Apr 12 18:41:56.403673 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:41:56.403741 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:41:56.403754 kernel: BIOS-provided physical RAM map: Apr 12 18:41:56.403762 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:41:56.403770 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:41:56.403782 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:41:56.403792 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Apr 12 18:41:56.403801 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Apr 12 18:41:56.403813 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:41:56.403822 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:41:56.403830 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Apr 12 18:41:56.403842 kernel: NX (Execute Disable) protection: active Apr 12 18:41:56.403850 kernel: SMBIOS 2.8 present. Apr 12 18:41:56.403859 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Apr 12 18:41:56.403873 kernel: Hypervisor detected: KVM Apr 12 18:41:56.403883 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:41:56.403895 kernel: kvm-clock: cpu 0, msr 95191001, primary cpu clock Apr 12 18:41:56.403904 kernel: kvm-clock: using sched offset of 2961124673 cycles Apr 12 18:41:56.403914 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:41:56.403923 kernel: tsc: Detected 2794.748 MHz processor Apr 12 18:41:56.403953 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:41:56.403963 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:41:56.403977 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Apr 12 18:41:56.403990 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:41:56.403999 kernel: Using GB pages for direct mapping Apr 12 18:41:56.404008 kernel: ACPI: Early table checksum verification disabled Apr 12 18:41:56.404018 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Apr 12 18:41:56.404028 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404037 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404047 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404056 kernel: ACPI: FACS 0x000000009CFE0000 000040 Apr 12 18:41:56.404065 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404076 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404086 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:41:56.404095 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Apr 12 18:41:56.404104 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Apr 12 18:41:56.404117 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Apr 12 18:41:56.404126 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Apr 12 18:41:56.404135 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Apr 12 18:41:56.404145 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Apr 12 18:41:56.404167 kernel: No NUMA configuration found Apr 12 18:41:56.404176 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Apr 12 18:41:56.404186 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Apr 12 18:41:56.404196 kernel: Zone ranges: Apr 12 18:41:56.404206 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:41:56.404215 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Apr 12 18:41:56.404227 kernel: Normal empty Apr 12 18:41:56.404235 kernel: Movable zone start for each node Apr 12 18:41:56.404243 kernel: Early memory node ranges Apr 12 18:41:56.404252 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:41:56.404261 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Apr 12 18:41:56.404271 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Apr 12 18:41:56.404280 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:41:56.404290 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:41:56.404300 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Apr 12 18:41:56.404323 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:41:56.404332 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:41:56.404342 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:41:56.404356 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:41:56.404366 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:41:56.404376 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:41:56.404386 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:41:56.404396 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:41:56.404405 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:41:56.404419 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:41:56.404429 kernel: TSC deadline timer available Apr 12 18:41:56.404439 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Apr 12 18:41:56.404449 kernel: kvm-guest: KVM setup pv remote TLB flush Apr 12 18:41:56.404458 kernel: kvm-guest: setup PV sched yield Apr 12 18:41:56.404492 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Apr 12 18:41:56.404504 kernel: Booting paravirtualized kernel on KVM Apr 12 18:41:56.404514 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:41:56.404525 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Apr 12 18:41:56.404539 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Apr 12 18:41:56.404549 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Apr 12 18:41:56.404558 kernel: pcpu-alloc: [0] 0 1 2 3 Apr 12 18:41:56.404567 kernel: kvm-guest: setup async PF for cpu 0 Apr 12 18:41:56.404577 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Apr 12 18:41:56.404587 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:41:56.404597 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:41:56.404607 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Apr 12 18:41:56.404617 kernel: Policy zone: DMA32 Apr 12 18:41:56.404629 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:41:56.404643 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:41:56.404654 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:41:56.404664 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:41:56.404674 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:41:56.404684 kernel: Memory: 2436704K/2571756K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 134792K reserved, 0K cma-reserved) Apr 12 18:41:56.404695 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:41:56.404705 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:41:56.404719 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:41:56.404729 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:41:56.404740 kernel: rcu: RCU event tracing is enabled. Apr 12 18:41:56.404751 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:41:56.404761 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:41:56.404772 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:41:56.404782 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:41:56.404792 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:41:56.404803 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Apr 12 18:41:56.404816 kernel: random: crng init done Apr 12 18:41:56.404826 kernel: Console: colour VGA+ 80x25 Apr 12 18:41:56.404836 kernel: printk: console [ttyS0] enabled Apr 12 18:41:56.404846 kernel: ACPI: Core revision 20210730 Apr 12 18:41:56.404856 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Apr 12 18:41:56.404867 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:41:56.404877 kernel: x2apic enabled Apr 12 18:41:56.404886 kernel: Switched APIC routing to physical x2apic. Apr 12 18:41:56.404896 kernel: kvm-guest: setup PV IPIs Apr 12 18:41:56.404906 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:41:56.404920 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:41:56.404947 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Apr 12 18:41:56.404958 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Apr 12 18:41:56.404967 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Apr 12 18:41:56.404977 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Apr 12 18:41:56.404992 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:41:56.405005 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:41:56.405015 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:41:56.405025 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:41:56.405046 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Apr 12 18:41:56.405057 kernel: RETBleed: Mitigation: untrained return thunk Apr 12 18:41:56.405071 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:41:56.405082 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:41:56.405092 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:41:56.405103 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:41:56.405113 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:41:56.405123 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:41:56.405134 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:41:56.405148 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:41:56.405159 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:41:56.405169 kernel: LSM: Security Framework initializing Apr 12 18:41:56.405180 kernel: SELinux: Initializing. Apr 12 18:41:56.405190 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:41:56.405201 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:41:56.405212 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Apr 12 18:41:56.405227 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Apr 12 18:41:56.405237 kernel: ... version: 0 Apr 12 18:41:56.405247 kernel: ... bit width: 48 Apr 12 18:41:56.405257 kernel: ... generic registers: 6 Apr 12 18:41:56.405268 kernel: ... value mask: 0000ffffffffffff Apr 12 18:41:56.405278 kernel: ... max period: 00007fffffffffff Apr 12 18:41:56.405289 kernel: ... fixed-purpose events: 0 Apr 12 18:41:56.405299 kernel: ... event mask: 000000000000003f Apr 12 18:41:56.405321 kernel: signal: max sigframe size: 1776 Apr 12 18:41:56.405335 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:41:56.405346 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:41:56.405356 kernel: x86: Booting SMP configuration: Apr 12 18:41:56.405366 kernel: .... node #0, CPUs: #1 Apr 12 18:41:56.405377 kernel: kvm-clock: cpu 1, msr 95191041, secondary cpu clock Apr 12 18:41:56.405387 kernel: kvm-guest: setup async PF for cpu 1 Apr 12 18:41:56.405397 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Apr 12 18:41:56.405408 kernel: #2 Apr 12 18:41:56.405418 kernel: kvm-clock: cpu 2, msr 95191081, secondary cpu clock Apr 12 18:41:56.405432 kernel: kvm-guest: setup async PF for cpu 2 Apr 12 18:41:56.405442 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Apr 12 18:41:56.405451 kernel: #3 Apr 12 18:41:56.405462 kernel: kvm-clock: cpu 3, msr 951910c1, secondary cpu clock Apr 12 18:41:56.405471 kernel: kvm-guest: setup async PF for cpu 3 Apr 12 18:41:56.405481 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Apr 12 18:41:56.405491 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:41:56.405501 kernel: smpboot: Max logical packages: 1 Apr 12 18:41:56.405511 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Apr 12 18:41:56.405521 kernel: devtmpfs: initialized Apr 12 18:41:56.405539 kernel: x86/mm: Memory block size: 128MB Apr 12 18:41:56.405549 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:41:56.405559 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:41:56.405569 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:41:56.405579 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:41:56.405589 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:41:56.405599 kernel: audit: type=2000 audit(1712947315.624:1): state=initialized audit_enabled=0 res=1 Apr 12 18:41:56.405609 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:41:56.405620 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:41:56.405633 kernel: cpuidle: using governor menu Apr 12 18:41:56.405643 kernel: ACPI: bus type PCI registered Apr 12 18:41:56.405652 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:41:56.405662 kernel: dca service started, version 1.12.1 Apr 12 18:41:56.405671 kernel: PCI: Using configuration type 1 for base access Apr 12 18:41:56.405681 kernel: PCI: Using configuration type 1 for extended access Apr 12 18:41:56.405691 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:41:56.405701 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:41:56.405711 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:41:56.405723 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:41:56.405733 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:41:56.405743 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:41:56.405753 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:41:56.405763 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:41:56.405773 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:41:56.405783 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:41:56.405793 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:41:56.405803 kernel: ACPI: Interpreter enabled Apr 12 18:41:56.405818 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:41:56.405828 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:41:56.405838 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:41:56.405848 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:41:56.405857 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:41:56.406101 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:41:56.406123 kernel: acpiphp: Slot [3] registered Apr 12 18:41:56.406134 kernel: acpiphp: Slot [4] registered Apr 12 18:41:56.406150 kernel: acpiphp: Slot [5] registered Apr 12 18:41:56.406161 kernel: acpiphp: Slot [6] registered Apr 12 18:41:56.406171 kernel: acpiphp: Slot [7] registered Apr 12 18:41:56.406181 kernel: acpiphp: Slot [8] registered Apr 12 18:41:56.406192 kernel: acpiphp: Slot [9] registered Apr 12 18:41:56.406202 kernel: acpiphp: Slot [10] registered Apr 12 18:41:56.406212 kernel: acpiphp: Slot [11] registered Apr 12 18:41:56.406223 kernel: acpiphp: Slot [12] registered Apr 12 18:41:56.406233 kernel: acpiphp: Slot [13] registered Apr 12 18:41:56.406247 kernel: acpiphp: Slot [14] registered Apr 12 18:41:56.406256 kernel: acpiphp: Slot [15] registered Apr 12 18:41:56.406266 kernel: acpiphp: Slot [16] registered Apr 12 18:41:56.406276 kernel: acpiphp: Slot [17] registered Apr 12 18:41:56.406286 kernel: acpiphp: Slot [18] registered Apr 12 18:41:56.406328 kernel: acpiphp: Slot [19] registered Apr 12 18:41:56.406339 kernel: acpiphp: Slot [20] registered Apr 12 18:41:56.406349 kernel: acpiphp: Slot [21] registered Apr 12 18:41:56.406360 kernel: acpiphp: Slot [22] registered Apr 12 18:41:56.406370 kernel: acpiphp: Slot [23] registered Apr 12 18:41:56.406405 kernel: acpiphp: Slot [24] registered Apr 12 18:41:56.406415 kernel: acpiphp: Slot [25] registered Apr 12 18:41:56.406425 kernel: acpiphp: Slot [26] registered Apr 12 18:41:56.406435 kernel: acpiphp: Slot [27] registered Apr 12 18:41:56.406462 kernel: acpiphp: Slot [28] registered Apr 12 18:41:56.406476 kernel: acpiphp: Slot [29] registered Apr 12 18:41:56.406488 kernel: acpiphp: Slot [30] registered Apr 12 18:41:56.406498 kernel: acpiphp: Slot [31] registered Apr 12 18:41:56.406510 kernel: PCI host bridge to bus 0000:00 Apr 12 18:41:56.406689 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:41:56.406810 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:41:56.406965 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:41:56.407083 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Apr 12 18:41:56.407194 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:41:56.407323 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:41:56.407476 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:41:56.409816 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:41:56.409993 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:41:56.410080 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Apr 12 18:41:56.410162 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:41:56.410251 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:41:56.410344 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:41:56.410425 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:41:56.410511 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:41:56.410586 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:41:56.411134 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:41:56.411255 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Apr 12 18:41:56.411351 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Apr 12 18:41:56.411429 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Apr 12 18:41:56.411508 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Apr 12 18:41:56.411583 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:41:56.411666 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:41:56.411743 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:41:56.411822 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Apr 12 18:41:56.411897 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Apr 12 18:41:56.412023 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:41:56.412109 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:41:56.412182 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Apr 12 18:41:56.412300 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Apr 12 18:41:56.412410 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:41:56.412485 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Apr 12 18:41:56.412557 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Apr 12 18:41:56.412629 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Apr 12 18:41:56.412706 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Apr 12 18:41:56.412716 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:41:56.412723 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:41:56.412731 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:41:56.412738 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:41:56.412745 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:41:56.412752 kernel: iommu: Default domain type: Translated Apr 12 18:41:56.412760 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:41:56.412835 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:41:56.412910 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:41:56.412999 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:41:56.413009 kernel: vgaarb: loaded Apr 12 18:41:56.413016 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:41:56.413024 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:41:56.413031 kernel: PTP clock support registered Apr 12 18:41:56.413039 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:41:56.413046 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:41:56.413056 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:41:56.413063 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Apr 12 18:41:56.413070 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Apr 12 18:41:56.413078 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Apr 12 18:41:56.413085 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:41:56.413092 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:41:56.413100 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:41:56.413107 kernel: pnp: PnP ACPI init Apr 12 18:41:56.413187 kernel: pnp 00:02: [dma 2] Apr 12 18:41:56.413200 kernel: pnp: PnP ACPI: found 6 devices Apr 12 18:41:56.413207 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:41:56.413215 kernel: NET: Registered PF_INET protocol family Apr 12 18:41:56.413222 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:41:56.413229 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:41:56.413236 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:41:56.413244 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:41:56.413251 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:41:56.413260 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:41:56.413267 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:41:56.413274 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:41:56.413281 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:41:56.413288 kernel: NET: Registered PF_XDP protocol family Apr 12 18:41:56.413376 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:41:56.413445 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:41:56.413511 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:41:56.413582 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Apr 12 18:41:56.413649 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:41:56.413725 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:41:56.413803 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:41:56.413876 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:41:56.413906 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:41:56.413914 kernel: Initialise system trusted keyrings Apr 12 18:41:56.413921 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:41:56.413945 kernel: Key type asymmetric registered Apr 12 18:41:56.413952 kernel: Asymmetric key parser 'x509' registered Apr 12 18:41:56.413960 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:41:56.413967 kernel: io scheduler mq-deadline registered Apr 12 18:41:56.413974 kernel: io scheduler kyber registered Apr 12 18:41:56.413982 kernel: io scheduler bfq registered Apr 12 18:41:56.413989 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:41:56.413997 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:41:56.414004 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:41:56.414011 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:41:56.414020 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:41:56.414027 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:41:56.414035 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:41:56.414042 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:41:56.414049 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:41:56.414130 kernel: rtc_cmos 00:05: RTC can wake from S4 Apr 12 18:41:56.414142 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:41:56.414209 kernel: rtc_cmos 00:05: registered as rtc0 Apr 12 18:41:56.414282 kernel: rtc_cmos 00:05: setting system clock to 2024-04-12T18:41:55 UTC (1712947315) Apr 12 18:41:56.414370 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Apr 12 18:41:56.414382 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:41:56.414391 kernel: Segment Routing with IPv6 Apr 12 18:41:56.414400 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:41:56.414410 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:41:56.414420 kernel: Key type dns_resolver registered Apr 12 18:41:56.414429 kernel: IPI shorthand broadcast: enabled Apr 12 18:41:56.414439 kernel: sched_clock: Marking stable (490590661, 106665446)->(653058992, -55802885) Apr 12 18:41:56.414451 kernel: registered taskstats version 1 Apr 12 18:41:56.414460 kernel: Loading compiled-in X.509 certificates Apr 12 18:41:56.414468 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:41:56.414477 kernel: Key type .fscrypt registered Apr 12 18:41:56.414487 kernel: Key type fscrypt-provisioning registered Apr 12 18:41:56.414496 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:41:56.414505 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:41:56.414516 kernel: ima: No architecture policies found Apr 12 18:41:56.414528 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:41:56.414538 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:41:56.414548 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:41:56.414559 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:41:56.414569 kernel: Run /init as init process Apr 12 18:41:56.414579 kernel: with arguments: Apr 12 18:41:56.414587 kernel: /init Apr 12 18:41:56.414597 kernel: with environment: Apr 12 18:41:56.414619 kernel: HOME=/ Apr 12 18:41:56.414632 kernel: TERM=linux Apr 12 18:41:56.414641 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:41:56.414660 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:41:56.414674 systemd[1]: Detected virtualization kvm. Apr 12 18:41:56.414684 systemd[1]: Detected architecture x86-64. Apr 12 18:41:56.414694 systemd[1]: Running in initrd. Apr 12 18:41:56.414704 systemd[1]: No hostname configured, using default hostname. Apr 12 18:41:56.414717 systemd[1]: Hostname set to . Apr 12 18:41:56.414728 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:41:56.414736 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:41:56.414743 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:41:56.414751 systemd[1]: Reached target cryptsetup.target. Apr 12 18:41:56.414759 systemd[1]: Reached target paths.target. Apr 12 18:41:56.414766 systemd[1]: Reached target slices.target. Apr 12 18:41:56.414774 systemd[1]: Reached target swap.target. Apr 12 18:41:56.414782 systemd[1]: Reached target timers.target. Apr 12 18:41:56.414791 systemd[1]: Listening on iscsid.socket. Apr 12 18:41:56.414799 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:41:56.414807 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:41:56.414815 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:41:56.414823 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:41:56.414831 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:41:56.414838 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:41:56.414848 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:41:56.414855 systemd[1]: Reached target sockets.target. Apr 12 18:41:56.414863 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:41:56.414871 systemd[1]: Finished network-cleanup.service. Apr 12 18:41:56.414879 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:41:56.414887 systemd[1]: Starting systemd-journald.service... Apr 12 18:41:56.414895 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:41:56.414904 systemd[1]: Starting systemd-resolved.service... Apr 12 18:41:56.414912 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:41:56.414920 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:41:56.414946 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:41:56.414954 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:41:56.414962 kernel: audit: type=1130 audit(1712947316.130:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.414970 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:41:56.414980 kernel: audit: type=1130 audit(1712947316.133:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.414988 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:41:56.415003 systemd-journald[198]: Journal started Apr 12 18:41:56.415053 systemd-journald[198]: Runtime Journal (/run/log/journal/199c25a8f2144e6c9f66f8ea5943805c) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:41:56.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.133000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.113026 systemd-modules-load[199]: Inserted module 'overlay' Apr 12 18:41:56.430404 systemd[1]: Started systemd-journald.service. Apr 12 18:41:56.429842 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:41:56.437118 kernel: audit: type=1130 audit(1712947316.429:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.437147 kernel: audit: type=1130 audit(1712947316.430:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.430000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.442113 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:41:56.441720 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:41:56.447401 kernel: audit: type=1130 audit(1712947316.441:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.443753 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:41:56.444578 systemd-resolved[200]: Positive Trust Anchors: Apr 12 18:41:56.444592 systemd-resolved[200]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:41:56.452049 kernel: Bridge firewalling registered Apr 12 18:41:56.444631 systemd-resolved[200]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:41:56.456350 kernel: audit: type=1130 audit(1712947316.451:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.456448 dracut-cmdline[217]: dracut-dracut-053 Apr 12 18:41:56.449505 systemd-resolved[200]: Defaulting to hostname 'linux'. Apr 12 18:41:56.463825 dracut-cmdline[217]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:41:56.450411 systemd[1]: Started systemd-resolved.service. Apr 12 18:41:56.451710 systemd-modules-load[199]: Inserted module 'br_netfilter' Apr 12 18:41:56.452439 systemd[1]: Reached target nss-lookup.target. Apr 12 18:41:56.489976 kernel: SCSI subsystem initialized Apr 12 18:41:56.535978 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:41:56.536075 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:41:56.539363 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:41:56.539405 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:41:56.543645 systemd-modules-load[199]: Inserted module 'dm_multipath' Apr 12 18:41:56.545696 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:41:56.551114 kernel: audit: type=1130 audit(1712947316.545:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.551208 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:41:56.562751 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:41:56.568464 kernel: audit: type=1130 audit(1712947316.563:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.569961 kernel: iscsi: registered transport (tcp) Apr 12 18:41:56.603003 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:41:56.603100 kernel: QLogic iSCSI HBA Driver Apr 12 18:41:56.688998 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:41:56.