-04-12T18:43:24.151746014Z" level=info msg="CreateContainer within sandbox \"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9238a4739e9692549f414c7a0c24a39c9da1607c6dc8fa7e15e7d61f7d5d780c\"" Apr 12 18:43:24.152488 env[1122]: time="2024-04-12T18:43:24.152460872Z" level=info msg="StartContainer for \"9238a4739e9692549f414c7a0c24a39c9da1607c6dc8fa7e15e7d61f7d5d780c\"" Apr 12 18:43:24.158461 systemd[1]: Started cri-containerd-4635b2650e1087104dda0e9d897172690e9c26b23b8085de9eadfe4dd13af316.scope. Apr 12 18:43:24.170323 systemd[1]: Started cri-containerd-9238a4739e9692549f414c7a0c24a39c9da1607c6dc8fa7e15e7d61f7d5d780c.scope. Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.173000 audit: BPF prog-id=154 op=LOAD Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3529 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333562323635306531303837313034646461306539643839373137 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3529 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333562323635306531303837313034646461306539643839373137 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit: BPF prog-id=155 op=LOAD Apr 12 18:43:24.174000 audit[3635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c0001dd890 items=0 ppid=3529 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333562323635306531303837313034646461306539643839373137 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit: BPF prog-id=156 op=LOAD Apr 12 18:43:24.174000 audit[3635]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c0001dd8d8 items=0 ppid=3529 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333562323635306531303837313034646461306539643839373137 Apr 12 18:43:24.174000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:43:24.174000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { perfmon } for pid=3635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit[3635]: AVC avc: denied { bpf } for pid=3635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.174000 audit: BPF prog-id=157 op=LOAD Apr 12 18:43:24.174000 audit[3635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c0001ddce8 items=0 ppid=3529 pid=3635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.174000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436333562323635306531303837313034646461306539643839373137 Apr 12 18:43:24.189564 systemd-networkd[1014]: vxlan.calico: Link UP Apr 12 18:43:24.189572 systemd-networkd[1014]: vxlan.calico: Gained carrier Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit: BPF prog-id=158 op=LOAD Apr 12 18:43:24.211000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.211000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3577 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.211000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333861343733396539363932353439663431346337613063323461 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3577 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333861343733396539363932353439663431346337613063323461 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.212000 audit: BPF prog-id=159 op=LOAD Apr 12 18:43:24.212000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000a3210 items=0 ppid=3577 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.212000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333861343733396539363932353439663431346337613063323461 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.213000 audit: BPF prog-id=160 op=LOAD Apr 12 18:43:24.213000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000a3258 items=0 ppid=3577 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333861343733396539363932353439663431346337613063323461 Apr 12 18:43:24.213000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:43:24.213000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { perfmon } for pid=3653 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit[3653]: AVC avc: denied { bpf } for pid=3653 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.214000 audit: BPF prog-id=161 op=LOAD Apr 12 18:43:24.214000 audit[3653]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0000a3668 items=0 ppid=3577 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932333861343733396539363932353439663431346337613063323461 Apr 12 18:43:24.232983 env[1122]: time="2024-04-12T18:43:24.232917571Z" level=info msg="StartContainer for \"4635b2650e1087104dda0e9d897172690e9c26b23b8085de9eadfe4dd13af316\" returns successfully" Apr 12 18:43:24.258679 env[1122]: time="2024-04-12T18:43:24.258623074Z" level=info msg="StartContainer for \"9238a4739e9692549f414c7a0c24a39c9da1607c6dc8fa7e15e7d61f7d5d780c\" returns successfully" Apr 12 18:43:24.347993 env[1122]: time="2024-04-12T18:43:24.347936282Z" level=info msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" Apr 12 18:43:24.347993 env[1122]: time="2024-04-12T18:43:24.347971177Z" level=info msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.390 [INFO][3732] k8s.go 585: Cleaning up netns ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.391 [INFO][3732] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" iface="eth0" netns="/var/run/netns/cni-ffe5da8b-751c-6bf9-06d3-370455edfca7" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.391 [INFO][3732] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" iface="eth0" netns="/var/run/netns/cni-ffe5da8b-751c-6bf9-06d3-370455edfca7" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.391 [INFO][3732] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" iface="eth0" netns="/var/run/netns/cni-ffe5da8b-751c-6bf9-06d3-370455edfca7" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.391 [INFO][3732] k8s.go 592: Releasing IP address(es) ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.391 [INFO][3732] utils.go 188: Calico CNI releasing IP address ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.412 [INFO][3745] ipam_plugin.go 415: Releasing address using handleID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.412 [INFO][3745] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.412 [INFO][3745] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.422 [WARNING][3745] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.422 [INFO][3745] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.427 [INFO][3745] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:24.432532 env[1122]: 2024-04-12 18:43:24.429 [INFO][3732] k8s.go 598: Teardown processing complete. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:24.433361 env[1122]: time="2024-04-12T18:43:24.433321252Z" level=info msg="TearDown network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" successfully" Apr 12 18:43:24.433465 env[1122]: time="2024-04-12T18:43:24.433439154Z" level=info msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" returns successfully" Apr 12 18:43:24.434309 env[1122]: time="2024-04-12T18:43:24.434287855Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7fbc698c7-7dzb5,Uid:54012af1-740b-4a66-a761-679d9c75885c,Namespace:calico-system,Attempt:1,}" Apr 12 18:43:24.481911 kubelet[2046]: E0412 18:43:24.481755 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:24.484308 kubelet[2046]: E0412 18:43:24.484070 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.434 [INFO][3733] k8s.go 585: Cleaning up netns ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.434 [INFO][3733] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" iface="eth0" netns="/var/run/netns/cni-c67419d7-714c-4310-e04f-97ec5301f7b8" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.435 [INFO][3733] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" iface="eth0" netns="/var/run/netns/cni-c67419d7-714c-4310-e04f-97ec5301f7b8" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.435 [INFO][3733] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" iface="eth0" netns="/var/run/netns/cni-c67419d7-714c-4310-e04f-97ec5301f7b8" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.435 [INFO][3733] k8s.go 592: Releasing IP address(es) ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.435 [INFO][3733] utils.go 188: Calico CNI releasing IP address ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.456 [INFO][3755] ipam_plugin.go 415: Releasing address using handleID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.456 [INFO][3755] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.456 [INFO][3755] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.477 [WARNING][3755] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.477 [INFO][3755] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.482 [INFO][3755] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:24.488434 env[1122]: 2024-04-12 18:43:24.486 [INFO][3733] k8s.go 598: Teardown processing complete. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:24.489259 env[1122]: time="2024-04-12T18:43:24.489220352Z" level=info msg="TearDown network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" successfully" Apr 12 18:43:24.489380 env[1122]: time="2024-04-12T18:43:24.489335709Z" level=info msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" returns successfully" Apr 12 18:43:24.490224 env[1122]: time="2024-04-12T18:43:24.490094609Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7fg2s,Uid:5bc50be2-c8a7-46d0-8144-d6770bdc0466,Namespace:calico-system,Attempt:1,}" Apr 12 18:43:24.533617 kubelet[2046]: I0412 18:43:24.533579 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-mxd6w" podStartSLOduration=40.53353497 podCreationTimestamp="2024-04-12 18:42:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:24.499857857 +0000 UTC m=+54.238410626" watchObservedRunningTime="2024-04-12 18:43:24.53353497 +0000 UTC m=+54.272087739" Apr 12 18:43:24.541000 audit[3769]: NETFILTER_CFG table=filter:103 family=2 entries=14 op=nft_register_rule pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.543421 kernel: kauditd_printk_skb: 402 callbacks suppressed Apr 12 18:43:24.543484 kernel: audit: type=1325 audit(1712947404.541:1290): table=filter:103 family=2 entries=14 op=nft_register_rule pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.541000 audit[3769]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffc092cf30 a2=0 a3=7fffc092cf1c items=0 ppid=2193 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.551606 kernel: audit: type=1300 audit(1712947404.541:1290): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffc092cf30 a2=0 a3=7fffc092cf1c items=0 ppid=2193 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.554202 kernel: audit: type=1327 audit(1712947404.541:1290): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.541000 audit[3769]: NETFILTER_CFG table=nat:104 family=2 entries=14 op=nft_register_rule pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.541000 audit[3769]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffc092cf30 a2=0 a3=0 items=0 ppid=2193 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.567522 kernel: audit: type=1325 audit(1712947404.541:1291): table=nat:104 family=2 entries=14 op=nft_register_rule pid=3769 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.567672 kernel: audit: type=1300 audit(1712947404.541:1291): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffc092cf30 a2=0 a3=0 items=0 ppid=2193 pid=3769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.541000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.571400 kernel: audit: type=1327 audit(1712947404.541:1291): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.561000 audit[3782]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.561000 audit[3782]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe1cdeab50 a2=0 a3=7ffe1cdeab3c items=0 ppid=2193 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.581713 kernel: audit: type=1325 audit(1712947404.561:1292): table=filter:105 family=2 entries=14 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.581780 kernel: audit: type=1300 audit(1712947404.561:1292): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe1cdeab50 a2=0 a3=7ffe1cdeab3c items=0 ppid=2193 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.561000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.584215 kernel: audit: type=1327 audit(1712947404.561:1292): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.583000 audit[3782]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.587113 kernel: audit: type=1325 audit(1712947404.583:1293): table=nat:106 family=2 entries=14 op=nft_register_rule pid=3782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:24.583000 audit[3782]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe1cdeab50 a2=0 a3=0 items=0 ppid=2193 pid=3782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.583000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:24.621000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.14:22-10.0.0.1:41758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:24.622840 systemd[1]: Started sshd@14-10.0.0.14:22-10.0.0.1:41758.service. Apr 12 18:43:24.665000 audit[3787]: USER_ACCT pid=3787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.666947 sshd[3787]: Accepted publickey for core from 10.0.0.1 port 41758 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:24.666000 audit[3787]: CRED_ACQ pid=3787 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.666000 audit[3787]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff6391d460 a2=3 a3=0 items=0 ppid=1 pid=3787 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.666000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:24.668455 sshd[3787]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:24.673210 systemd-logind[1104]: New session 15 of user core. Apr 12 18:43:24.674291 systemd[1]: Started session-15.scope. Apr 12 18:43:24.679000 audit[3787]: USER_START pid=3787 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.681000 audit[3810]: CRED_ACQ pid=3810 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.706471 systemd-networkd[1014]: cali316dbf6e254: Link UP Apr 12 18:43:24.709747 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:43:24.709861 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali316dbf6e254: link becomes ready Apr 12 18:43:24.709997 systemd-networkd[1014]: cali316dbf6e254: Gained carrier Apr 12 18:43:24.728523 kubelet[2046]: I0412 18:43:24.728332 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-dzb5m" podStartSLOduration=40.7282836 podCreationTimestamp="2024-04-12 18:42:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:24.53381085 +0000 UTC m=+54.272363619" watchObservedRunningTime="2024-04-12 18:43:24.7282836 +0000 UTC m=+54.466836369" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.617 [INFO][3770] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0 calico-kube-controllers-7fbc698c7- calico-system 54012af1-740b-4a66-a761-679d9c75885c 813 0 2024-04-12 18:42:49 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:7fbc698c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-7fbc698c7-7dzb5 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali316dbf6e254 [] []}} ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.618 [INFO][3770] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.663 [INFO][3789] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" HandleID="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.676 [INFO][3789] ipam_plugin.go 268: Auto assigning IP ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" HandleID="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002917e0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-7fbc698c7-7dzb5", "timestamp":"2024-04-12 18:43:24.66363279 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.677 [INFO][3789] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.677 [INFO][3789] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.677 [INFO][3789] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.680 [INFO][3789] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.683 [INFO][3789] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.687 [INFO][3789] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.688 [INFO][3789] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.690 [INFO][3789] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.691 [INFO][3789] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.692 [INFO][3789] ipam.go 1682: Creating new handle: k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24 Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.695 [INFO][3789] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.702 [INFO][3789] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.702 [INFO][3789] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" host="localhost" Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.702 [INFO][3789] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:24.731049 env[1122]: 2024-04-12 18:43:24.702 [INFO][3789] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" HandleID="k8s-pod-network.c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.704 [INFO][3770] k8s.go 385: Populated endpoint ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0", GenerateName:"calico-kube-controllers-7fbc698c7-", Namespace:"calico-system", SelfLink:"", UID:"54012af1-740b-4a66-a761-679d9c75885c", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7fbc698c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-7fbc698c7-7dzb5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali316dbf6e254", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.704 [INFO][3770] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.704 [INFO][3770] dataplane_linux.go 68: Setting the host side veth name to cali316dbf6e254 ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.710 [INFO][3770] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.711 [INFO][3770] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0", GenerateName:"calico-kube-controllers-7fbc698c7-", Namespace:"calico-system", SelfLink:"", UID:"54012af1-740b-4a66-a761-679d9c75885c", ResourceVersion:"813", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7fbc698c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24", Pod:"calico-kube-controllers-7fbc698c7-7dzb5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali316dbf6e254", MAC:"6e:39:86:78:3d:f5", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:24.732096 env[1122]: 2024-04-12 18:43:24.729 [INFO][3770] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24" Namespace="calico-system" Pod="calico-kube-controllers-7fbc698c7-7dzb5" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:24.748000 audit[3843]: NETFILTER_CFG table=filter:107 family=2 entries=50 op=nft_register_chain pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:24.748000 audit[3843]: SYSCALL arch=c000003e syscall=46 success=yes exit=25632 a0=3 a1=7ffd8ccfc850 a2=0 a3=7ffd8ccfc83c items=0 ppid=3246 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.748000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:24.765599 systemd[1]: run-netns-cni\x2dc67419d7\x2d714c\x2d4310\x2de04f\x2d97ec5301f7b8.mount: Deactivated successfully. Apr 12 18:43:24.765677 systemd[1]: run-netns-cni\x2dffe5da8b\x2d751c\x2d6bf9\x2d06d3\x2d370455edfca7.mount: Deactivated successfully. Apr 12 18:43:24.777733 env[1122]: time="2024-04-12T18:43:24.777664390Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:24.777909 env[1122]: time="2024-04-12T18:43:24.777740033Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:24.777909 env[1122]: time="2024-04-12T18:43:24.777762435Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:24.777977 env[1122]: time="2024-04-12T18:43:24.777903270Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24 pid=3851 runtime=io.containerd.runc.v2 Apr 12 18:43:24.784839 systemd-networkd[1014]: cali7fe37d2a53b: Link UP Apr 12 18:43:24.786714 systemd-networkd[1014]: cali7fe37d2a53b: Gained carrier Apr 12 18:43:24.787195 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7fe37d2a53b: link becomes ready Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.687 [INFO][3795] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--7fg2s-eth0 csi-node-driver- calico-system 5bc50be2-c8a7-46d0-8144-d6770bdc0466 814 0 2024-04-12 18:42:49 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-7fg2s eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali7fe37d2a53b [] []}} ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.687 [INFO][3795] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.722 [INFO][3811] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" HandleID="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.745 [INFO][3811] ipam_plugin.go 268: Auto assigning IP ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" HandleID="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000295fe0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-7fg2s", "timestamp":"2024-04-12 18:43:24.722341848 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.745 [INFO][3811] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.745 [INFO][3811] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.745 [INFO][3811] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.749 [INFO][3811] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.753 [INFO][3811] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.755 [INFO][3811] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.756 [INFO][3811] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.758 [INFO][3811] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.758 [INFO][3811] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.766 [INFO][3811] ipam.go 1682: Creating new handle: k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934 Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.769 [INFO][3811] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.776 [INFO][3811] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.776 [INFO][3811] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" host="localhost" Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.776 [INFO][3811] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:24.796431 env[1122]: 2024-04-12 18:43:24.776 [INFO][3811] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" HandleID="k8s-pod-network.f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.779 [INFO][3795] k8s.go 385: Populated endpoint ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7fg2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bc50be2-c8a7-46d0-8144-d6770bdc0466", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-7fg2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7fe37d2a53b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.779 [INFO][3795] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.779 [INFO][3795] dataplane_linux.go 68: Setting the host side veth name to cali7fe37d2a53b ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.787 [INFO][3795] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.787 [INFO][3795] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7fg2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bc50be2-c8a7-46d0-8144-d6770bdc0466", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934", Pod:"csi-node-driver-7fg2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7fe37d2a53b", MAC:"1a:39:8b:8f:d5:f6", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:24.797438 env[1122]: 2024-04-12 18:43:24.793 [INFO][3795] k8s.go 498: Wrote updated endpoint to datastore ContainerID="f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934" Namespace="calico-system" Pod="csi-node-driver-7fg2s" WorkloadEndpoint="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:24.803853 systemd[1]: run-containerd-runc-k8s.io-c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24-runc.RyieTi.mount: Deactivated successfully. Apr 12 18:43:24.812848 systemd[1]: Started cri-containerd-c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24.scope. Apr 12 18:43:24.831196 env[1122]: time="2024-04-12T18:43:24.830229153Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:24.831196 env[1122]: time="2024-04-12T18:43:24.830345702Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:24.831196 env[1122]: time="2024-04-12T18:43:24.830429570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:24.831196 env[1122]: time="2024-04-12T18:43:24.830697586Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934 pid=3903 runtime=io.containerd.runc.v2 Apr 12 18:43:24.843767 systemd[1]: Started cri-containerd-f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934.scope. Apr 12 18:43:24.826000 audit[3898]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3898 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:43:24.885366 sshd[3787]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:24.885000 audit[3787]: USER_END pid=3787 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.885000 audit[3787]: CRED_DISP pid=3787 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:24.826000 audit[3898]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffd0ac1ce10 a2=0 a3=7ffd0ac1cdfc items=0 ppid=3246 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.826000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:43:24.887724 systemd-logind[1104]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:43:24.888096 systemd[1]: sshd@14-10.0.0.14:22-10.0.0.1:41758.service: Deactivated successfully. Apr 12 18:43:24.887000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.14:22-10.0.0.1:41758 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:24.888933 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:43:24.890239 systemd-logind[1104]: Removed session 15. Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit: BPF prog-id=162 op=LOAD Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3851 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338666139306430636466643533373661313234633237373031313465 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3851 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338666139306430636466643533373661313234633237373031313465 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit: BPF prog-id=163 op=LOAD Apr 12 18:43:24.892000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002843e0 items=0 ppid=3851 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338666139306430636466643533373661313234633237373031313465 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.892000 audit: BPF prog-id=164 op=LOAD Apr 12 18:43:24.892000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000284428 items=0 ppid=3851 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.892000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338666139306430636466643533373661313234633237373031313465 Apr 12 18:43:24.893000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:43:24.893000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { perfmon } for pid=3863 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit[3863]: AVC avc: denied { bpf } for pid=3863 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.893000 audit: BPF prog-id=165 op=LOAD Apr 12 18:43:24.893000 audit[3863]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000284838 items=0 ppid=3851 pid=3863 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.893000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338666139306430636466643533373661313234633237373031313465 Apr 12 18:43:24.895165 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.905000 audit: BPF prog-id=166 op=LOAD Apr 12 18:43:24.906000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.906000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3903 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353161626662336435626238353830303466363866643233363062 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3903 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353161626662336435626238353830303466363866643233363062 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.907000 audit: BPF prog-id=167 op=LOAD Apr 12 18:43:24.907000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0000e3ce0 items=0 ppid=3903 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353161626662336435626238353830303466363866643233363062 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.908000 audit: BPF prog-id=168 op=LOAD Apr 12 18:43:24.908000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0000e3d28 items=0 ppid=3903 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353161626662336435626238353830303466363866643233363062 Apr 12 18:43:24.909000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:43:24.909000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { perfmon } for pid=3912 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit[3912]: AVC avc: denied { bpf } for pid=3912 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:24.909000 audit: BPF prog-id=169 op=LOAD Apr 12 18:43:24.909000 audit[3912]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002cc138 items=0 ppid=3903 pid=3912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:24.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631353161626662336435626238353830303466363866643233363062 Apr 12 18:43:24.912290 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:43:24.927922 env[1122]: time="2024-04-12T18:43:24.927876152Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-7fg2s,Uid:5bc50be2-c8a7-46d0-8144-d6770bdc0466,Namespace:calico-system,Attempt:1,} returns sandbox id \"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934\"" Apr 12 18:43:24.930028 env[1122]: time="2024-04-12T18:43:24.929979037Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-7fbc698c7-7dzb5,Uid:54012af1-740b-4a66-a761-679d9c75885c,Namespace:calico-system,Attempt:1,} returns sandbox id \"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24\"" Apr 12 18:43:24.930261 env[1122]: time="2024-04-12T18:43:24.930155449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:43:25.083330 systemd-networkd[1014]: cali384dd3dbcb8: Gained IPv6LL Apr 12 18:43:25.468308 systemd-networkd[1014]: vxlan.calico: Gained IPv6LL Apr 12 18:43:25.488124 kubelet[2046]: E0412 18:43:25.488083 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:25.488678 kubelet[2046]: E0412 18:43:25.488662 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:25.531363 systemd-networkd[1014]: cali18d041771fa: Gained IPv6LL Apr 12 18:43:25.807000 audit[3947]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=3947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:25.807000 audit[3947]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4c06dde0 a2=0 a3=7ffe4c06ddcc items=0 ppid=2193 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.807000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:25.808000 audit[3947]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3947 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:25.808000 audit[3947]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffe4c06dde0 a2=0 a3=7ffe4c06ddcc items=0 ppid=2193 pid=3947 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:25.808000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:26.427346 systemd-networkd[1014]: cali316dbf6e254: Gained IPv6LL Apr 12 18:43:26.490033 kubelet[2046]: E0412 18:43:26.490004 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:26.490374 kubelet[2046]: E0412 18:43:26.490118 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:26.491372 systemd-networkd[1014]: cali7fe37d2a53b: Gained IPv6LL Apr 12 18:43:26.838000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.838000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.838000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000f7a030 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:26.838000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.838000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001025f00 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:26.838000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.966000 audit[3950]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:26.966000 audit[3950]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc662f5270 a2=0 a3=7ffc662f525c items=0 ppid=2193 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:26.966000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:26.990000 audit[3950]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3950 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:26.990000 audit[3950]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc662f5270 a2=0 a3=7ffc662f525c items=0 ppid=2193 pid=3950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:26.990000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:27.228513 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount240759073.mount: Deactivated successfully. Apr 12 18:43:27.492144 kubelet[2046]: E0412 18:43:27.492048 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:27.514000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.514000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c007b88660 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.514000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:27.517000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.517000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.517000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c00478bd40 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.517000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c010987220 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.517000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:27.517000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:27.526000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.526000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c00478bda0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.526000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:27.526000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.526000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c010987240 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.526000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:27.526000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:27.526000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00683fcb0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:43:27.526000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:28.567256 env[1122]: time="2024-04-12T18:43:28.567189022Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.584602 env[1122]: time="2024-04-12T18:43:28.584552523Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.604392 env[1122]: time="2024-04-12T18:43:28.604328066Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.631724 env[1122]: time="2024-04-12T18:43:28.631677260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:28.632503 env[1122]: time="2024-04-12T18:43:28.632450502Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:43:28.633152 env[1122]: time="2024-04-12T18:43:28.633064934Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:43:28.635330 env[1122]: time="2024-04-12T18:43:28.635295191Z" level=info msg="CreateContainer within sandbox \"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:43:28.784372 env[1122]: time="2024-04-12T18:43:28.784311912Z" level=info msg="CreateContainer within sandbox \"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"110dc1173c059456d93823b4ee39a1acca7fd668dfaf9ad22b214239882a2247\"" Apr 12 18:43:28.784959 env[1122]: time="2024-04-12T18:43:28.784916536Z" level=info msg="StartContainer for \"110dc1173c059456d93823b4ee39a1acca7fd668dfaf9ad22b214239882a2247\"" Apr 12 18:43:28.802257 systemd[1]: Started cri-containerd-110dc1173c059456d93823b4ee39a1acca7fd668dfaf9ad22b214239882a2247.scope. Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f1a3e780c38 items=0 ppid=3903 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306463313137336330353934353664393338323362346565333961 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit: BPF prog-id=170 op=LOAD Apr 12 18:43:28.815000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000286628 items=0 ppid=3903 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306463313137336330353934353664393338323362346565333961 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit: BPF prog-id=171 op=LOAD Apr 12 18:43:28.815000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000286678 items=0 ppid=3903 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306463313137336330353934353664393338323362346565333961 Apr 12 18:43:28.815000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:43:28.815000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { perfmon } for pid=3965 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit[3965]: AVC avc: denied { bpf } for pid=3965 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.815000 audit: BPF prog-id=172 op=LOAD Apr 12 18:43:28.815000 audit[3965]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000286708 items=0 ppid=3903 pid=3965 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3131306463313137336330353934353664393338323362346565333961 Apr 12 18:43:28.846612 env[1122]: time="2024-04-12T18:43:28.846552651Z" level=info msg="StartContainer for \"110dc1173c059456d93823b4ee39a1acca7fd668dfaf9ad22b214239882a2247\" returns successfully" Apr 12 18:43:29.889976 systemd[1]: Started sshd@15-10.0.0.14:22-10.0.0.1:35534.service. Apr 12 18:43:29.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.14:22-10.0.0.1:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:29.891300 kernel: kauditd_printk_skb: 212 callbacks suppressed Apr 12 18:43:29.891360 kernel: audit: type=1130 audit(1712947409.888:1359): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.14:22-10.0.0.1:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:29.939000 audit[3995]: USER_ACCT pid=3995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.941138 sshd[3995]: Accepted publickey for core from 10.0.0.1 port 35534 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:29.943000 audit[3995]: CRED_ACQ pid=3995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.949070 kernel: audit: type=1101 audit(1712947409.939:1360): pid=3995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.949120 kernel: audit: type=1103 audit(1712947409.943:1361): pid=3995 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.949142 kernel: audit: type=1006 audit(1712947409.943:1362): pid=3995 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:43:29.943000 audit[3995]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4fe00f0 a2=3 a3=0 items=0 ppid=1 pid=3995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.957246 kernel: audit: type=1300 audit(1712947409.943:1362): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcb4fe00f0 a2=3 a3=0 items=0 ppid=1 pid=3995 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.957379 kernel: audit: type=1327 audit(1712947409.943:1362): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:29.943000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:29.965021 sshd[3995]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:29.969031 systemd-logind[1104]: New session 16 of user core. Apr 12 18:43:29.969758 systemd[1]: Started session-16.scope. Apr 12 18:43:29.973000 audit[3995]: USER_START pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.974000 audit[3999]: CRED_ACQ pid=3999 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.984312 kernel: audit: type=1105 audit(1712947409.973:1363): pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:29.984943 kernel: audit: type=1103 audit(1712947409.974:1364): pid=3999 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:30.078047 sshd[3995]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:30.077000 audit[3995]: USER_END pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:30.080351 systemd[1]: sshd@15-10.0.0.14:22-10.0.0.1:35534.service: Deactivated successfully. Apr 12 18:43:30.081245 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:43:30.081901 systemd-logind[1104]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:43:30.082740 systemd-logind[1104]: Removed session 16. Apr 12 18:43:30.077000 audit[3995]: CRED_DISP pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:30.093200 kernel: audit: type=1106 audit(1712947410.077:1365): pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:30.093253 kernel: audit: type=1104 audit(1712947410.077:1366): pid=3995 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:30.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.14:22-10.0.0.1:35534 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:30.331924 env[1122]: time="2024-04-12T18:43:30.331869241Z" level=info msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.364 [WARNING][4025] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0", GenerateName:"calico-kube-controllers-7fbc698c7-", Namespace:"calico-system", SelfLink:"", UID:"54012af1-740b-4a66-a761-679d9c75885c", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7fbc698c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24", Pod:"calico-kube-controllers-7fbc698c7-7dzb5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali316dbf6e254", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.365 [INFO][4025] k8s.go 585: Cleaning up netns ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.365 [INFO][4025] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" iface="eth0" netns="" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.365 [INFO][4025] k8s.go 592: Releasing IP address(es) ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.365 [INFO][4025] utils.go 188: Calico CNI releasing IP address ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.405 [INFO][4035] ipam_plugin.go 415: Releasing address using handleID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.405 [INFO][4035] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.405 [INFO][4035] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.412 [WARNING][4035] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.413 [INFO][4035] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.414 [INFO][4035] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:30.417814 env[1122]: 2024-04-12 18:43:30.416 [INFO][4025] k8s.go 598: Teardown processing complete. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.418377 env[1122]: time="2024-04-12T18:43:30.417839535Z" level=info msg="TearDown network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" successfully" Apr 12 18:43:30.418377 env[1122]: time="2024-04-12T18:43:30.417877216Z" level=info msg="StopPodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" returns successfully" Apr 12 18:43:30.418543 env[1122]: time="2024-04-12T18:43:30.418519302Z" level=info msg="RemovePodSandbox for \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" Apr 12 18:43:30.418598 env[1122]: time="2024-04-12T18:43:30.418556021Z" level=info msg="Forcibly stopping sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\"" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.602 [WARNING][4057] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0", GenerateName:"calico-kube-controllers-7fbc698c7-", Namespace:"calico-system", SelfLink:"", UID:"54012af1-740b-4a66-a761-679d9c75885c", ResourceVersion:"827", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"7fbc698c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24", Pod:"calico-kube-controllers-7fbc698c7-7dzb5", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali316dbf6e254", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.602 [INFO][4057] k8s.go 585: Cleaning up netns ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.602 [INFO][4057] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" iface="eth0" netns="" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.602 [INFO][4057] k8s.go 592: Releasing IP address(es) ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.602 [INFO][4057] utils.go 188: Calico CNI releasing IP address ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.619 [INFO][4064] ipam_plugin.go 415: Releasing address using handleID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.619 [INFO][4064] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.619 [INFO][4064] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.737 [WARNING][4064] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.737 [INFO][4064] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" HandleID="k8s-pod-network.5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Workload="localhost-k8s-calico--kube--controllers--7fbc698c7--7dzb5-eth0" Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.739 [INFO][4064] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:30.741983 env[1122]: 2024-04-12 18:43:30.740 [INFO][4057] k8s.go 598: Teardown processing complete. ContainerID="5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418" Apr 12 18:43:30.742437 env[1122]: time="2024-04-12T18:43:30.741973542Z" level=info msg="TearDown network for sandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" successfully" Apr 12 18:43:30.987925 env[1122]: time="2024-04-12T18:43:30.987865827Z" level=info msg="RemovePodSandbox \"5883be869754d42b637a4779882eb1067529fa1930892c5352c0492aee489418\" returns successfully" Apr 12 18:43:30.988511 env[1122]: time="2024-04-12T18:43:30.988474220Z" level=info msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.020 [WARNING][4087] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--mxd6w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c246aba7-de31-4705-bd17-166af7cef71b", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2", Pod:"coredns-5d78c9869d-mxd6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali384dd3dbcb8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.021 [INFO][4087] k8s.go 585: Cleaning up netns ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.021 [INFO][4087] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" iface="eth0" netns="" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.021 [INFO][4087] k8s.go 592: Releasing IP address(es) ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.021 [INFO][4087] utils.go 188: Calico CNI releasing IP address ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.039 [INFO][4094] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.039 [INFO][4094] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.039 [INFO][4094] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.045 [WARNING][4094] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.045 [INFO][4094] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.047 [INFO][4094] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:31.050103 env[1122]: 2024-04-12 18:43:31.048 [INFO][4087] k8s.go 598: Teardown processing complete. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.050710 env[1122]: time="2024-04-12T18:43:31.050129304Z" level=info msg="TearDown network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" successfully" Apr 12 18:43:31.050710 env[1122]: time="2024-04-12T18:43:31.050168398Z" level=info msg="StopPodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" returns successfully" Apr 12 18:43:31.050843 env[1122]: time="2024-04-12T18:43:31.050796408Z" level=info msg="RemovePodSandbox for \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" Apr 12 18:43:31.050889 env[1122]: time="2024-04-12T18:43:31.050842245Z" level=info msg="Forcibly stopping sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\"" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.083 [WARNING][4117] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--mxd6w-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c246aba7-de31-4705-bd17-166af7cef71b", ResourceVersion:"843", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2496dcb26d7f859bc1905b6888338cb5a1a01b9583cd4cb07ff2ae7ab904e5a2", Pod:"coredns-5d78c9869d-mxd6w", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali384dd3dbcb8", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.083 [INFO][4117] k8s.go 585: Cleaning up netns ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.083 [INFO][4117] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" iface="eth0" netns="" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.083 [INFO][4117] k8s.go 592: Releasing IP address(es) ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.083 [INFO][4117] utils.go 188: Calico CNI releasing IP address ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.103 [INFO][4124] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.103 [INFO][4124] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.103 [INFO][4124] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.109 [WARNING][4124] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.109 [INFO][4124] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" HandleID="k8s-pod-network.d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Workload="localhost-k8s-coredns--5d78c9869d--mxd6w-eth0" Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.110 [INFO][4124] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:31.113632 env[1122]: 2024-04-12 18:43:31.112 [INFO][4117] k8s.go 598: Teardown processing complete. ContainerID="d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00" Apr 12 18:43:31.114107 env[1122]: time="2024-04-12T18:43:31.113696506Z" level=info msg="TearDown network for sandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" successfully" Apr 12 18:43:31.649514 env[1122]: time="2024-04-12T18:43:31.649469275Z" level=info msg="RemovePodSandbox \"d7bf77b8c3d6dfec4392a81e557cfbb64a6bd97b666d588aa24d164b8923cc00\" returns successfully" Apr 12 18:43:31.650431 env[1122]: time="2024-04-12T18:43:31.650382825Z" level=info msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.971 [WARNING][4146] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--dzb5m-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e", Pod:"coredns-5d78c9869d-dzb5m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18d041771fa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.971 [INFO][4146] k8s.go 585: Cleaning up netns ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.971 [INFO][4146] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" iface="eth0" netns="" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.971 [INFO][4146] k8s.go 592: Releasing IP address(es) ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.971 [INFO][4146] utils.go 188: Calico CNI releasing IP address ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.987 [INFO][4154] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.988 [INFO][4154] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.988 [INFO][4154] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.993 [WARNING][4154] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.993 [INFO][4154] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.995 [INFO][4154] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:31.998786 env[1122]: 2024-04-12 18:43:31.996 [INFO][4146] k8s.go 598: Teardown processing complete. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:31.998786 env[1122]: time="2024-04-12T18:43:31.998741735Z" level=info msg="TearDown network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" successfully" Apr 12 18:43:31.998786 env[1122]: time="2024-04-12T18:43:31.998780689Z" level=info msg="StopPodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" returns successfully" Apr 12 18:43:31.999526 env[1122]: time="2024-04-12T18:43:31.999399622Z" level=info msg="RemovePodSandbox for \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" Apr 12 18:43:31.999526 env[1122]: time="2024-04-12T18:43:31.999435860Z" level=info msg="Forcibly stopping sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\"" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.147 [WARNING][4177] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--dzb5m-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"278e70b1-dad9-4b95-8b8a-ed2fa6fc1fa3", ResourceVersion:"837", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2a4f56369e096e269bfb6fe872250b5578e7083b81990d83fae1b83befaa859e", Pod:"coredns-5d78c9869d-dzb5m", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali18d041771fa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.148 [INFO][4177] k8s.go 585: Cleaning up netns ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.148 [INFO][4177] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" iface="eth0" netns="" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.148 [INFO][4177] k8s.go 592: Releasing IP address(es) ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.148 [INFO][4177] utils.go 188: Calico CNI releasing IP address ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.230 [INFO][4184] ipam_plugin.go 415: Releasing address using handleID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.230 [INFO][4184] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.230 [INFO][4184] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.251 [WARNING][4184] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.251 [INFO][4184] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" HandleID="k8s-pod-network.ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Workload="localhost-k8s-coredns--5d78c9869d--dzb5m-eth0" Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.252 [INFO][4184] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:32.256139 env[1122]: 2024-04-12 18:43:32.254 [INFO][4177] k8s.go 598: Teardown processing complete. ContainerID="ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77" Apr 12 18:43:32.256139 env[1122]: time="2024-04-12T18:43:32.255750301Z" level=info msg="TearDown network for sandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" successfully" Apr 12 18:43:32.764230 env[1122]: time="2024-04-12T18:43:32.764148695Z" level=info msg="RemovePodSandbox \"ac6426a80795c8ba9e7315a7f819bd2ee3f01e8d1f927b29337d27cc27fcdf77\" returns successfully" Apr 12 18:43:32.764789 env[1122]: time="2024-04-12T18:43:32.764764522Z" level=info msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.960 [WARNING][4207] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7fg2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bc50be2-c8a7-46d0-8144-d6770bdc0466", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934", Pod:"csi-node-driver-7fg2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7fe37d2a53b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.960 [INFO][4207] k8s.go 585: Cleaning up netns ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.960 [INFO][4207] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" iface="eth0" netns="" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.960 [INFO][4207] k8s.go 592: Releasing IP address(es) ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.960 [INFO][4207] utils.go 188: Calico CNI releasing IP address ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.978 [INFO][4214] ipam_plugin.go 415: Releasing address using handleID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.978 [INFO][4214] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.978 [INFO][4214] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.996 [WARNING][4214] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.996 [INFO][4214] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:32.998 [INFO][4214] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:33.001829 env[1122]: 2024-04-12 18:43:33.000 [INFO][4207] k8s.go 598: Teardown processing complete. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.002423 env[1122]: time="2024-04-12T18:43:33.001831999Z" level=info msg="TearDown network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" successfully" Apr 12 18:43:33.002423 env[1122]: time="2024-04-12T18:43:33.001872785Z" level=info msg="StopPodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" returns successfully" Apr 12 18:43:33.002491 env[1122]: time="2024-04-12T18:43:33.002439160Z" level=info msg="RemovePodSandbox for \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" Apr 12 18:43:33.002525 env[1122]: time="2024-04-12T18:43:33.002470389Z" level=info msg="Forcibly stopping sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\"" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.033 [WARNING][4236] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--7fg2s-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"5bc50be2-c8a7-46d0-8144-d6770bdc0466", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 49, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934", Pod:"csi-node-driver-7fg2s", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali7fe37d2a53b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.033 [INFO][4236] k8s.go 585: Cleaning up netns ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.033 [INFO][4236] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" iface="eth0" netns="" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.033 [INFO][4236] k8s.go 592: Releasing IP address(es) ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.033 [INFO][4236] utils.go 188: Calico CNI releasing IP address ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.050 [INFO][4243] ipam_plugin.go 415: Releasing address using handleID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.050 [INFO][4243] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.050 [INFO][4243] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.056 [WARNING][4243] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.056 [INFO][4243] ipam_plugin.go 443: Releasing address using workloadID ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" HandleID="k8s-pod-network.acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Workload="localhost-k8s-csi--node--driver--7fg2s-eth0" Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.058 [INFO][4243] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:43:33.061801 env[1122]: 2024-04-12 18:43:33.059 [INFO][4236] k8s.go 598: Teardown processing complete. ContainerID="acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa" Apr 12 18:43:33.062398 env[1122]: time="2024-04-12T18:43:33.061836107Z" level=info msg="TearDown network for sandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" successfully" Apr 12 18:43:33.818124 env[1122]: time="2024-04-12T18:43:33.818057905Z" level=info msg="RemovePodSandbox \"acbf5bfa7be2335a4a6c3e9d1137b7c0e2295718dd460b818f309da1d50484fa\" returns successfully" Apr 12 18:43:35.082725 systemd[1]: Started sshd@16-10.0.0.14:22-10.0.0.1:35540.service. Apr 12 18:43:35.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.14:22-10.0.0.1:35540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.083738 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:43:35.083774 kernel: audit: type=1130 audit(1712947415.081:1368): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.14:22-10.0.0.1:35540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.154000 audit[4265]: USER_ACCT pid=4265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.156031 sshd[4265]: Accepted publickey for core from 10.0.0.1 port 35540 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:35.156000 audit[4265]: CRED_ACQ pid=4265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.160348 sshd[4265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:35.164255 kernel: audit: type=1101 audit(1712947415.154:1369): pid=4265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.164365 kernel: audit: type=1103 audit(1712947415.156:1370): pid=4265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.164392 kernel: audit: type=1006 audit(1712947415.156:1371): pid=4265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:43:35.164788 systemd-logind[1104]: New session 17 of user core. Apr 12 18:43:35.165622 systemd[1]: Started session-17.scope. Apr 12 18:43:35.156000 audit[4265]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe911fc5b0 a2=3 a3=0 items=0 ppid=1 pid=4265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.170771 kernel: audit: type=1300 audit(1712947415.156:1371): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe911fc5b0 a2=3 a3=0 items=0 ppid=1 pid=4265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.170826 kernel: audit: type=1327 audit(1712947415.156:1371): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:35.156000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:35.168000 audit[4265]: USER_START pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.176741 kernel: audit: type=1105 audit(1712947415.168:1372): pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.176789 kernel: audit: type=1103 audit(1712947415.170:1373): pid=4267 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.170000 audit[4267]: CRED_ACQ pid=4267 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.273652 sshd[4265]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:35.273000 audit[4265]: USER_END pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.276126 systemd[1]: sshd@16-10.0.0.14:22-10.0.0.1:35540.service: Deactivated successfully. Apr 12 18:43:35.276662 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:43:35.277271 systemd-logind[1104]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:43:35.278123 systemd[1]: Started sshd@17-10.0.0.14:22-10.0.0.1:35552.service. Apr 12 18:43:35.279008 systemd-logind[1104]: Removed session 17. Apr 12 18:43:35.280209 kernel: audit: type=1106 audit(1712947415.273:1374): pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.273000 audit[4265]: CRED_DISP pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.14:22-10.0.0.1:35540 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.14:22-10.0.0.1:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.287203 kernel: audit: type=1104 audit(1712947415.273:1375): pid=4265 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.318000 audit[4279]: USER_ACCT pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.319496 sshd[4279]: Accepted publickey for core from 10.0.0.1 port 35552 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:35.318000 audit[4279]: CRED_ACQ pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.318000 audit[4279]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a0c7370 a2=3 a3=0 items=0 ppid=1 pid=4279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.318000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:35.320383 sshd[4279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:35.323955 systemd-logind[1104]: New session 18 of user core. Apr 12 18:43:35.324850 systemd[1]: Started session-18.scope. Apr 12 18:43:35.327000 audit[4279]: USER_START pid=4279 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.328000 audit[4281]: CRED_ACQ pid=4281 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.978966 sshd[4279]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:35.978000 audit[4279]: USER_END pid=4279 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.979000 audit[4279]: CRED_DISP pid=4279 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:35.982940 systemd[1]: Started sshd@18-10.0.0.14:22-10.0.0.1:35562.service. Apr 12 18:43:35.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.14:22-10.0.0.1:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.985175 systemd[1]: sshd@17-10.0.0.14:22-10.0.0.1:35552.service: Deactivated successfully. Apr 12 18:43:35.984000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.14:22-10.0.0.1:35552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:35.985918 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:43:35.986627 systemd-logind[1104]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:43:35.987629 systemd-logind[1104]: Removed session 18. Apr 12 18:43:36.024000 audit[4289]: USER_ACCT pid=4289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.026417 sshd[4289]: Accepted publickey for core from 10.0.0.1 port 35562 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:36.026000 audit[4289]: CRED_ACQ pid=4289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.026000 audit[4289]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc1c093d0 a2=3 a3=0 items=0 ppid=1 pid=4289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:36.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:36.027528 sshd[4289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:36.030812 systemd-logind[1104]: New session 19 of user core. Apr 12 18:43:36.031613 systemd[1]: Started session-19.scope. Apr 12 18:43:36.033000 audit[4289]: USER_START pid=4289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.035000 audit[4292]: CRED_ACQ pid=4292 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.181518 sshd[4289]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:36.181000 audit[4289]: USER_END pid=4289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.181000 audit[4289]: CRED_DISP pid=4289 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:36.184163 systemd[1]: sshd@18-10.0.0.14:22-10.0.0.1:35562.service: Deactivated successfully. Apr 12 18:43:36.183000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.14:22-10.0.0.1:35562 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:36.184936 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:43:36.185489 systemd-logind[1104]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:43:36.186256 systemd-logind[1104]: Removed session 19. Apr 12 18:43:37.647336 kubelet[2046]: E0412 18:43:37.647306 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:37.880917 env[1122]: time="2024-04-12T18:43:37.880855726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:37.914419 env[1122]: time="2024-04-12T18:43:37.914283573Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:37.927050 env[1122]: time="2024-04-12T18:43:37.926992843Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:37.939300 env[1122]: time="2024-04-12T18:43:37.939256115Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:37.940196 env[1122]: time="2024-04-12T18:43:37.940143352Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:43:37.940965 env[1122]: time="2024-04-12T18:43:37.940848472Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:43:37.949203 env[1122]: time="2024-04-12T18:43:37.948545765Z" level=info msg="CreateContainer within sandbox \"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:43:38.811200 env[1122]: time="2024-04-12T18:43:38.811132320Z" level=info msg="CreateContainer within sandbox \"c8fa90d0cdfd5376a124c2770114e70646a05ebbf62f9a578a443cc8277edf24\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"0fd2a7575ca11e7c64d014c783083442fd0ab7b575c39f27b389d4d047474e1e\"" Apr 12 18:43:38.811737 env[1122]: time="2024-04-12T18:43:38.811703687Z" level=info msg="StartContainer for \"0fd2a7575ca11e7c64d014c783083442fd0ab7b575c39f27b389d4d047474e1e\"" Apr 12 18:43:38.829580 systemd[1]: Started cri-containerd-0fd2a7575ca11e7c64d014c783083442fd0ab7b575c39f27b389d4d047474e1e.scope. Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit: BPF prog-id=173 op=LOAD Apr 12 18:43:38.838000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.838000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3851 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643261373537356361313165376336346430313463373833303833 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3851 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643261373537356361313165376336346430313463373833303833 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit: BPF prog-id=174 op=LOAD Apr 12 18:43:38.839000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003da020 items=0 ppid=3851 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643261373537356361313165376336346430313463373833303833 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit: BPF prog-id=175 op=LOAD Apr 12 18:43:38.839000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003da068 items=0 ppid=3851 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643261373537356361313165376336346430313463373833303833 Apr 12 18:43:38.839000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:43:38.839000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { perfmon } for pid=4333 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit[4333]: AVC avc: denied { bpf } for pid=4333 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:38.839000 audit: BPF prog-id=176 op=LOAD Apr 12 18:43:38.839000 audit[4333]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003da478 items=0 ppid=3851 pid=4333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.839000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066643261373537356361313165376336346430313463373833303833 Apr 12 18:43:38.932142 env[1122]: time="2024-04-12T18:43:38.932072642Z" level=info msg="StartContainer for \"0fd2a7575ca11e7c64d014c783083442fd0ab7b575c39f27b389d4d047474e1e\" returns successfully" Apr 12 18:43:39.535412 kubelet[2046]: I0412 18:43:39.533791 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-7fbc698c7-7dzb5" podStartSLOduration=37.524386765 podCreationTimestamp="2024-04-12 18:42:49 +0000 UTC" firstStartedPulling="2024-04-12 18:43:24.9311691 +0000 UTC m=+54.669721869" lastFinishedPulling="2024-04-12 18:43:37.940534385 +0000 UTC m=+67.679087154" observedRunningTime="2024-04-12 18:43:39.533201122 +0000 UTC m=+69.271753891" watchObservedRunningTime="2024-04-12 18:43:39.53375205 +0000 UTC m=+69.272304809" Apr 12 18:43:41.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.14:22-10.0.0.1:53308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:41.186330 systemd[1]: Started sshd@19-10.0.0.14:22-10.0.0.1:53308.service. Apr 12 18:43:41.187586 kernel: kauditd_printk_skb: 80 callbacks suppressed Apr 12 18:43:41.187655 kernel: audit: type=1130 audit(1712947421.185:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.14:22-10.0.0.1:53308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:41.228000 audit[4383]: USER_ACCT pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.229780 sshd[4383]: Accepted publickey for core from 10.0.0.1 port 53308 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:41.231741 sshd[4383]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:41.230000 audit[4383]: CRED_ACQ pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.235424 systemd-logind[1104]: New session 20 of user core. Apr 12 18:43:41.236291 systemd[1]: Started session-20.scope. Apr 12 18:43:41.237495 kernel: audit: type=1101 audit(1712947421.228:1414): pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.237560 kernel: audit: type=1103 audit(1712947421.230:1415): pid=4383 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.237588 kernel: audit: type=1006 audit(1712947421.230:1416): pid=4383 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:43:41.230000 audit[4383]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06656080 a2=3 a3=0 items=0 ppid=1 pid=4383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.244380 kernel: audit: type=1300 audit(1712947421.230:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd06656080 a2=3 a3=0 items=0 ppid=1 pid=4383 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.244432 kernel: audit: type=1327 audit(1712947421.230:1416): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:41.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:41.245713 kernel: audit: type=1105 audit(1712947421.239:1417): pid=4383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.239000 audit[4383]: USER_START pid=4383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.240000 audit[4385]: CRED_ACQ pid=4385 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.256356 kernel: audit: type=1103 audit(1712947421.240:1418): pid=4385 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.259539 env[1122]: time="2024-04-12T18:43:41.259503711Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:41.271853 env[1122]: time="2024-04-12T18:43:41.271789571Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:41.275570 env[1122]: time="2024-04-12T18:43:41.275531327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:41.278967 env[1122]: time="2024-04-12T18:43:41.278931113Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:41.279580 env[1122]: time="2024-04-12T18:43:41.279532779Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:43:41.281303 env[1122]: time="2024-04-12T18:43:41.281242616Z" level=info msg="CreateContainer within sandbox \"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:43:41.301084 env[1122]: time="2024-04-12T18:43:41.301009805Z" level=info msg="CreateContainer within sandbox \"f151abfb3d5bb858004f68fd2360b126f20e2127382d0e4c0b4be0c9aada7934\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"fd9ec567595c0274dca3049bbedc1a8a0b1a137bfa81f7f6613c939ba6e0b9e7\"" Apr 12 18:43:41.301895 env[1122]: time="2024-04-12T18:43:41.301792826Z" level=info msg="StartContainer for \"fd9ec567595c0274dca3049bbedc1a8a0b1a137bfa81f7f6613c939ba6e0b9e7\"" Apr 12 18:43:41.328300 systemd[1]: run-containerd-runc-k8s.io-fd9ec567595c0274dca3049bbedc1a8a0b1a137bfa81f7f6613c939ba6e0b9e7-runc.XPRVWg.mount: Deactivated successfully. Apr 12 18:43:41.331884 systemd[1]: Started cri-containerd-fd9ec567595c0274dca3049bbedc1a8a0b1a137bfa81f7f6613c939ba6e0b9e7.scope. Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe4ba4ce2f8 items=0 ppid=3903 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.356982 kernel: audit: type=1400 audit(1712947421.346:1419): avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.357123 kernel: audit: type=1300 audit(1712947421.346:1419): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fe4ba4ce2f8 items=0 ppid=3903 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396563353637353935633032373464636133303439626265646331 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.346000 audit: BPF prog-id=177 op=LOAD Apr 12 18:43:41.346000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000024478 items=0 ppid=3903 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.346000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396563353637353935633032373464636133303439626265646331 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit: BPF prog-id=178 op=LOAD Apr 12 18:43:41.356000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0000244c8 items=0 ppid=3903 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396563353637353935633032373464636133303439626265646331 Apr 12 18:43:41.356000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:43:41.356000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { perfmon } for pid=4402 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit[4402]: AVC avc: denied { bpf } for pid=4402 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:41.356000 audit: BPF prog-id=179 op=LOAD Apr 12 18:43:41.356000 audit[4402]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000024558 items=0 ppid=3903 pid=4402 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:41.356000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6664396563353637353935633032373464636133303439626265646331 Apr 12 18:43:41.371415 env[1122]: time="2024-04-12T18:43:41.371284714Z" level=info msg="StartContainer for \"fd9ec567595c0274dca3049bbedc1a8a0b1a137bfa81f7f6613c939ba6e0b9e7\" returns successfully" Apr 12 18:43:41.377793 sshd[4383]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:41.377000 audit[4383]: USER_END pid=4383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.377000 audit[4383]: CRED_DISP pid=4383 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:41.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.14:22-10.0.0.1:53308 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:41.380818 systemd[1]: sshd@19-10.0.0.14:22-10.0.0.1:53308.service: Deactivated successfully. Apr 12 18:43:41.381684 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:43:41.382542 systemd-logind[1104]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:43:41.383246 systemd-logind[1104]: Removed session 20. Apr 12 18:43:41.425342 kubelet[2046]: I0412 18:43:41.425307 2046 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:43:41.425830 kubelet[2046]: I0412 18:43:41.425813 2046 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:43:43.128000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:43.128000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002392080 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:43.128000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:43.133000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:43.133000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002486000 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:43.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:43.133000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:43.133000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002486020 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:43.133000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:43.134000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:43.134000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002486060 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:43:43.134000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:46.382739 systemd[1]: Started sshd@20-10.0.0.14:22-10.0.0.1:53324.service. Apr 12 18:43:46.384345 kernel: kauditd_printk_skb: 56 callbacks suppressed Apr 12 18:43:46.384692 kernel: audit: type=1130 audit(1712947426.381:1432): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.14:22-10.0.0.1:53324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:46.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.14:22-10.0.0.1:53324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:46.420000 audit[4457]: USER_ACCT pid=4457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.422397 sshd[4457]: Accepted publickey for core from 10.0.0.1 port 53324 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:46.425000 audit[4457]: CRED_ACQ pid=4457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.426968 sshd[4457]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:46.430505 kernel: audit: type=1101 audit(1712947426.420:1433): pid=4457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.430617 kernel: audit: type=1103 audit(1712947426.425:1434): pid=4457 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.430806 systemd-logind[1104]: New session 21 of user core. Apr 12 18:43:46.431642 systemd[1]: Started session-21.scope. Apr 12 18:43:46.433309 kernel: audit: type=1006 audit(1712947426.425:1435): pid=4457 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:43:46.433365 kernel: audit: type=1300 audit(1712947426.425:1435): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc88a910f0 a2=3 a3=0 items=0 ppid=1 pid=4457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:46.425000 audit[4457]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc88a910f0 a2=3 a3=0 items=0 ppid=1 pid=4457 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:46.425000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:46.438939 kernel: audit: type=1327 audit(1712947426.425:1435): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:46.438990 kernel: audit: type=1105 audit(1712947426.435:1436): pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.435000 audit[4457]: USER_START pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.443551 kernel: audit: type=1103 audit(1712947426.437:1437): pid=4459 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.437000 audit[4459]: CRED_ACQ pid=4459 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.794084 sshd[4457]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:46.793000 audit[4457]: USER_END pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.796395 systemd[1]: sshd@20-10.0.0.14:22-10.0.0.1:53324.service: Deactivated successfully. Apr 12 18:43:46.797140 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:43:46.797644 systemd-logind[1104]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:43:46.798381 systemd-logind[1104]: Removed session 21. Apr 12 18:43:46.793000 audit[4457]: CRED_DISP pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.802935 kernel: audit: type=1106 audit(1712947426.793:1438): pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.802989 kernel: audit: type=1104 audit(1712947426.793:1439): pid=4457 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:46.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.14:22-10.0.0.1:53324 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:51.798631 systemd[1]: Started sshd@21-10.0.0.14:22-10.0.0.1:55866.service. Apr 12 18:43:51.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.14:22-10.0.0.1:55866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:51.800043 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:43:51.800149 kernel: audit: type=1130 audit(1712947431.798:1441): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.14:22-10.0.0.1:55866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:51.837000 audit[4470]: USER_ACCT pid=4470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.838109 sshd[4470]: Accepted publickey for core from 10.0.0.1 port 55866 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:51.839939 sshd[4470]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:51.839000 audit[4470]: CRED_ACQ pid=4470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.843668 systemd-logind[1104]: New session 22 of user core. Apr 12 18:43:51.844738 systemd[1]: Started session-22.scope. Apr 12 18:43:51.847457 kernel: audit: type=1101 audit(1712947431.837:1442): pid=4470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.847519 kernel: audit: type=1103 audit(1712947431.839:1443): pid=4470 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.847549 kernel: audit: type=1006 audit(1712947431.839:1444): pid=4470 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:43:51.839000 audit[4470]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda03a0620 a2=3 a3=0 items=0 ppid=1 pid=4470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:51.854904 kernel: audit: type=1300 audit(1712947431.839:1444): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda03a0620 a2=3 a3=0 items=0 ppid=1 pid=4470 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:51.854962 kernel: audit: type=1327 audit(1712947431.839:1444): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:51.839000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:51.849000 audit[4470]: USER_START pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.860432 kernel: audit: type=1105 audit(1712947431.849:1445): pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.860483 kernel: audit: type=1103 audit(1712947431.850:1446): pid=4472 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.850000 audit[4472]: CRED_ACQ pid=4472 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.951069 sshd[4470]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:51.951000 audit[4470]: USER_END pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.953013 systemd[1]: sshd@21-10.0.0.14:22-10.0.0.1:55866.service: Deactivated successfully. Apr 12 18:43:51.953809 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:43:51.954417 systemd-logind[1104]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:43:51.955115 systemd-logind[1104]: Removed session 22. Apr 12 18:43:51.951000 audit[4470]: CRED_DISP pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.959679 kernel: audit: type=1106 audit(1712947431.951:1447): pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.959736 kernel: audit: type=1104 audit(1712947431.951:1448): pid=4470 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:51.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.14:22-10.0.0.1:55866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:53.372960 systemd[1]: run-containerd-runc-k8s.io-0fd2a7575ca11e7c64d014c783083442fd0ab7b575c39f27b389d4d047474e1e-runc.rsSVP7.mount: Deactivated successfully. Apr 12 18:43:56.347742 kubelet[2046]: E0412 18:43:56.347697 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:56.955549 systemd[1]: Started sshd@22-10.0.0.14:22-10.0.0.1:55874.service. Apr 12 18:43:56.