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.692342 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:41:56.702719 kernel: audit: type=1130 audit(1712947316.690:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:56.772585 kernel: raid6: avx2x4 gen() 19977 MB/s Apr 12 18:41:56.788564 kernel: raid6: avx2x4 xor() 5435 MB/s Apr 12 18:41:56.809342 kernel: raid6: avx2x2 gen() 18552 MB/s Apr 12 18:41:56.824861 kernel: raid6: avx2x2 xor() 12320 MB/s Apr 12 18:41:56.840992 kernel: raid6: avx2x1 gen() 15843 MB/s Apr 12 18:41:56.858115 kernel: raid6: avx2x1 xor() 10182 MB/s Apr 12 18:41:56.875005 kernel: raid6: sse2x4 gen() 9946 MB/s Apr 12 18:41:56.892028 kernel: raid6: sse2x4 xor() 4267 MB/s Apr 12 18:41:56.909010 kernel: raid6: sse2x2 gen() 10277 MB/s Apr 12 18:41:56.944347 kernel: raid6: sse2x2 xor() 6939 MB/s Apr 12 18:41:56.956334 kernel: raid6: sse2x1 gen() 7583 MB/s Apr 12 18:41:56.973943 kernel: raid6: sse2x1 xor() 4730 MB/s Apr 12 18:41:56.974056 kernel: raid6: using algorithm avx2x4 gen() 19977 MB/s Apr 12 18:41:56.974074 kernel: raid6: .... xor() 5435 MB/s, rmw enabled Apr 12 18:41:56.976300 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:41:57.010441 kernel: xor: automatically using best checksumming function avx Apr 12 18:41:57.195555 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:41:57.214379 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:41:57.213000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:57.220000 audit: BPF prog-id=7 op=LOAD Apr 12 18:41:57.221000 audit: BPF prog-id=8 op=LOAD Apr 12 18:41:57.223184 systemd[1]: Starting systemd-udevd.service... Apr 12 18:41:57.248563 systemd-udevd[400]: Using default interface naming scheme 'v252'. Apr 12 18:41:57.255834 systemd[1]: Started systemd-udevd.service. Apr 12 18:41:57.260863 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:41:57.258000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:57.283298 dracut-pre-trigger[418]: rd.md=0: removing MD RAID activation Apr 12 18:41:57.354149 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:41:57.355000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:57.362526 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:41:57.429997 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:41:57.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:57.491964 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:41:57.625985 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:41:57.626081 kernel: AES CTR mode by8 optimization enabled Apr 12 18:41:57.626958 kernel: libata version 3.00 loaded. Apr 12 18:41:57.632652 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:41:57.644361 kernel: scsi host0: ata_piix Apr 12 18:41:57.644717 kernel: scsi host1: ata_piix Apr 12 18:41:57.644900 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Apr 12 18:41:57.644919 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Apr 12 18:41:57.644950 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:41:57.652978 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:41:57.653058 kernel: GPT:9289727 != 19775487 Apr 12 18:41:57.653082 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:41:57.653096 kernel: GPT:9289727 != 19775487 Apr 12 18:41:57.653108 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:41:57.653120 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:57.800288 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Apr 12 18:41:57.806229 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Apr 12 18:41:57.894856 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Apr 12 18:41:57.895219 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:41:57.916956 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (458) Apr 12 18:41:57.921386 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:41:57.921797 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:41:57.936033 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Apr 12 18:41:57.943405 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:41:57.952160 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:41:57.968401 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:41:57.975076 systemd[1]: Starting disk-uuid.service... Apr 12 18:41:57.994900 disk-uuid[536]: Primary Header is updated. Apr 12 18:41:57.994900 disk-uuid[536]: Secondary Entries is updated. Apr 12 18:41:57.994900 disk-uuid[536]: Secondary Header is updated. Apr 12 18:41:58.011338 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:59.028428 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:41:59.029459 disk-uuid[537]: The operation has completed successfully. Apr 12 18:41:59.106580 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:41:59.110014 systemd[1]: Finished disk-uuid.service. Apr 12 18:41:59.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.133171 systemd[1]: Starting verity-setup.service... Apr 12 18:41:59.172422 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Apr 12 18:41:59.449184 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:41:59.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.455595 systemd[1]: Finished verity-setup.service. Apr 12 18:41:59.462430 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:41:59.634921 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:41:59.632613 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:41:59.634016 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:41:59.644828 systemd[1]: Starting ignition-setup.service... Apr 12 18:41:59.668265 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:41:59.683523 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:41:59.683570 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:41:59.683584 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:41:59.722005 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:41:59.745157 systemd[1]: Finished ignition-setup.service. Apr 12 18:41:59.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.748640 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:41:59.940746 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:41:59.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:59.950413 systemd[1]: Starting systemd-networkd.service... Apr 12 18:41:59.947000 audit: BPF prog-id=9 op=LOAD Apr 12 18:42:00.108264 systemd-networkd[709]: lo: Link UP Apr 12 18:42:00.108436 systemd-networkd[709]: lo: Gained carrier Apr 12 18:42:00.114025 systemd-networkd[709]: Enumeration completed Apr 12 18:42:00.114364 systemd-networkd[709]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:42:00.168049 kernel: kauditd_printk_skb: 12 callbacks suppressed Apr 12 18:42:00.168088 kernel: audit: type=1130 audit(1712947320.154:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.115754 systemd-networkd[709]: eth0: Link UP Apr 12 18:42:00.115758 systemd-networkd[709]: eth0: Gained carrier Apr 12 18:42:00.117234 systemd[1]: Started systemd-networkd.service. Apr 12 18:42:00.154331 systemd[1]: Reached target network.target. Apr 12 18:42:00.180752 systemd[1]: Starting iscsiuio.service... Apr 12 18:42:00.339737 ignition[619]: Ignition 2.14.0 Apr 12 18:42:00.339758 ignition[619]: Stage: fetch-offline Apr 12 18:42:00.339866 ignition[619]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:00.339901 ignition[619]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:00.340224 ignition[619]: parsed url from cmdline: "" Apr 12 18:42:00.340230 ignition[619]: no config URL provided Apr 12 18:42:00.340238 ignition[619]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:42:00.340250 ignition[619]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:42:00.340284 ignition[619]: op(1): [started] loading QEMU firmware config module Apr 12 18:42:00.340295 ignition[619]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:42:00.364310 ignition[619]: op(1): [finished] loading QEMU firmware config module Apr 12 18:42:00.382411 kernel: audit: type=1130 audit(1712947320.365:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.366144 systemd[1]: Started iscsiuio.service. Apr 12 18:42:00.380055 systemd[1]: Starting iscsid.service... Apr 12 18:42:00.395766 iscsid[721]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:42:00.395766 iscsid[721]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Apr 12 18:42:00.395766 iscsid[721]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:42:00.395766 iscsid[721]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:42:00.395766 iscsid[721]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:42:00.395766 iscsid[721]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:42:00.395766 iscsid[721]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:42:00.524378 kernel: audit: type=1130 audit(1712947320.396:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.396000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.393345 systemd[1]: Started iscsid.service. Apr 12 18:42:00.527830 ignition[619]: parsing config with SHA512: 19209a92da14652e1e8f036768f20d28752d256b2b55b6a7c3e0574f36e7cbe2aaa5a1e48bfa5eea4c87fa428b37abb7f880a83f0c850c9dee87af9aa7ebdab8 Apr 12 18:42:00.398997 systemd-networkd[709]: eth0: DHCPv4 address 10.0.0.33/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:42:00.468265 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:42:00.652110 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:42:00.676873 kernel: audit: type=1130 audit(1712947320.654:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.655456 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:42:00.666502 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:42:00.666752 systemd[1]: Reached target remote-fs.target. Apr 12 18:42:00.667822 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:42:00.692716 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:42:00.702174 kernel: audit: type=1130 audit(1712947320.693:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.173461 unknown[619]: fetched base config from "system" Apr 12 18:42:01.173483 unknown[619]: fetched user config from "qemu" Apr 12 18:42:01.175875 ignition[619]: fetch-offline: fetch-offline passed Apr 12 18:42:01.176036 ignition[619]: Ignition finished successfully Apr 12 18:42:01.179166 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:42:01.201315 kernel: audit: type=1130 audit(1712947321.181:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.182128 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:42:01.183238 systemd[1]: Starting ignition-kargs.service... Apr 12 18:42:01.208482 ignition[736]: Ignition 2.14.0 Apr 12 18:42:01.208493 ignition[736]: Stage: kargs Apr 12 18:42:01.214369 systemd[1]: Finished ignition-kargs.service. Apr 12 18:42:01.264090 kernel: audit: type=1130 audit(1712947321.214:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.208664 ignition[736]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:01.221666 systemd[1]: Starting ignition-disks.service... Apr 12 18:42:01.208678 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:01.210839 ignition[736]: kargs: kargs passed Apr 12 18:42:01.279340 systemd[1]: Finished ignition-disks.service. Apr 12 18:42:01.210912 ignition[736]: Ignition finished successfully Apr 12 18:42:01.232614 ignition[743]: Ignition 2.14.0 Apr 12 18:42:01.232624 ignition[743]: Stage: disks Apr 12 18:42:01.232787 ignition[743]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:01.232800 ignition[743]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:01.234441 ignition[743]: disks: disks passed Apr 12 18:42:01.234495 ignition[743]: Ignition finished successfully Apr 12 18:42:01.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.291586 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:42:01.301004 kernel: audit: type=1130 audit(1712947321.289:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.300922 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:42:01.302939 systemd[1]: Reached target local-fs.target. Apr 12 18:42:01.307234 systemd[1]: Reached target sysinit.target. Apr 12 18:42:01.309215 systemd[1]: Reached target basic.target. Apr 12 18:42:01.316121 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:42:01.349011 systemd-fsck[751]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:42:01.365474 systemd-networkd[709]: eth0: Gained IPv6LL Apr 12 18:42:01.442136 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:42:01.462320 kernel: audit: type=1130 audit(1712947321.443:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.444643 systemd[1]: Mounting sysroot.mount... Apr 12 18:42:01.481228 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:42:01.481703 systemd[1]: Mounted sysroot.mount. Apr 12 18:42:01.485253 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:42:01.520118 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:42:01.529059 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:42:01.529124 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:42:01.529167 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:42:01.533229 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:42:01.545402 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:42:01.549895 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:42:01.561756 initrd-setup-root[762]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:42:01.578757 initrd-setup-root[770]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:42:01.596548 initrd-setup-root[778]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:42:01.606661 initrd-setup-root[786]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:42:01.662233 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (757) Apr 12 18:42:01.678908 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:42:01.679049 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:42:01.679080 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:42:01.707801 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:42:01.733258 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:42:01.768165 kernel: audit: type=1130 audit(1712947321.734:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.737274 systemd[1]: Starting ignition-mount.service... Apr 12 18:42:01.770305 systemd[1]: Starting sysroot-boot.service... Apr 12 18:42:01.793907 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Apr 12 18:42:01.794071 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Apr 12 18:42:01.944639 ignition[823]: INFO : Ignition 2.14.0 Apr 12 18:42:01.947288 ignition[823]: INFO : Stage: mount Apr 12 18:42:01.947288 ignition[823]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:01.947288 ignition[823]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:01.954274 ignition[823]: INFO : mount: mount passed Apr 12 18:42:01.954274 ignition[823]: INFO : Ignition finished successfully Apr 12 18:42:01.958398 systemd[1]: Finished ignition-mount.service. Apr 12 18:42:01.