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.14:22-10.0.0.1:55874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:56.956933 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:43:56.956985 kernel: audit: type=1130 audit(1712947436.954:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.14:22-10.0.0.1:55874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:57.024000 audit[4509]: USER_ACCT pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.025722 sshd[4509]: Accepted publickey for core from 10.0.0.1 port 55874 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:57.027775 sshd[4509]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:57.026000 audit[4509]: CRED_ACQ pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.031724 systemd-logind[1104]: New session 23 of user core. Apr 12 18:43:57.032713 systemd[1]: Started session-23.scope. Apr 12 18:43:57.033315 kernel: audit: type=1101 audit(1712947437.024:1451): pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.033461 kernel: audit: type=1103 audit(1712947437.026:1452): pid=4509 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.033491 kernel: audit: type=1006 audit(1712947437.026:1453): pid=4509 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:43:57.026000 audit[4509]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e3b4fe0 a2=3 a3=0 items=0 ppid=1 pid=4509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:57.039891 kernel: audit: type=1300 audit(1712947437.026:1453): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2e3b4fe0 a2=3 a3=0 items=0 ppid=1 pid=4509 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:57.039928 kernel: audit: type=1327 audit(1712947437.026:1453): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:57.026000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:57.035000 audit[4509]: USER_START pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.045444 kernel: audit: type=1105 audit(1712947437.035:1454): pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.045490 kernel: audit: type=1103 audit(1712947437.037:1455): pid=4511 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.037000 audit[4511]: CRED_ACQ pid=4511 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.136065 sshd[4509]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:57.135000 audit[4509]: USER_END pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.138349 systemd[1]: sshd@22-10.0.0.14:22-10.0.0.1:55874.service: Deactivated successfully. Apr 12 18:43:57.139075 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:43:57.139891 systemd-logind[1104]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:43:57.140553 systemd-logind[1104]: Removed session 23. Apr 12 18:43:57.135000 audit[4509]: CRED_DISP pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.169943 kernel: audit: type=1106 audit(1712947437.135:1456): pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.170009 kernel: audit: type=1104 audit(1712947437.135:1457): pid=4509 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:57.137000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.14:22-10.0.0.1:55874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:01.347454 kubelet[2046]: E0412 18:44:01.347336 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:02.141528 systemd[1]: Started sshd@23-10.0.0.14:22-10.0.0.1:58862.service. Apr 12 18:44:02.147065 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:02.147117 kernel: audit: type=1130 audit(1712947442.140:1459): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.14:22-10.0.0.1:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:02.140000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.14:22-10.0.0.1:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:02.180000 audit[4522]: USER_ACCT pid=4522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.182327 sshd[4522]: Accepted publickey for core from 10.0.0.1 port 58862 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:02.185645 sshd[4522]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:02.184000 audit[4522]: CRED_ACQ pid=4522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.188688 systemd-logind[1104]: New session 24 of user core. Apr 12 18:44:02.189391 systemd[1]: Started session-24.scope. Apr 12 18:44:02.189651 kernel: audit: type=1101 audit(1712947442.180:1460): pid=4522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.189682 kernel: audit: type=1103 audit(1712947442.184:1461): pid=4522 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.189698 kernel: audit: type=1006 audit(1712947442.184:1462): pid=4522 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:44:02.184000 audit[4522]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef56cb880 a2=3 a3=0 items=0 ppid=1 pid=4522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:02.195814 kernel: audit: type=1300 audit(1712947442.184:1462): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffef56cb880 a2=3 a3=0 items=0 ppid=1 pid=4522 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:02.195864 kernel: audit: type=1327 audit(1712947442.184:1462): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:02.184000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:02.197194 kernel: audit: type=1105 audit(1712947442.192:1463): pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.192000 audit[4522]: USER_START pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.193000 audit[4524]: CRED_ACQ pid=4524 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.205196 kernel: audit: type=1103 audit(1712947442.193:1464): pid=4524 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.293326 sshd[4522]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:02.293000 audit[4522]: USER_END pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.296455 systemd[1]: sshd@23-10.0.0.14:22-10.0.0.1:58862.service: Deactivated successfully. Apr 12 18:44:02.297168 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:44:02.297830 systemd-logind[1104]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:44:02.299107 systemd[1]: Started sshd@24-10.0.0.14:22-10.0.0.1:58866.service. Apr 12 18:44:02.303765 kernel: audit: type=1106 audit(1712947442.293:1465): pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.303881 kernel: audit: type=1104 audit(1712947442.293:1466): pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.293000 audit[4522]: CRED_DISP pid=4522 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.300848 systemd-logind[1104]: Removed session 24. Apr 12 18:44:02.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.14:22-10.0.0.1:58862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:02.298000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.14:22-10.0.0.1:58866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:02.340123 sshd[4535]: Accepted publickey for core from 10.0.0.1 port 58866 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:02.338000 audit[4535]: USER_ACCT pid=4535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.340000 audit[4535]: CRED_ACQ pid=4535 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.340000 audit[4535]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffde40b43c0 a2=3 a3=0 items=0 ppid=1 pid=4535 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:02.340000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:02.341613 sshd[4535]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:02.345255 systemd-logind[1104]: New session 25 of user core. Apr 12 18:44:02.345979 systemd[1]: Started session-25.scope. Apr 12 18:44:02.354000 audit[4535]: USER_START pid=4535 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:02.355000 audit[4537]: CRED_ACQ pid=4537 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.036949 sshd[4535]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:03.036000 audit[4535]: USER_END pid=4535 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.037000 audit[4535]: CRED_DISP pid=4535 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.040464 systemd[1]: Started sshd@25-10.0.0.14:22-10.0.0.1:58876.service. Apr 12 18:44:03.040880 systemd[1]: sshd@24-10.0.0.14:22-10.0.0.1:58866.service: Deactivated successfully. Apr 12 18:44:03.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.14:22-10.0.0.1:58876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.14:22-10.0.0.1:58866 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.041695 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:44:03.042464 systemd-logind[1104]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:44:03.043502 systemd-logind[1104]: Removed session 25. Apr 12 18:44:03.080000 audit[4546]: USER_ACCT pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.082381 sshd[4546]: Accepted publickey for core from 10.0.0.1 port 58876 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:03.081000 audit[4546]: CRED_ACQ pid=4546 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.081000 audit[4546]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe8e5497d0 a2=3 a3=0 items=0 ppid=1 pid=4546 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.081000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:03.083268 sshd[4546]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:03.086773 systemd-logind[1104]: New session 26 of user core. Apr 12 18:44:03.087478 systemd[1]: Started session-26.scope. Apr 12 18:44:03.090000 audit[4546]: USER_START pid=4546 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.091000 audit[4549]: CRED_ACQ pid=4549 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.347899 kubelet[2046]: E0412 18:44:03.347785 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:03.947000 audit[4546]: USER_END pid=4546 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.947000 audit[4546]: CRED_DISP pid=4546 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.947312 sshd[4546]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:03.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.14:22-10.0.0.1:58876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.950000 audit[4579]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:03.950923 systemd[1]: sshd@25-10.0.0.14:22-10.0.0.1:58876.service: Deactivated successfully. Apr 12 18:44:03.951640 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:44:03.952642 systemd-logind[1104]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:44:03.950000 audit[4579]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd20eaf280 a2=0 a3=7ffd20eaf26c items=0 ppid=2193 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.950000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:03.953837 systemd[1]: Started sshd@26-10.0.0.14:22-10.0.0.1:58892.service. Apr 12 18:44:03.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.14:22-10.0.0.1:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.954761 systemd-logind[1104]: Removed session 26. Apr 12 18:44:03.952000 audit[4579]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4579 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:03.952000 audit[4579]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd20eaf280 a2=0 a3=0 items=0 ppid=2193 pid=4579 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.952000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:03.964000 audit[4583]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:03.964000 audit[4583]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7fffb6bde0f0 a2=0 a3=7fffb6bde0dc items=0 ppid=2193 pid=4583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.964000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:03.965000 audit[4583]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4583 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:03.965000 audit[4583]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fffb6bde0f0 a2=0 a3=0 items=0 ppid=2193 pid=4583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.965000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:03.999000 audit[4581]: USER_ACCT pid=4581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.000855 sshd[4581]: Accepted publickey for core from 10.0.0.1 port 58892 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:04.000000 audit[4581]: CRED_ACQ pid=4581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.000000 audit[4581]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcadc7caa0 a2=3 a3=0 items=0 ppid=1 pid=4581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:04.000000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:04.001861 sshd[4581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:04.005498 systemd-logind[1104]: New session 27 of user core. Apr 12 18:44:04.006560 systemd[1]: Started session-27.scope. Apr 12 18:44:04.009000 audit[4581]: USER_START pid=4581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.010000 audit[4585]: CRED_ACQ pid=4585 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.435227 sshd[4581]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:04.436000 audit[4581]: USER_END pid=4581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.436000 audit[4581]: CRED_DISP pid=4581 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.440230 systemd[1]: sshd@26-10.0.0.14:22-10.0.0.1:58892.service: Deactivated successfully. Apr 12 18:44:04.441115 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:44:04.439000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.14:22-10.0.0.1:58892 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:04.443330 systemd[1]: Started sshd@27-10.0.0.14:22-10.0.0.1:58894.service. Apr 12 18:44:04.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.14:22-10.0.0.1:58894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:04.444531 systemd-logind[1104]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:44:04.446095 systemd-logind[1104]: Removed session 27. Apr 12 18:44:04.488000 audit[4594]: USER_ACCT pid=4594 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.490012 sshd[4594]: Accepted publickey for core from 10.0.0.1 port 58894 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:04.489000 audit[4594]: CRED_ACQ pid=4594 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.490000 audit[4594]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdde4294a0 a2=3 a3=0 items=0 ppid=1 pid=4594 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:04.490000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:04.491562 sshd[4594]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:04.498651 systemd-logind[1104]: New session 28 of user core. Apr 12 18:44:04.499537 systemd[1]: Started session-28.scope. Apr 12 18:44:04.508000 audit[4594]: USER_START pid=4594 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.510000 audit[4597]: CRED_ACQ pid=4597 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.625204 sshd[4594]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:04.625000 audit[4594]: USER_END pid=4594 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.625000 audit[4594]: CRED_DISP pid=4594 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:04.627651 systemd[1]: sshd@27-10.0.0.14:22-10.0.0.1:58894.service: Deactivated successfully. Apr 12 18:44:04.626000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.14:22-10.0.0.1:58894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:04.628730 systemd[1]: session-28.scope: Deactivated successfully. Apr 12 18:44:04.629393 systemd-logind[1104]: Session 28 logged out. Waiting for processes to exit. Apr 12 18:44:04.630193 systemd-logind[1104]: Removed session 28. Apr 12 18:44:07.606458 systemd[1]: run-containerd-runc-k8s.io-fa64250cd6a04b2a3118b31e8b2ee8306dd2c97d6c80b56feafa60550769ff21-runc.xwrmBA.mount: Deactivated successfully. Apr 12 18:44:09.629619 systemd[1]: Started sshd@28-10.0.0.14:22-10.0.0.1:57584.service. Apr 12 18:44:09.628000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.14:22-10.0.0.1:57584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:09.630825 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:44:09.630898 kernel: audit: type=1130 audit(1712947449.628:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.14:22-10.0.0.1:57584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:09.668000 audit[4656]: USER_ACCT pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.670422 sshd[4656]: Accepted publickey for core from 10.0.0.1 port 57584 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:09.674255 sshd[4656]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:09.672000 audit[4656]: CRED_ACQ pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.678233 systemd-logind[1104]: New session 29 of user core. Apr 12 18:44:09.678717 kernel: audit: type=1101 audit(1712947449.668:1509): pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.678751 kernel: audit: type=1103 audit(1712947449.672:1510): pid=4656 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.678774 kernel: audit: type=1006 audit(1712947449.672:1511): pid=4656 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Apr 12 18:44:09.679000 systemd[1]: Started session-29.scope. Apr 12 18:44:09.672000 audit[4656]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfc48f5f0 a2=3 a3=0 items=0 ppid=1 pid=4656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.686451 kernel: audit: type=1300 audit(1712947449.672:1511): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfc48f5f0 a2=3 a3=0 items=0 ppid=1 pid=4656 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.686506 kernel: audit: type=1327 audit(1712947449.672:1511): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:09.