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.959735 systemd[1]: Starting ignition-files.service... Apr 12 18:42:01.971656 systemd[1]: Finished sysroot-boot.service. Apr 12 18:42:01.975000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:01.988613 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:42:02.002036 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (833) Apr 12 18:42:02.007288 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:42:02.007361 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:42:02.007379 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:42:02.054117 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:42:02.229368 ignition[852]: INFO : Ignition 2.14.0 Apr 12 18:42:02.229368 ignition[852]: INFO : Stage: files Apr 12 18:42:02.233202 ignition[852]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:02.233202 ignition[852]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:02.236958 ignition[852]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:42:02.240488 ignition[852]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:42:02.240488 ignition[852]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:42:02.247843 ignition[852]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:42:02.250251 ignition[852]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:42:02.261369 ignition[852]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:42:02.261369 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:42:02.261369 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:42:02.253408 unknown[852]: wrote ssh authorized keys file for user: core Apr 12 18:42:02.763788 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:42:03.995848 ignition[852]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:42:03.995848 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:42:03.995848 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:42:03.995848 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:42:04.309718 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:42:04.767474 ignition[852]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:42:04.774842 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:42:04.774842 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:42:04.774842 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:42:04.802559 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:42:05.113973 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:42:05.123851 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:42:05.123851 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:42:05.305785 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:42:06.253596 ignition[852]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f4daad200c8378dfdc6cb69af28eaca4215f2b4a2dbdf75f29f9210171cb5683bc873fc000319022e6b3ad61175475d77190734713ba9136644394e8a8faafa1 Apr 12 18:42:06.253596 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:42:06.262241 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:42:06.262241 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:42:06.321148 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:42:09.019241 ignition[852]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ce6ba764274162d38ac1c44e1fb1f0f835346f3afc5b508bb755b1b7d7170910f5812b0a1941b32e29d950e905bbd08ae761c87befad921db4d44969c8562e75 Apr 12 18:42:09.023469 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:42:09.023469 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:42:09.023469 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:42:09.080617 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:42:09.873334 ignition[852]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 33cf3f6e37bcee4dff7ce14ab933c605d07353d4e31446dd2b52c3f05e0b150b60e531f6069f112d8a76331322a72b593537531e62104cfc7c70cb03d46f76b3 Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:42:09.880021 ignition[852]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:42:09.880021 ignition[852]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:42:09.918744 ignition[852]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:42:09.975880 ignition[852]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:42:09.975880 ignition[852]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:42:09.975880 ignition[852]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:42:09.975880 ignition[852]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:42:09.975880 ignition[852]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:42:10.077148 ignition[852]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:42:10.077148 ignition[852]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:42:10.077148 ignition[852]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:42:10.077148 ignition[852]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:42:10.077148 ignition[852]: INFO : files: files passed Apr 12 18:42:10.077148 ignition[852]: INFO : Ignition finished successfully Apr 12 18:42:10.116028 kernel: kauditd_printk_skb: 2 callbacks suppressed Apr 12 18:42:10.116080 kernel: audit: type=1130 audit(1712947330.090:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.087889 systemd[1]: Finished ignition-files.service. Apr 12 18:42:10.101971 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:42:10.110589 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:42:10.126697 initrd-setup-root-after-ignition[877]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:42:10.136185 kernel: audit: type=1130 audit(1712947330.126:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.136222 kernel: audit: type=1131 audit(1712947330.126:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.111696 systemd[1]: Starting ignition-quench.service... Apr 12 18:42:10.139572 initrd-setup-root-after-ignition[880]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:42:10.156295 kernel: audit: type=1130 audit(1712947330.138:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.123398 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:42:10.123536 systemd[1]: Finished ignition-quench.service. Apr 12 18:42:10.136470 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:42:10.139868 systemd[1]: Reached target ignition-complete.target. Apr 12 18:42:10.148644 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:42:10.170390 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:42:10.170538 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:42:10.186053 kernel: audit: type=1130 audit(1712947330.172:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.186102 kernel: audit: type=1131 audit(1712947330.172:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.173139 systemd[1]: Reached target initrd-fs.target. Apr 12 18:42:10.190237 systemd[1]: Reached target initrd.target. Apr 12 18:42:10.191986 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:42:10.194474 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:42:10.224405 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:42:10.239052 kernel: audit: type=1130 audit(1712947330.227:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.232173 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:42:10.246563 systemd[1]: Stopped target network.target. Apr 12 18:42:10.247795 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:42:10.250510 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:42:10.252854 systemd[1]: Stopped target timers.target. Apr 12 18:42:10.255726 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:42:10.305943 kernel: audit: type=1131 audit(1712947330.257:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.305990 kernel: audit: type=1131 audit(1712947330.265:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.306015 kernel: audit: type=1131 audit(1712947330.274:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.265000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.255919 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:42:10.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.257556 systemd[1]: Stopped target initrd.target. Apr 12 18:42:10.264055 systemd[1]: Stopped target basic.target. Apr 12 18:42:10.264240 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:42:10.264383 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:42:10.264515 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:42:10.264697 systemd[1]: Stopped target remote-fs.target. Apr 12 18:42:10.264829 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:42:10.265027 systemd[1]: Stopped target sysinit.target. Apr 12 18:42:10.265248 systemd[1]: Stopped target local-fs.target. Apr 12 18:42:10.265461 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:42:10.265650 systemd[1]: Stopped target swap.target. Apr 12 18:42:10.265817 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:42:10.266016 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:42:10.266381 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:42:10.267207 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:42:10.267337 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:42:10.277079 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:42:10.277262 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:42:10.277799 systemd[1]: Stopped target paths.target. Apr 12 18:42:10.278313 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:42:10.286238 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:42:10.286871 systemd[1]: Stopped target slices.target. Apr 12 18:42:10.287399 systemd[1]: Stopped target sockets.target. Apr 12 18:42:10.287604 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:42:10.287738 systemd[1]: Closed iscsid.socket. Apr 12 18:42:10.341149 ignition[893]: INFO : Ignition 2.14.0 Apr 12 18:42:10.341149 ignition[893]: INFO : Stage: umount Apr 12 18:42:10.341149 ignition[893]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:42:10.341149 ignition[893]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:42:10.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.288430 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:42:10.347399 ignition[893]: INFO : umount: umount passed Apr 12 18:42:10.347399 ignition[893]: INFO : Ignition finished successfully Apr 12 18:42:10.347000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.288545 systemd[1]: Closed iscsiuio.socket. Apr 12 18:42:10.289087 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:42:10.289247 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:42:10.355000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.361000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.369000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.371000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.289831 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:42:10.290001 systemd[1]: Stopped ignition-files.service. Apr 12 18:42:10.376000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.291764 systemd[1]: Stopping ignition-mount.service... Apr 12 18:42:10.292380 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:42:10.292552 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:42:10.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.295430 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:42:10.296372 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:42:10.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.438000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:42:10.296998 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:42:10.297264 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:42:10.297750 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:42:10.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.299226 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:42:10.299460 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:42:10.305012 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:42:10.305161 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:42:10.336915 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:42:10.465000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.337081 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:42:10.339106 systemd-networkd[709]: eth0: DHCPv6 lease lost Apr 12 18:42:10.470000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:42:10.470000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.345800 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:42:10.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.345976 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:42:10.349651 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:42:10.349761 systemd[1]: Stopped ignition-mount.service. Apr 12 18:42:10.356291 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:42:10.356346 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:42:10.357459 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:42:10.357515 systemd[1]: Stopped ignition-disks.service. Apr 12 18:42:10.362437 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:42:10.362508 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:42:10.371023 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:42:10.371125 systemd[1]: Stopped ignition-setup.service. Apr 12 18:42:10.373692 systemd[1]: Stopping network-cleanup.service... Apr 12 18:42:10.376817 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:42:10.376922 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:42:10.377406 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:42:10.377465 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:42:10.382111 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:42:10.382211 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:42:10.394374 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:42:10.402343 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:42:10.402460 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:42:10.403386 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:42:10.403521 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:42:10.438329 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:42:10.439889 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:42:10.459084 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:42:10.459152 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:42:10.462983 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:42:10.463049 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:42:10.465623 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:42:10.465703 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:42:10.466330 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:42:10.466384 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:42:10.473423 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:42:10.473554 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:42:10.476474 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:42:10.476547 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:42:10.479623 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:42:10.481713 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:42:10.481782 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:42:10.532368 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:42:10.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.532875 systemd[1]: Stopped network-cleanup.service. Apr 12 18:42:10.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.538385 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:42:10.538508 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:42:10.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.540000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.541624 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:42:10.545660 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:42:10.567420 systemd[1]: Switching root. Apr 12 18:42:10.593285 iscsid[721]: iscsid shutting down. Apr 12 18:42:10.594959 systemd-journald[198]: Received SIGTERM from PID 1 (n/a). Apr 12 18:42:10.595017 systemd-journald[198]: Journal stopped Apr 12 18:42:21.468401 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:42:21.468471 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:42:21.468493 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:42:21.468511 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:42:21.468526 kernel: SELinux: policy capability open_perms=1 Apr 12 18:42:21.468545 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:42:21.468559 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:42:21.468572 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:42:21.468584 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:42:21.468596 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:42:21.468609 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:42:21.468630 systemd[1]: Successfully loaded SELinux policy in 64.977ms. Apr 12 18:42:21.468665 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 13.359ms. Apr 12 18:42:21.468692 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:42:21.468707 systemd[1]: Detected virtualization kvm. Apr 12 18:42:21.468721 systemd[1]: Detected architecture x86-64. Apr 12 18:42:21.468734 systemd[1]: Detected first boot. Apr 12 18:42:21.468754 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:42:21.468780 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:42:21.468795 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:42:21.468814 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:21.468839 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:21.468859 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:21.468879 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 18:42:21.468894 kernel: audit: type=1334 audit(1712947341.278:83): prog-id=12 op=LOAD Apr 12 18:42:21.468907 kernel: audit: type=1334 audit(1712947341.278:84): prog-id=3 op=UNLOAD Apr 12 18:42:21.468918 kernel: audit: type=1334 audit(1712947341.280:85): prog-id=13 op=LOAD Apr 12 18:42:21.468952 kernel: audit: type=1334 audit(1712947341.282:86): prog-id=14 op=LOAD Apr 12 18:42:21.468965 kernel: audit: type=1334 audit(1712947341.282:87): prog-id=4 op=UNLOAD Apr 12 18:42:21.468976 kernel: audit: type=1334 audit(1712947341.282:88): prog-id=5 op=UNLOAD Apr 12 18:42:21.468989 kernel: audit: type=1131 audit(1712947341.287:89): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.469004 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:42:21.469014 systemd[1]: Stopped iscsiuio.service. Apr 12 18:42:21.469035 kernel: audit: type=1131 audit(1712947341.294:90): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.469046 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:42:21.469060 systemd[1]: Stopped iscsid.service. Apr 12 18:42:21.469071 kernel: audit: type=1131 audit(1712947341.301:91): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.469080 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:42:21.469091 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:42:21.469102 kernel: audit: type=1130 audit(1712947341.307:92): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.469112 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:42:21.469124 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:42:21.469136 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:42:21.469146 systemd[1]: Created slice system-getty.slice. Apr 12 18:42:21.469156 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:42:21.469166 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:42:21.469176 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:42:21.469187 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:42:21.469197 systemd[1]: Created slice user.slice. Apr 12 18:42:21.469207 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:42:21.469217 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:42:21.469229 systemd[1]: Set up automount boot.automount. Apr 12 18:42:21.469239 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:42:21.469249 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:42:21.469269 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:42:21.469283 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:42:21.469298 systemd[1]: Reached target integritysetup.target. Apr 12 18:42:21.469312 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:42:21.469326 systemd[1]: Reached target remote-fs.target. Apr 12 18:42:21.469340 systemd[1]: Reached target slices.target. Apr 12 18:42:21.469357 systemd[1]: Reached target swap.target. Apr 12 18:42:21.469370 systemd[1]: Reached target torcx.target. Apr 12 18:42:21.469384 systemd[1]: Reached target veritysetup.target. Apr 12 18:42:21.469399 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:42:21.469413 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:42:21.469427 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:42:21.469438 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:42:21.469450 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:42:21.469463 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:42:21.469477 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:42:21.469493 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:42:21.469503 systemd[1]: Mounting media.mount... Apr 12 18:42:21.469513 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:42:21.469523 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:42:21.469533 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:42:21.469554 systemd[1]: Mounting tmp.mount... Apr 12 18:42:21.469564 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:42:21.469575 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:42:21.469586 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:42:21.469597 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:42:21.469608 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:42:21.469621 systemd[1]: Starting modprobe@drm.service... Apr 12 18:42:21.469632 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:42:21.469642 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:42:21.469652 systemd[1]: Starting modprobe@loop.service... Apr 12 18:42:21.469663 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:42:21.469686 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:42:21.469703 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:42:21.469718 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:42:21.469731 kernel: loop: module loaded Apr 12 18:42:21.469744 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:42:21.469758 kernel: fuse: init (API version 7.34) Apr 12 18:42:21.469772 systemd[1]: Stopped systemd-journald.service. Apr 12 18:42:21.469787 systemd[1]: systemd-journald.service: Consumed 1.054s CPU time. Apr 12 18:42:21.469801 systemd[1]: Starting systemd-journald.service... Apr 12 18:42:21.469816 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:42:21.469844 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:42:21.469863 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:42:21.469876 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:42:21.469889 systemd-journald[1030]: Journal started Apr 12 18:42:21.469966 systemd-journald[1030]: Runtime Journal (/run/log/journal/199c25a8f2144e6c9f66f8ea5943805c) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:42:10.735000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:42:12.075000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:42:12.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:42:12.078000 audit: BPF prog-id=10 op=LOAD Apr 12 18:42:12.078000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:42:12.078000 audit: BPF prog-id=11 op=LOAD Apr 12 18:42:12.078000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:42:12.184000 audit[945]: AVC avc: denied { associate } for pid=945 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:42:12.184000 audit[945]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001558b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=928 pid=945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:12.184000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:42:12.187000 audit[945]: AVC avc: denied { associate } for pid=945 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:42:12.187000 audit[945]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c000155989 a2=1ed a3=0 items=2 ppid=928 pid=945 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:12.187000 audit: CWD cwd="/" Apr 12 18:42:12.187000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:12.187000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:12.187000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:42:21.278000 audit: BPF prog-id=12 op=LOAD Apr 12 18:42:21.278000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:42:21.280000 audit: BPF prog-id=13 op=LOAD Apr 12 18:42:21.282000 audit: BPF prog-id=14 op=LOAD Apr 12 18:42:21.282000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:42:21.282000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:42:21.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.294000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.307000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.311000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:42:21.440000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.450000 audit: BPF prog-id=15 op=LOAD Apr 12 18:42:21.451000 audit: BPF prog-id=16 op=LOAD Apr 12 18:42:21.451000 audit: BPF prog-id=17 op=LOAD Apr 12 18:42:21.451000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:42:21.451000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:42:21.466000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:42:21.466000 audit[1030]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffd892af7c0 a2=4000 a3=7ffd892af85c items=0 ppid=1 pid=1030 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:21.466000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:42:12.179782 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:21.275757 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:42:12.181270 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:42:21.275784 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:42:12.181303 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:42:21.287505 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:42:12.181353 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:42:21.288036 systemd[1]: systemd-journald.service: Consumed 1.054s CPU time. Apr 12 18:42:12.181369 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:42:12.181424 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:42:12.181443 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:42:12.181817 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:42:12.181878 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:42:12.181901 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:42:12.184348 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:42:12.184400 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:42:12.184429 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:42:12.184451 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:42:12.184479 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:42:12.184499 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:42:20.840768 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:42:20.841152 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:42:20.841362 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:42:20.842021 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:42:20.842298 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:42:20.842423 /usr/lib/systemd/system-generators/torcx-generator[945]: time="2024-04-12T18:42:20Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:42:21.474413 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:42:21.474447 systemd[1]: Stopped verity-setup.service. Apr 12 18:42:21.474000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.478018 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:42:21.482634 systemd[1]: Started systemd-journald.service. Apr 12 18:42:21.481000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.483608 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:42:21.484792 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:42:21.485957 systemd[1]: Mounted media.mount. Apr 12 18:42:21.487004 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:42:21.488210 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:42:21.489462 systemd[1]: Mounted tmp.mount. Apr 12 18:42:21.490954 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:42:21.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.493688 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:42:21.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.495226 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:42:21.495458 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:42:21.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.496888 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:42:21.497187 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:42:21.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.498612 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:42:21.498848 systemd[1]: Finished modprobe@drm.service. Apr 12 18:42:21.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.500273 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:42:21.500522 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:42:21.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.500000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.502100 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:42:21.502288 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:42:21.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.504033 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:42:21.504350 systemd[1]: Finished modprobe@loop.service. Apr 12 18:42:21.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.506005 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:42:21.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.507916 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:42:21.