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:09.682000 audit[4656]: USER_START pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.692645 kernel: audit: type=1105 audit(1712947449.682:1512): pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.692747 kernel: audit: type=1103 audit(1712947449.683:1513): pid=4659 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.683000 audit[4659]: CRED_ACQ pid=4659 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.802346 sshd[4656]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:09.802000 audit[4656]: USER_END pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.804614 systemd[1]: sshd@28-10.0.0.14:22-10.0.0.1:57584.service: Deactivated successfully. Apr 12 18:44:09.805541 systemd[1]: session-29.scope: Deactivated successfully. Apr 12 18:44:09.806232 systemd-logind[1104]: Session 29 logged out. Waiting for processes to exit. Apr 12 18:44:09.806956 systemd-logind[1104]: Removed session 29. Apr 12 18:44:09.802000 audit[4656]: CRED_DISP pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.812941 kernel: audit: type=1106 audit(1712947449.802:1514): pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.812999 kernel: audit: type=1104 audit(1712947449.802:1515): pid=4656 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:09.803000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-10.0.0.14:22-10.0.0.1:57584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.347230 kubelet[2046]: E0412 18:44:14.347167 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:14.807390 systemd[1]: Started sshd@29-10.0.0.14:22-10.0.0.1:57588.service. Apr 12 18:44:14.807000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.14:22-10.0.0.1:57588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.817707 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:14.817870 kernel: audit: type=1130 audit(1712947454.807:1517): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.14:22-10.0.0.1:57588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.853000 audit[4674]: USER_ACCT pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.853713 sshd[4674]: Accepted publickey for core from 10.0.0.1 port 57588 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:14.858711 sshd[4674]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:14.862953 systemd-logind[1104]: New session 30 of user core. Apr 12 18:44:14.863299 systemd[1]: Started session-30.scope. Apr 12 18:44:14.858000 audit[4674]: CRED_ACQ pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.888814 kernel: audit: type=1101 audit(1712947454.853:1518): pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.888856 kernel: audit: type=1103 audit(1712947454.858:1519): pid=4674 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.888872 kernel: audit: type=1006 audit(1712947454.858:1520): pid=4674 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Apr 12 18:44:14.858000 audit[4674]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc32f7900 a2=3 a3=0 items=0 ppid=1 pid=4674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.928523 kernel: audit: type=1300 audit(1712947454.858:1520): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffc32f7900 a2=3 a3=0 items=0 ppid=1 pid=4674 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.858000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:14.930218 kernel: audit: type=1327 audit(1712947454.858:1520): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:14.867000 audit[4674]: USER_START pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.935434 kernel: audit: type=1105 audit(1712947454.867:1521): pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.935569 kernel: audit: type=1103 audit(1712947454.869:1522): pid=4676 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.869000 audit[4676]: CRED_ACQ pid=4676 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.989610 sshd[4674]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:14.990000 audit[4674]: USER_END pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.992487 systemd[1]: sshd@29-10.0.0.14:22-10.0.0.1:57588.service: Deactivated successfully. Apr 12 18:44:14.993477 systemd[1]: session-30.scope: Deactivated successfully. Apr 12 18:44:14.994109 systemd-logind[1104]: Session 30 logged out. Waiting for processes to exit. Apr 12 18:44:14.994810 systemd-logind[1104]: Removed session 30. Apr 12 18:44:14.990000 audit[4674]: CRED_DISP pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:15.030711 kernel: audit: type=1106 audit(1712947454.990:1523): pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:15.030761 kernel: audit: type=1104 audit(1712947454.990:1524): pid=4674 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-10.0.0.14:22-10.0.0.1:57588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:16.851000 audit[4692]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.851000 audit[4692]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd32bb7eb0 a2=0 a3=7ffd32bb7e9c items=0 ppid=2193 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.851000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.853000 audit[4692]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4692 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.853000 audit[4692]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffd32bb7eb0 a2=0 a3=7ffd32bb7e9c items=0 ppid=2193 pid=4692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.853000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:19.647000 audit[4695]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:19.647000 audit[4695]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcff444ec0 a2=0 a3=7ffcff444eac items=0 ppid=2193 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.647000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:19.649000 audit[4695]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4695 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:19.649000 audit[4695]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffcff444ec0 a2=0 a3=7ffcff444eac items=0 ppid=2193 pid=4695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:19.661877 kubelet[2046]: I0412 18:44:19.661835 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-7fg2s" podStartSLOduration=74.311117551 podCreationTimestamp="2024-04-12 18:42:49 +0000 UTC" firstStartedPulling="2024-04-12 18:43:24.929641209 +0000 UTC m=+54.668193978" lastFinishedPulling="2024-04-12 18:43:41.279834554 +0000 UTC m=+71.018387323" observedRunningTime="2024-04-12 18:43:41.538005618 +0000 UTC m=+71.276558397" watchObservedRunningTime="2024-04-12 18:44:19.661310896 +0000 UTC m=+109.399863665" Apr 12 18:44:19.665510 kubelet[2046]: I0412 18:44:19.665465 2046 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:44:19.665000 audit[4697]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:19.665000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffd8f8242d0 a2=0 a3=7ffd8f8242bc items=0 ppid=2193 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:19.667000 audit[4697]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4697 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:19.674759 systemd[1]: Created slice kubepods-besteffort-pod415f2612_c84c_4983_9f28_ea39ca59498e.slice. Apr 12 18:44:19.667000 audit[4697]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffd8f8242d0 a2=0 a3=7ffd8f8242bc items=0 ppid=2193 pid=4697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.667000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:19.792812 kubelet[2046]: I0412 18:44:19.792771 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xdkqz\" (UniqueName: \"kubernetes.io/projected/415f2612-c84c-4983-9f28-ea39ca59498e-kube-api-access-xdkqz\") pod \"calico-apiserver-99c45bd9b-45wrk\" (UID: \"415f2612-c84c-4983-9f28-ea39ca59498e\") " pod="calico-apiserver/calico-apiserver-99c45bd9b-45wrk" Apr 12 18:44:19.793309 kubelet[2046]: I0412 18:44:19.793292 2046 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/415f2612-c84c-4983-9f28-ea39ca59498e-calico-apiserver-certs\") pod \"calico-apiserver-99c45bd9b-45wrk\" (UID: \"415f2612-c84c-4983-9f28-ea39ca59498e\") " pod="calico-apiserver/calico-apiserver-99c45bd9b-45wrk" Apr 12 18:44:19.977718 env[1122]: time="2024-04-12T18:44:19.977580502Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-99c45bd9b-45wrk,Uid:415f2612-c84c-4983-9f28-ea39ca59498e,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:44:19.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.14:22-10.0.0.1:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:19.994436 systemd[1]: Started sshd@30-10.0.0.14:22-10.0.0.1:42250.service. Apr 12 18:44:19.995448 kernel: kauditd_printk_skb: 19 callbacks suppressed Apr 12 18:44:19.995508 kernel: audit: type=1130 audit(1712947459.993:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.14:22-10.0.0.1:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:20.037000 audit[4701]: USER_ACCT pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.043262 kernel: audit: type=1101 audit(1712947460.037:1533): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.043305 sshd[4701]: Accepted publickey for core from 10.0.0.1 port 42250 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:20.042000 audit[4701]: CRED_ACQ pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.044204 sshd[4701]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:20.055460 kernel: audit: type=1103 audit(1712947460.042:1534): pid=4701 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.055527 kernel: audit: type=1006 audit(1712947460.042:1535): pid=4701 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=31 res=1 Apr 12 18:44:20.055556 kernel: audit: type=1300 audit(1712947460.042:1535): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff206e6190 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.042000 audit[4701]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff206e6190 a2=3 a3=0 items=0 ppid=1 pid=4701 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=31 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.049978 systemd[1]: Started session-31.scope. Apr 12 18:44:20.042000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:20.056372 systemd-logind[1104]: New session 31 of user core. Apr 12 18:44:20.058210 kernel: audit: type=1327 audit(1712947460.042:1535): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:20.060000 audit[4701]: USER_START pid=4701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.061000 audit[4723]: CRED_ACQ pid=4723 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.068908 kernel: audit: type=1105 audit(1712947460.060:1536): pid=4701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.068948 kernel: audit: type=1103 audit(1712947460.061:1537): pid=4723 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.122854 systemd-networkd[1014]: calif28509c0c4d: Link UP Apr 12 18:44:20.124215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif28509c0c4d: link becomes ready Apr 12 18:44:20.124384 systemd-networkd[1014]: calif28509c0c4d: Gained carrier Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.049 [INFO][4703] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0 calico-apiserver-99c45bd9b- calico-apiserver 415f2612-c84c-4983-9f28-ea39ca59498e 1157 0 2024-04-12 18:44:19 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:99c45bd9b projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-99c45bd9b-45wrk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif28509c0c4d [] []}} ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.049 [INFO][4703] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.082 [INFO][4718] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" HandleID="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Workload="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.090 [INFO][4718] ipam_plugin.go 268: Auto assigning IP ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" HandleID="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Workload="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ee870), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-99c45bd9b-45wrk", "timestamp":"2024-04-12 18:44:20.082045625 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.091 [INFO][4718] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.091 [INFO][4718] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.091 [INFO][4718] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.092 [INFO][4718] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.096 [INFO][4718] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.100 [INFO][4718] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.103 [INFO][4718] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.108 [INFO][4718] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.108 [INFO][4718] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.111 [INFO][4718] ipam.go 1682: Creating new handle: k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2 Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.114 [INFO][4718] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.118 [INFO][4718] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.118 [INFO][4718] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" host="localhost" Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.118 [INFO][4718] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:20.136687 env[1122]: 2024-04-12 18:44:20.118 [INFO][4718] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" HandleID="k8s-pod-network.bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Workload="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.120 [INFO][4703] k8s.go 385: Populated endpoint ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0", GenerateName:"calico-apiserver-99c45bd9b-", Namespace:"calico-apiserver", SelfLink:"", UID:"415f2612-c84c-4983-9f28-ea39ca59498e", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"99c45bd9b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-99c45bd9b-45wrk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif28509c0c4d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.121 [INFO][4703] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.121 [INFO][4703] dataplane_linux.go 68: Setting the host side veth name to calif28509c0c4d ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.122 [INFO][4703] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.124 [INFO][4703] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0", GenerateName:"calico-apiserver-99c45bd9b-", Namespace:"calico-apiserver", SelfLink:"", UID:"415f2612-c84c-4983-9f28-ea39ca59498e", ResourceVersion:"1157", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 44, 19, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"99c45bd9b", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2", Pod:"calico-apiserver-99c45bd9b-45wrk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif28509c0c4d", MAC:"06:b6:19:35:34:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:20.137324 env[1122]: 2024-04-12 18:44:20.132 [INFO][4703] k8s.go 498: Wrote updated endpoint to datastore ContainerID="bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2" Namespace="calico-apiserver" Pod="calico-apiserver-99c45bd9b-45wrk" WorkloadEndpoint="localhost-k8s-calico--apiserver--99c45bd9b--45wrk-eth0" Apr 12 18:44:20.159667 env[1122]: time="2024-04-12T18:44:20.159576778Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:20.159960 env[1122]: time="2024-04-12T18:44:20.159931801Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:20.160105 env[1122]: time="2024-04-12T18:44:20.160075878Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:20.160447 env[1122]: time="2024-04-12T18:44:20.160412375Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2 pid=4760 runtime=io.containerd.runc.v2 Apr 12 18:44:20.167000 audit[4770]: NETFILTER_CFG table=filter:123 family=2 entries=55 op=nft_register_chain pid=4770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:20.167000 audit[4770]: SYSCALL arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7fffdbc00fc0 a2=0 a3=7fffdbc00fac items=0 ppid=3246 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.176887 kernel: audit: type=1325 audit(1712947460.167:1538): table=filter:123 family=2 entries=55 op=nft_register_chain pid=4770 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:20.176982 kernel: audit: type=1300 audit(1712947460.167:1538): arch=c000003e syscall=46 success=yes exit=28936 a0=3 a1=7fffdbc00fc0 a2=0 a3=7fffdbc00fac items=0 ppid=3246 pid=4770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.167000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:20.181808 systemd[1]: Started cri-containerd-bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2.scope. Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit: BPF prog-id=180 op=LOAD Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266383661646234353630343933333431613963633666363932386532 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266383661646234353630343933333431613963633666363932386532 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.196000 audit: BPF prog-id=181 op=LOAD Apr 12 18:44:20.196000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029dd70 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266383661646234353630343933333431613963633666363932386532 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit: BPF prog-id=182 op=LOAD Apr 12 18:44:20.197000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029ddb8 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266383661646234353630343933333431613963633666363932386532 Apr 12 18:44:20.197000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:44:20.197000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { perfmon } for pid=4771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit[4771]: AVC avc: denied { bpf } for pid=4771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:20.197000 audit: BPF prog-id=183 op=LOAD Apr 12 18:44:20.197000 audit[4771]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003861c8 items=0 ppid=4760 pid=4771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6266383661646234353630343933333431613963633666363932386532 Apr 12 18:44:20.200463 systemd-resolved[1061]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:20.223277 sshd[4701]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:20.223000 audit[4701]: USER_END pid=4701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.224000 audit[4701]: CRED_DISP pid=4701 uid=0 auid=500 ses=31 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.226372 env[1122]: time="2024-04-12T18:44:20.226337552Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-99c45bd9b-45wrk,Uid:415f2612-c84c-4983-9f28-ea39ca59498e,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2\"" Apr 12 18:44:20.226849 systemd[1]: sshd@30-10.0.0.14:22-10.0.0.1:42250.service: Deactivated successfully. Apr 12 18:44:20.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-10.0.0.14:22-10.0.0.1:42250 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:20.227536 systemd[1]: session-31.scope: Deactivated successfully. Apr 12 18:44:20.228891 env[1122]: time="2024-04-12T18:44:20.228852200Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:44:20.228934 systemd-logind[1104]: Session 31 logged out. Waiting for processes to exit. Apr 12 18:44:20.229888 systemd-logind[1104]: Removed session 31. Apr 12 18:44:21.723366 systemd-networkd[1014]: calif28509c0c4d: Gained IPv6LL Apr 12 18:44:22.664920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1648092705.mount: Deactivated successfully. Apr 12 18:44:24.273336 env[1122]: time="2024-04-12T18:44:24.273261858Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:24.277764 env[1122]: time="2024-04-12T18:44:24.277689620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:24.281139 env[1122]: time="2024-04-12T18:44:24.281091878Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:24.286876 env[1122]: time="2024-04-12T18:44:24.286836064Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:24.287252 env[1122]: time="2024-04-12T18:44:24.287225503Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:44:24.289123 env[1122]: time="2024-04-12T18:44:24.289092166Z" level=info msg="CreateContainer within sandbox \"bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:44:24.307450 env[1122]: time="2024-04-12T18:44:24.307366479Z" level=info msg="CreateContainer within sandbox \"bf86adb4560493341a9cc6f6928e2be3236a147856dc09b1ae0516b1586de2e2\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"b700765518fb36907e9ac3aa57a1a32bd5c8f89943c2c3319efe6710e36316ac\"" Apr 12 18:44:24.308075 env[1122]: time="2024-04-12T18:44:24.308036088Z" level=info msg="StartContainer for \"b700765518fb36907e9ac3aa57a1a32bd5c8f89943c2c3319efe6710e36316ac\"" Apr 12 18:44:24.327220 systemd[1]: Started cri-containerd-b700765518fb36907e9ac3aa57a1a32bd5c8f89943c2c3319efe6710e36316ac.scope. Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.339000 audit: BPF prog-id=184 op=LOAD Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4760 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303037363535313866623336393037653961633361613537613161 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=4760 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303037363535313866623336393037653961633361613537613161 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit: BPF prog-id=185 op=LOAD Apr 12 18:44:24.340000 audit[4802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002f9e60 items=0 ppid=4760 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303037363535313866623336393037653961633361613537613161 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit: BPF prog-id=186 op=LOAD Apr 12 18:44:24.340000 audit[4802]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002f9ea8 items=0 ppid=4760 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303037363535313866623336393037653961633361613537613161 Apr 12 18:44:24.340000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:44:24.340000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { perfmon } for pid=4802 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit[4802]: AVC avc: denied { bpf } for pid=4802 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:24.340000 audit: BPF prog-id=187 op=LOAD Apr 12 18:44:24.340000 audit[4802]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003de2b8 items=0 ppid=4760 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:24.340000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237303037363535313866623336393037653961633361613537613161 Apr 12 18:44:24.669000 audit[4813]: AVC avc: denied { watch } for pid=4813 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_44_19.3242684861/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c590,c772 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c590,c772 tclass=file permissive=0 Apr 12 18:44:24.669000 audit[4813]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000cb6540 a2=fc6 a3=0 items=0 ppid=4760 pid=4813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c590,c772 key=(null) Apr 12 18:44:24.669000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:44:25.022105 env[1122]: time="2024-04-12T18:44:25.022027346Z" level=info msg="StartContainer for \"b700765518fb36907e9ac3aa57a1a32bd5c8f89943c2c3319efe6710e36316ac\" returns successfully" Apr 12 18:44:25.036946 kubelet[2046]: I0412 18:44:25.036903 2046 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-99c45bd9b-45wrk" podStartSLOduration=1.9777977679999998 podCreationTimestamp="2024-04-12 18:44:19 +0000 UTC" firstStartedPulling="2024-04-12 18:44:20.228473921 +0000 UTC m=+109.967026690" lastFinishedPulling="2024-04-12 18:44:24.287529799 +0000 UTC m=+114.026082568" observedRunningTime="2024-04-12 18:44:25.036441913 +0000 UTC m=+114.774994682" watchObservedRunningTime="2024-04-12 18:44:25.036853646 +0000 UTC m=+114.775406415" Apr 12 18:44:25.051000 audit[4836]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.053745 kernel: kauditd_printk_skb: 121 callbacks suppressed Apr 12 18:44:25.053804 kernel: audit: type=1325 audit(1712947465.051:1579): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.051000 audit[4836]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcceb9bb10 a2=0 a3=7ffcceb9bafc items=0 ppid=2193 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.062337 kernel: audit: type=1300 audit(1712947465.051:1579): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffcceb9bb10 a2=0 a3=7ffcceb9bafc items=0 ppid=2193 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.062518 kernel: audit: type=1327 audit(1712947465.051:1579): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:25.051000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:25.052000 audit[4836]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.052000 audit[4836]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffcceb9bb10 a2=0 a3=7ffcceb9bafc items=0 ppid=2193 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.077740 kernel: audit: type=1325 audit(1712947465.052:1580): table=nat:125 family=2 entries=44 op=nft_register_rule pid=4836 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.077792 kernel: audit: type=1300 audit(1712947465.052:1580): arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffcceb9bb10 a2=0 a3=7ffcceb9bafc items=0 ppid=2193 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.077998 kernel: audit: type=1327 audit(1712947465.052:1580): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:25.052000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:25.228033 systemd[1]: Started sshd@31-10.0.0.14:22-10.0.0.1:42260.service. Apr 12 18:44:25.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.14:22-10.0.0.1:42260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:25.233217 kernel: audit: type=1130 audit(1712947465.227:1581): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.14:22-10.0.0.1:42260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:25.268000 audit[4840]: USER_ACCT pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.269680 sshd[4840]: Accepted publickey for core from 10.0.0.1 port 42260 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:25.271326 sshd[4840]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:25.269000 audit[4840]: CRED_ACQ pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.274935 systemd-logind[1104]: New session 32 of user core. Apr 12 18:44:25.275681 systemd[1]: Started session-32.scope. Apr 12 18:44:25.276932 kernel: audit: type=1101 audit(1712947465.268:1582): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.277003 kernel: audit: type=1103 audit(1712947465.269:1583): pid=4840 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.277029 kernel: audit: type=1006 audit(1712947465.269:1584): pid=4840 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=32 res=1 Apr 12 18:44:25.269000 audit[4840]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe949e5cf0 a2=3 a3=0 items=0 ppid=1 pid=4840 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=32 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.269000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:25.278000 audit[4840]: USER_START pid=4840 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.279000 audit[4842]: CRED_ACQ pid=4842 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.389006 sshd[4840]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:25.388000 audit[4840]: USER_END pid=4840 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.389000 audit[4840]: CRED_DISP pid=4840 uid=0 auid=500 ses=32 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.391439 systemd[1]: sshd@31-10.0.0.14:22-10.0.0.1:42260.service: Deactivated successfully. Apr 12 18:44:25.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-10.0.0.14:22-10.0.0.1:42260 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:25.392405 systemd[1]: session-32.scope: Deactivated successfully. Apr 12 18:44:25.393066 systemd-logind[1104]: Session 32 logged out. Waiting for processes to exit. Apr 12 18:44:25.393885 systemd-logind[1104]: Removed session 32. Apr 12 18:44:25.717000 audit[4853]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.717000 audit[4853]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc757b7b50 a2=0 a3=7ffc757b7b3c items=0 ppid=2193 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:25.718000 audit[4853]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4853 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:25.718000 audit[4853]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc757b7b50 a2=0 a3=7ffc757b7b3c items=0 ppid=2193 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.718000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:26.844000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.844000 audit[1925]: AVC avc: denied { watch } for pid=1925 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.844000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001f7cf60 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:44:26.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:26.844000 audit[1925]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d86d00 a2=fc6 a3=0 items=0 ppid=1761 pid=1925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c861,c1020 key=(null) Apr 12 18:44:26.844000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:27.346845 kubelet[2046]: E0412 18:44:27.346805 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0144e46c0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c014e10de0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00fb4ced0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=61 a1=c00fb4cf00 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c01448d8e0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:27.527000 audit[1935]: AVC avc: denied { watch } for pid=1935 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:27.527000 audit[1935]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0145f22e0 a2=fc6 a3=0 items=0 ppid=1776 pid=1935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c76,c238 key=(null) Apr 12 18:44:27.527000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3134002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:28.346664 kubelet[2046]: E0412 18:44:28.346634 2046 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:30.392974 systemd[1]: Started sshd@32-10.0.0.14:22-10.0.0.1:50936.service. Apr 12 18:44:30.391000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.14:22-10.0.0.1:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:30.394098 kernel: kauditd_printk_skb: 37 callbacks suppressed Apr 12 18:44:30.394246 kernel: audit: type=1130 audit(1712947470.391:1600): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.14:22-10.0.0.1:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:30.433000 audit[4864]: USER_ACCT pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.434724 sshd[4864]: Accepted publickey for core from 10.0.0.1 port 50936 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:30.438582 sshd[4864]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:30.437000 audit[4864]: CRED_ACQ pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.442425 kernel: audit: type=1101 audit(1712947470.433:1601): pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.442480 kernel: audit: type=1103 audit(1712947470.437:1602): pid=4864 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.442499 kernel: audit: type=1006 audit(1712947470.437:1603): pid=4864 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=33 res=1 Apr 12 18:44:30.442020 systemd-logind[1104]: New session 33 of user core. Apr 12 18:44:30.442774 systemd[1]: Started session-33.scope. Apr 12 18:44:30.437000 audit[4864]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41f2e200 a2=3 a3=0 items=0 ppid=1 pid=4864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.449202 kernel: audit: type=1300 audit(1712947470.437:1603): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc41f2e200 a2=3 a3=0 items=0 ppid=1 pid=4864 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=33 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.454997 kernel: audit: type=1327 audit(1712947470.437:1603): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:30.455033 kernel: audit: type=1105 audit(1712947470.446:1604): pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.437000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:30.446000 audit[4864]: USER_START pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.455491 kernel: audit: type=1103 audit(1712947470.447:1605): pid=4866 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.447000 audit[4866]: CRED_ACQ pid=4866 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.557660 sshd[4864]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:30.557000 audit[4864]: USER_END pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.560161 systemd[1]: sshd@32-10.0.0.14:22-10.0.0.1:50936.service: Deactivated successfully. Apr 12 18:44:30.561110 systemd[1]: session-33.scope: Deactivated successfully. Apr 12 18:44:30.561532 systemd-logind[1104]: Session 33 logged out. Waiting for processes to exit. Apr 12 18:44:30.562274 systemd-logind[1104]: Removed session 33. Apr 12 18:44:30.557000 audit[4864]: CRED_DISP pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.566849 kernel: audit: type=1106 audit(1712947470.557:1606): pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.566892 kernel: audit: type=1104 audit(1712947470.557:1607): pid=4864 uid=0 auid=500 ses=33 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.557000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-10.0.0.14:22-10.0.0.1:50936 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'