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.509826 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:42:21.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.511721 systemd[1]: Reached target network-pre.target. Apr 12 18:42:21.514636 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:42:21.517312 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:42:21.518346 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:42:21.525964 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:42:21.529361 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:42:21.530770 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:42:21.532583 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:42:21.533941 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:42:21.546316 systemd-journald[1030]: Time spent on flushing to /var/log/journal/199c25a8f2144e6c9f66f8ea5943805c is 31.457ms for 1147 entries. Apr 12 18:42:21.546316 systemd-journald[1030]: System Journal (/var/log/journal/199c25a8f2144e6c9f66f8ea5943805c) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:42:21.600539 systemd-journald[1030]: Received client request to flush runtime journal. Apr 12 18:42:21.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.579000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:21.535583 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:42:21.538340 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:42:21.549278 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:42:21.551171 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:42:21.601764 udevadm[1048]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:42:21.552621 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:42:21.556075 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:42:21.563051 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:42:21.570876 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:42:21.577824 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:42:21.579642 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:42:21.602023 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:42:21.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.472014 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:42:22.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.473000 audit: BPF prog-id=18 op=LOAD Apr 12 18:42:22.473000 audit: BPF prog-id=19 op=LOAD Apr 12 18:42:22.473000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:42:22.473000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:42:22.475060 systemd[1]: Starting systemd-udevd.service... Apr 12 18:42:22.492054 systemd-udevd[1051]: Using default interface naming scheme 'v252'. Apr 12 18:42:22.507349 systemd[1]: Started systemd-udevd.service. Apr 12 18:42:22.536000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.539112 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:42:22.539000 audit: BPF prog-id=20 op=LOAD Apr 12 18:42:22.542133 systemd[1]: Starting systemd-networkd.service... Apr 12 18:42:22.547000 audit: BPF prog-id=21 op=LOAD Apr 12 18:42:22.547000 audit: BPF prog-id=22 op=LOAD Apr 12 18:42:22.547000 audit: BPF prog-id=23 op=LOAD Apr 12 18:42:22.549487 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:42:22.586255 systemd[1]: Started systemd-userdbd.service. Apr 12 18:42:22.592000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.585000 audit[1054]: AVC avc: denied { confidentiality } for pid=1054 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:42:22.632556 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:42:22.680817 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:42:22.684959 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:42:22.585000 audit[1054]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55e8de5db530 a1=32194 a2=7fba4d6b1bc5 a3=5 items=108 ppid=1051 pid=1054 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:22.585000 audit: CWD cwd="/" Apr 12 18:42:22.585000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=1 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=2 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=3 name=(null) inode=12722 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=4 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=5 name=(null) inode=12723 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=6 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=7 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=8 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=9 name=(null) inode=12725 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=10 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=11 name=(null) inode=12726 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=12 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=13 name=(null) inode=12727 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=14 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=15 name=(null) inode=12728 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=16 name=(null) inode=12724 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=17 name=(null) inode=12729 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=18 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=19 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=20 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=21 name=(null) inode=12731 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=22 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=23 name=(null) inode=12732 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=24 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=25 name=(null) inode=12733 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=26 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=27 name=(null) inode=12734 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=28 name=(null) inode=12730 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=29 name=(null) inode=12735 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=30 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=31 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=32 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=33 name=(null) inode=12737 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=34 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=35 name=(null) inode=12738 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=36 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=37 name=(null) inode=12739 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=38 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=39 name=(null) inode=12740 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=40 name=(null) inode=12736 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=41 name=(null) inode=12741 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=42 name=(null) inode=12721 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=43 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=44 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=45 name=(null) inode=12743 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=46 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=47 name=(null) inode=12744 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=48 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=49 name=(null) inode=12745 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=50 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=51 name=(null) inode=12746 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=52 name=(null) inode=12742 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=53 name=(null) inode=12747 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=55 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=56 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=57 name=(null) inode=12749 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=58 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=59 name=(null) inode=12750 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=60 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=61 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=62 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=63 name=(null) inode=12752 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=64 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=65 name=(null) inode=12753 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=66 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=67 name=(null) inode=12754 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=68 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=69 name=(null) inode=12755 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=70 name=(null) inode=12751 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=71 name=(null) inode=12756 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=72 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=73 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=74 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=75 name=(null) inode=14114 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=76 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=77 name=(null) inode=14115 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=78 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=79 name=(null) inode=14116 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=80 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=81 name=(null) inode=14117 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=82 name=(null) inode=14113 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=83 name=(null) inode=14118 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=84 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=85 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=86 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=87 name=(null) inode=14120 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=88 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=89 name=(null) inode=14121 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=90 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=91 name=(null) inode=14122 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=92 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=93 name=(null) inode=14123 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=94 name=(null) inode=14119 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=95 name=(null) inode=14124 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=96 name=(null) inode=12748 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=97 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=98 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=99 name=(null) inode=14126 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=100 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=101 name=(null) inode=14127 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=102 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=103 name=(null) inode=14128 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=104 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=105 name=(null) inode=14129 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=106 name=(null) inode=14125 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PATH item=107 name=(null) inode=14130 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:42:22.585000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:42:22.700968 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:42:22.720697 systemd-networkd[1070]: lo: Link UP Apr 12 18:42:22.720712 systemd-networkd[1070]: lo: Gained carrier Apr 12 18:42:22.721291 systemd-networkd[1070]: Enumeration completed Apr 12 18:42:22.721426 systemd[1]: Started systemd-networkd.service. Apr 12 18:42:22.721470 systemd-networkd[1070]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:42:22.722952 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:42:22.723044 systemd-networkd[1070]: eth0: Link UP Apr 12 18:42:22.723049 systemd-networkd[1070]: eth0: Gained carrier Apr 12 18:42:22.734961 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:42:22.753704 systemd-networkd[1070]: eth0: DHCPv4 address 10.0.0.33/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:42:22.770000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.787428 kernel: kvm: Nested Virtualization enabled Apr 12 18:42:22.787540 kernel: SVM: kvm: Nested Paging enabled Apr 12 18:42:22.787576 kernel: SVM: Virtual VMLOAD VMSAVE supported Apr 12 18:42:22.787592 kernel: SVM: Virtual GIF supported Apr 12 18:42:22.808015 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:42:22.826373 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:42:22.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.829037 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:42:22.836788 lvm[1086]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:42:22.869269 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:42:22.869000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.870596 systemd[1]: Reached target cryptsetup.target. Apr 12 18:42:22.872677 systemd[1]: Starting lvm2-activation.service... Apr 12 18:42:22.878332 lvm[1087]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:42:22.907029 systemd[1]: Finished lvm2-activation.service. Apr 12 18:42:22.922000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.923162 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:42:22.924094 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:42:22.924117 systemd[1]: Reached target local-fs.target. Apr 12 18:42:22.924973 systemd[1]: Reached target machines.target. Apr 12 18:42:22.926954 systemd[1]: Starting ldconfig.service... Apr 12 18:42:22.928106 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:42:22.928160 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:42:22.929355 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:42:22.931507 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:42:22.934012 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:42:22.935212 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:42:22.935267 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:42:22.936381 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:42:22.940191 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1089 (bootctl) Apr 12 18:42:22.941246 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:42:22.944179 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:42:22.945000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.952133 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:42:22.953808 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:42:22.956969 systemd-tmpfiles[1092]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:42:22.986287 systemd-fsck[1097]: fsck.fat 4.2 (2021-01-31) Apr 12 18:42:22.986287 systemd-fsck[1097]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:42:22.988982 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:42:22.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:22.992212 systemd[1]: Mounting boot.mount... Apr 12 18:42:23.028742 systemd[1]: Mounted boot.mount. Apr 12 18:42:23.043453 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:42:23.044000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:23.047308 ldconfig[1088]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:42:24.001251 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:42:24.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.003333 systemd[1]: Starting audit-rules.service... Apr 12 18:42:24.004884 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:42:24.006872 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:42:24.010000 audit: BPF prog-id=24 op=LOAD Apr 12 18:42:24.012819 systemd[1]: Starting systemd-resolved.service... Apr 12 18:42:24.013000 audit: BPF prog-id=25 op=LOAD Apr 12 18:42:24.015451 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:42:24.018152 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:42:24.019684 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:42:24.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.021225 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:42:24.026000 audit[1111]: SYSTEM_BOOT pid=1111 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.031426 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:42:24.033000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.038562 systemd[1]: Finished ldconfig.service. Apr 12 18:42:24.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.041391 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:42:24.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:24.043991 systemd[1]: Starting systemd-update-done.service... Apr 12 18:42:24.053290 augenrules[1121]: No rules Apr 12 18:42:24.052000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:42:24.052000 audit[1121]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdb9ce5880 a2=420 a3=0 items=0 ppid=1100 pid=1121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:24.052000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:42:24.053804 systemd[1]: Finished systemd-update-done.service. Apr 12 18:42:24.057431 systemd[1]: Finished audit-rules.service. Apr 12 18:42:24.069020 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:42:24.069588 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:42:24.073043 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:42:24.073470 systemd-resolved[1106]: Positive Trust Anchors: Apr 12 18:42:24.073478 systemd-resolved[1106]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:42:24.073506 systemd-resolved[1106]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:42:24.740656 systemd[1]: Reached target time-set.target. Apr 12 18:42:24.740722 systemd-timesyncd[1110]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:42:24.740764 systemd-timesyncd[1110]: Initial clock synchronization to Fri 2024-04-12 18:42:24.740644 UTC. Apr 12 18:42:24.748185 systemd-resolved[1106]: Defaulting to hostname 'linux'. Apr 12 18:42:24.750076 systemd[1]: Started systemd-resolved.service. Apr 12 18:42:24.751040 systemd[1]: Reached target network.target. Apr 12 18:42:24.751838 systemd[1]: Reached target nss-lookup.target. Apr 12 18:42:24.752667 systemd[1]: Reached target sysinit.target. Apr 12 18:42:24.753545 systemd[1]: Started motdgen.path. Apr 12 18:42:24.754297 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:42:24.755560 systemd[1]: Started logrotate.timer. Apr 12 18:42:24.756372 systemd[1]: Started mdadm.timer. Apr 12 18:42:24.757071 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:42:24.757909 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:42:24.757942 systemd[1]: Reached target paths.target. Apr 12 18:42:24.758703 systemd[1]: Reached target timers.target. Apr 12 18:42:24.759805 systemd[1]: Listening on dbus.socket. Apr 12 18:42:24.761567 systemd[1]: Starting docker.socket... Apr 12 18:42:24.764862 systemd[1]: Listening on sshd.socket. Apr 12 18:42:24.765749 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:42:24.766135 systemd[1]: Listening on docker.socket. Apr 12 18:42:24.766969 systemd[1]: Reached target sockets.target. Apr 12 18:42:24.767759 systemd[1]: Reached target basic.target. Apr 12 18:42:24.768562 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:42:24.768586 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:42:24.769529 systemd[1]: Starting containerd.service... Apr 12 18:42:24.771192 systemd[1]: Starting dbus.service... Apr 12 18:42:24.773301 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:42:24.775375 systemd[1]: Starting extend-filesystems.service... Apr 12 18:42:24.776384 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:42:24.777456 systemd[1]: Starting motdgen.service... Apr 12 18:42:24.778208 jq[1133]: false Apr 12 18:42:24.779312 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:42:24.781186 systemd[1]: Starting prepare-critools.service... Apr 12 18:42:24.783154 systemd[1]: Starting prepare-helm.service... Apr 12 18:42:24.785412 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:42:24.787453 systemd[1]: Starting sshd-keygen.service... Apr 12 18:42:24.789956 dbus-daemon[1132]: [system] SELinux support is enabled Apr 12 18:42:24.792820 systemd[1]: Starting systemd-logind.service... Apr 12 18:42:24.793710 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:42:24.793771 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:42:24.794357 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:42:24.795275 systemd[1]: Starting update-engine.service... Apr 12 18:42:24.795758 extend-filesystems[1134]: Found sr0 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda1 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda2 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda3 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found usr Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda4 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda6 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda7 Apr 12 18:42:24.795758 extend-filesystems[1134]: Found vda9 Apr 12 18:42:24.795758 extend-filesystems[1134]: Checking size of /dev/vda9 Apr 12 18:42:24.821466 extend-filesystems[1134]: Resized partition /dev/vda9 Apr 12 18:42:24.798011 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:42:24.826676 jq[1154]: true Apr 12 18:42:24.839504 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:42:24.801175 systemd[1]: Started dbus.service. Apr 12 18:42:24.839670 extend-filesystems[1165]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:42:24.808947 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:42:24.848090 tar[1160]: ./ Apr 12 18:42:24.848090 tar[1160]: ./loopback Apr 12 18:42:24.809140 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:42:24.849463 tar[1161]: crictl Apr 12 18:42:24.810279 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:42:24.853872 tar[1162]: linux-amd64/helm Apr 12 18:42:24.854094 update_engine[1151]: I0412 18:42:24.849329 1151 main.cc:92] Flatcar Update Engine starting Apr 12 18:42:24.854094 update_engine[1151]: I0412 18:42:24.853046 1151 update_check_scheduler.cc:74] Next update check in 9m1s Apr 12 18:42:24.811182 systemd[1]: Finished motdgen.service. Apr 12 18:42:24.816289 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:42:24.835146 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:42:24.854557 jq[1167]: true Apr 12 18:42:24.847508 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:42:24.847529 systemd[1]: Reached target system-config.target. Apr 12 18:42:24.848913 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:42:24.848926 systemd[1]: Reached target user-config.target. Apr 12 18:42:24.852987 systemd[1]: Started update-engine.service. Apr 12 18:42:24.857376 systemd[1]: Started locksmithd.service. Apr 12 18:42:24.880899 systemd-logind[1150]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:42:24.881363 systemd-logind[1150]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:42:24.883760 systemd-logind[1150]: New seat seat0. Apr 12 18:42:24.896001 systemd[1]: Started systemd-logind.service. Apr 12 18:42:24.905277 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:42:24.924244 extend-filesystems[1165]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:42:24.924244 extend-filesystems[1165]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:42:24.924244 extend-filesystems[1165]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:42:24.928497 extend-filesystems[1134]: Resized filesystem in /dev/vda9 Apr 12 18:42:24.929541 tar[1160]: ./bandwidth Apr 12 18:42:24.929573 env[1168]: time="2024-04-12T18:42:24.924797442Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:42:24.929798 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:42:24.929961 systemd[1]: Finished extend-filesystems.service. Apr 12 18:42:24.932785 bash[1191]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:42:24.932996 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:42:24.968774 tar[1160]: ./ptp Apr 12 18:42:24.985311 env[1168]: time="2024-04-12T18:42:24.985235887Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:42:24.985455 env[1168]: time="2024-04-12T18:42:24.985430742Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990507 env[1168]: time="2024-04-12T18:42:24.990472389Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990507 env[1168]: time="2024-04-12T18:42:24.990503477Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990730 env[1168]: time="2024-04-12T18:42:24.990701298Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990730 env[1168]: time="2024-04-12T18:42:24.990723420Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990796 env[1168]: time="2024-04-12T18:42:24.990735513Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:42:24.990796 env[1168]: time="2024-04-12T18:42:24.990744610Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.990843 env[1168]: time="2024-04-12T18:42:24.990805524Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.991054 env[1168]: time="2024-04-12T18:42:24.991028723Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:42:24.991183 env[1168]: time="2024-04-12T18:42:24.991154308Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:42:24.991183 env[1168]: time="2024-04-12T18:42:24.991176129Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:42:24.991267 env[1168]: time="2024-04-12T18:42:24.991221013Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:42:24.991267 env[1168]: time="2024-04-12T18:42:24.991234679Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:42:25.005272 tar[1160]: ./vlan Apr 12 18:42:25.039635 tar[1160]: ./host-device Apr 12 18:42:25.073118 tar[1160]: ./tuning Apr 12 18:42:25.079393 env[1168]: time="2024-04-12T18:42:25.079343656Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:42:25.079467 env[1168]: time="2024-04-12T18:42:25.079396666Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:42:25.079467 env[1168]: time="2024-04-12T18:42:25.079408768Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:42:25.079467 env[1168]: time="2024-04-12T18:42:25.079452711Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079467 env[1168]: time="2024-04-12T18:42:25.079465545Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079546 env[1168]: time="2024-04-12T18:42:25.079477808Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079568 env[1168]: time="2024-04-12T18:42:25.079489319Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079593 env[1168]: time="2024-04-12T18:42:25.079577274Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079615 env[1168]: time="2024-04-12T18:42:25.079595649Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079636 env[1168]: time="2024-04-12T18:42:25.079615917Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079661 env[1168]: time="2024-04-12T18:42:25.079632508Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.079661 env[1168]: time="2024-04-12T18:42:25.079649510Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:42:25.079841 env[1168]: time="2024-04-12T18:42:25.079810782Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:42:25.079978 env[1168]: time="2024-04-12T18:42:25.079945705Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:42:25.080443 env[1168]: time="2024-04-12T18:42:25.080401160Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:42:25.080495 env[1168]: time="2024-04-12T18:42:25.080463867Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080495 env[1168]: time="2024-04-12T18:42:25.080484316Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:42:25.080613 env[1168]: time="2024-04-12T18:42:25.080585956Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080613 env[1168]: time="2024-04-12T18:42:25.080610703Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080730 env[1168]: time="2024-04-12T18:42:25.080701814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080777 env[1168]: time="2024-04-12T18:42:25.080730888Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080777 env[1168]: time="2024-04-12T18:42:25.080747529Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080777 env[1168]: time="2024-04-12T18:42:25.080762297Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080842 env[1168]: time="2024-04-12T18:42:25.080776874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080842 env[1168]: time="2024-04-12T18:42:25.080791362Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080842 env[1168]: time="2024-04-12T18:42:25.080807151Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:42:25.080960 env[1168]: time="2024-04-12T18:42:25.080935221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.080960 env[1168]: time="2024-04-12T18:42:25.080956942Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.081028 env[1168]: time="2024-04-12T18:42:25.080968263Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.081028 env[1168]: time="2024-04-12T18:42:25.080979505Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:42:25.081028 env[1168]: time="2024-04-12T18:42:25.080993010Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:42:25.081028 env[1168]: time="2024-04-12T18:42:25.081003219Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:42:25.081118 env[1168]: time="2024-04-12T18:42:25.081033726Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:42:25.081118 env[1168]: time="2024-04-12T18:42:25.081075374Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:42:25.081336 env[1168]: time="2024-04-12T18:42:25.081282503Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:42:25.082379 env[1168]: time="2024-04-12T18:42:25.081341463Z" level=info msg="Connect containerd service" Apr 12 18:42:25.082379 env[1168]: time="2024-04-12T18:42:25.081371039Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:42:25.082379 env[1168]: time="2024-04-12T18:42:25.082005289Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:42:25.082379 env[1168]: time="2024-04-12T18:42:25.082133950Z" level=info msg="Start subscribing containerd event" Apr 12 18:42:25.083940 env[1168]: time="2024-04-12T18:42:25.083906104Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:42:25.084034 env[1168]: time="2024-04-12T18:42:25.083948333Z" level=info msg="Start recovering state" Apr 12 18:42:25.084121 env[1168]: time="2024-04-12T18:42:25.084016852Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:42:25.084333 systemd[1]: Started containerd.service. Apr 12 18:42:25.085183 env[1168]: time="2024-04-12T18:42:25.084647354Z" level=info msg="containerd successfully booted in 0.178427s" Apr 12 18:42:25.099438 env[1168]: time="2024-04-12T18:42:25.099364239Z" level=info msg="Start event monitor" Apr 12 18:42:25.099438 env[1168]: time="2024-04-12T18:42:25.099440532Z" level=info msg="Start snapshots syncer" Apr 12 18:42:25.099438 env[1168]: time="2024-04-12T18:42:25.099454278Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:42:25.099628 env[1168]: time="2024-04-12T18:42:25.099461712Z" level=info msg="Start streaming server" Apr 12 18:42:25.107833 tar[1160]: ./vrf Apr 12 18:42:25.139764 tar[1160]: ./sbr Apr 12 18:42:25.171750 tar[1160]: ./tap Apr 12 18:42:25.209627 tar[1160]: ./dhcp Apr 12 18:42:25.306665 tar[1160]: ./static Apr 12 18:42:25.332597 tar[1160]: ./firewall Apr 12 18:42:25.360216 systemd[1]: Finished prepare-critools.service. Apr 12 18:42:25.365668 locksmithd[1176]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:42:25.372069 tar[1160]: ./macvlan Apr 12 18:42:25.375181 tar[1162]: linux-amd64/LICENSE Apr 12 18:42:25.375284 tar[1162]: linux-amd64/README.md Apr 12 18:42:25.380050 systemd[1]: Finished prepare-helm.service. Apr 12 18:42:25.390352 systemd-networkd[1070]: eth0: Gained IPv6LL Apr 12 18:42:25.403641 tar[1160]: ./dummy Apr 12 18:42:25.433620 tar[1160]: ./bridge Apr 12 18:42:25.465681 tar[1160]: ./ipvlan Apr 12 18:42:25.495844 tar[1160]: ./portmap Apr 12 18:42:25.526794 tar[1160]: ./host-local Apr 12 18:42:25.531431 sshd_keygen[1156]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:42:25.552177 systemd[1]: Finished sshd-keygen.service. Apr 12 18:42:25.555685 systemd[1]: Starting issuegen.service... Apr 12 18:42:25.561393 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:42:25.561552 systemd[1]: Finished issuegen.service. Apr 12 18:42:25.563850 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:42:25.565903 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:42:25.570014 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:42:25.572679 systemd[1]: Started getty@tty1.service. Apr 12 18:42:25.574984 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:42:25.576261 systemd[1]: Reached target getty.target. Apr 12 18:42:25.577318 systemd[1]: Reached target multi-user.target. Apr 12 18:42:25.580592 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:42:25.591069 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:42:25.591377 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:42:25.592730 systemd[1]: Startup finished in 869ms (kernel) + 14.780s (initrd) + 14.259s (userspace) = 29.909s. Apr 12 18:42:33.625543 systemd[1]: Created slice system-sshd.slice. Apr 12 18:42:33.626551 systemd[1]: Started sshd@0-10.0.0.33:22-10.0.0.1:51968.service. Apr 12 18:42:33.661195 sshd[1222]: Accepted publickey for core from 10.0.0.1 port 51968 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:33.662483 sshd[1222]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:33.670517 systemd-logind[1150]: New session 1 of user core. Apr 12 18:42:33.671385 systemd[1]: Created slice user-500.slice. Apr 12 18:42:33.672350 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:42:33.679779 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:42:33.681013 systemd[1]: Starting user@500.service... Apr 12 18:42:33.683360 (systemd)[1225]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:33.756223 systemd[1225]: Queued start job for default target default.target. Apr 12 18:42:33.756744 systemd[1225]: Reached target paths.target. Apr 12 18:42:33.756764 systemd[1225]: Reached target sockets.target. Apr 12 18:42:33.756775 systemd[1225]: Reached target timers.target. Apr 12 18:42:33.756787 systemd[1225]: Reached target basic.target. Apr 12 18:42:33.756823 systemd[1225]: Reached target default.target. Apr 12 18:42:33.756849 systemd[1225]: Startup finished in 68ms. Apr 12 18:42:33.756920 systemd[1]: Started user@500.service. Apr 12 18:42:33.757908 systemd[1]: Started session-1.scope. Apr 12 18:42:33.808212 systemd[1]: Started sshd@1-10.0.0.33:22-10.0.0.1:51984.service. Apr 12 18:42:33.841750 sshd[1234]: Accepted publickey for core from 10.0.0.1 port 51984 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:33.842798 sshd[1234]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:33.846182 systemd-logind[1150]: New session 2 of user core. Apr 12 18:42:33.846994 systemd[1]: Started session-2.scope. Apr 12 18:42:33.899114 sshd[1234]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:33.901597 systemd[1]: sshd@1-10.0.0.33:22-10.0.0.1:51984.service: Deactivated successfully. Apr 12 18:42:33.902105 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:42:33.902640 systemd-logind[1150]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:42:33.903799 systemd[1]: Started sshd@2-10.0.0.33:22-10.0.0.1:51986.service. Apr 12 18:42:33.904407 systemd-logind[1150]: Removed session 2. Apr 12 18:42:33.934789 sshd[1240]: Accepted publickey for core from 10.0.0.1 port 51986 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:33.935773 sshd[1240]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:33.938862 systemd-logind[1150]: New session 3 of user core. Apr 12 18:42:33.939655 systemd[1]: Started session-3.scope. Apr 12 18:42:33.988088 sshd[1240]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:33.990241 systemd[1]: sshd@2-10.0.0.33:22-10.0.0.1:51986.service: Deactivated successfully. Apr 12 18:42:33.990710 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:42:33.991154 systemd-logind[1150]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:42:33.992046 systemd[1]: Started sshd@3-10.0.0.33:22-10.0.0.1:51994.service. Apr 12 18:42:33.992675 systemd-logind[1150]: Removed session 3. Apr 12 18:42:34.023040 sshd[1246]: Accepted publickey for core from 10.0.0.1 port 51994 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:34.024181 sshd[1246]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:34.027044 systemd-logind[1150]: New session 4 of user core. Apr 12 18:42:34.027747 systemd[1]: Started session-4.scope. Apr 12 18:42:34.079919 sshd[1246]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:34.082665 systemd[1]: sshd@3-10.0.0.33:22-10.0.0.1:51994.service: Deactivated successfully. Apr 12 18:42:34.083212 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:42:34.083710 systemd-logind[1150]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:42:34.084804 systemd[1]: Started sshd@4-10.0.0.33:22-10.0.0.1:52006.service. Apr 12 18:42:34.085457 systemd-logind[1150]: Removed session 4. Apr 12 18:42:34.116431 sshd[1252]: Accepted publickey for core from 10.0.0.1 port 52006 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:34.117539 sshd[1252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:34.120478 systemd-logind[1150]: New session 5 of user core. Apr 12 18:42:34.121192 systemd[1]: Started session-5.scope. Apr 12 18:42:34.192962 sudo[1255]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:42:34.193211 sudo[1255]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:34.200465 dbus-daemon[1132]: \xd0\xdd\xd1.\xe3U: received setenforce notice (enforcing=1745375408) Apr 12 18:42:34.202429 sudo[1255]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:34.204208 sshd[1252]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:34.206825 systemd[1]: sshd@4-10.0.0.33:22-10.0.0.1:52006.service: Deactivated successfully. Apr 12 18:42:34.207379 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:42:34.207868 systemd-logind[1150]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:42:34.208963 systemd[1]: Started sshd@5-10.0.0.33:22-10.0.0.1:52016.service. Apr 12 18:42:34.209596 systemd-logind[1150]: Removed session 5. Apr 12 18:42:34.240389 sshd[1259]: Accepted publickey for core from 10.0.0.1 port 52016 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:34.241487 sshd[1259]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:34.244335 systemd-logind[1150]: New session 6 of user core. Apr 12 18:42:34.245027 systemd[1]: Started session-6.scope. Apr 12 18:42:34.296037 sudo[1263]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:42:34.296219 sudo[1263]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:34.298674 sudo[1263]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:34.302923 sudo[1262]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:42:34.303110 sudo[1262]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:34.310646 systemd[1]: Stopping audit-rules.service... Apr 12 18:42:34.310000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:42:34.311976 auditctl[1266]: No rules Apr 12 18:42:34.312297 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:42:34.312471 systemd[1]: Stopped audit-rules.service. Apr 12 18:42:34.320465 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:42:34.320508 kernel: audit: type=1305 audit(1712947354.310:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:42:34.320835 systemd[1]: Starting audit-rules.service... Apr 12 18:42:34.310000 audit[1266]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdaaf15c40 a2=420 a3=0 items=0 ppid=1 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:34.326827 kernel: audit: type=1300 audit(1712947354.310:157): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdaaf15c40 a2=420 a3=0 items=0 ppid=1 pid=1266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:34.326874 kernel: audit: type=1327 audit(1712947354.310:157): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:42:34.310000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:42:34.328131 kernel: audit: type=1131 audit(1712947354.311:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.335452 augenrules[1283]: No rules Apr 12 18:42:34.336127 systemd[1]: Finished audit-rules.service. Apr 12 18:42:34.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.336900 sudo[1262]: pam_unix(sudo:session): session closed for user root Apr 12 18:42:34.338102 sshd[1259]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:34.335000 audit[1262]: USER_END pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.340503 systemd[1]: sshd@5-10.0.0.33:22-10.0.0.1:52016.service: Deactivated successfully. Apr 12 18:42:34.340990 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:42:34.341492 systemd-logind[1150]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:42:34.342342 systemd[1]: Started sshd@6-10.0.0.33:22-10.0.0.1:52020.service. Apr 12 18:42:34.343109 systemd-logind[1150]: Removed session 6. Apr 12 18:42:34.343196 kernel: audit: type=1130 audit(1712947354.335:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.343227 kernel: audit: type=1106 audit(1712947354.335:160): pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.343243 kernel: audit: type=1104 audit(1712947354.335:161): pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.335000 audit[1262]: CRED_DISP pid=1262 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.346362 kernel: audit: type=1106 audit(1712947354.337:162): pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.337000 audit[1259]: USER_END pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.350655 kernel: audit: type=1104 audit(1712947354.337:163): pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.337000 audit[1259]: CRED_DISP pid=1259 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.33:22-10.0.0.1:52016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.357480 kernel: audit: type=1131 audit(1712947354.339:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.33:22-10.0.0.1:52016 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.33:22-10.0.0.1:52020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.372000 audit[1289]: USER_ACCT pid=1289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.374188 sshd[1289]: Accepted publickey for core from 10.0.0.1 port 52020 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:42:34.373000 audit[1289]: CRED_ACQ pid=1289 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.373000 audit[1289]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd910ba160 a2=3 a3=0 items=0 ppid=1 pid=1289 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:34.373000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:34.375249 sshd[1289]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:34.378707 systemd-logind[1150]: New session 7 of user core. Apr 12 18:42:34.379435 systemd[1]: Started session-7.scope. Apr 12 18:42:34.381000 audit[1289]: USER_START pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.382000 audit[1291]: CRED_ACQ pid=1291 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:34.429000 audit[1292]: USER_ACCT pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.430653 sudo[1292]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:42:34.429000 audit[1292]: CRED_REFR pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.430840 sudo[1292]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:42:34.430000 audit[1292]: USER_START pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.954916 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:42:34.960050 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:42:34.958000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:34.960458 systemd[1]: Reached target network-online.target. Apr 12 18:42:34.961719 systemd[1]: Starting docker.service... Apr 12 18:42:35.002538 env[1310]: time="2024-04-12T18:42:35.002440990Z" level=info msg="Starting up" Apr 12 18:42:35.004132 env[1310]: time="2024-04-12T18:42:35.004078983Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:42:35.004132 env[1310]: time="2024-04-12T18:42:35.004109370Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:42:35.004132 env[1310]: time="2024-04-12T18:42:35.004135930Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:42:35.004348 env[1310]: time="2024-04-12T18:42:35.004160947Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:42:35.008563 env[1310]: time="2024-04-12T18:42:35.008515655Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:42:35.008563 env[1310]: time="2024-04-12T18:42:35.008544258Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:42:35.008563 env[1310]: time="2024-04-12T18:42:35.008563264Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:42:35.008563 env[1310]: time="2024-04-12T18:42:35.008572181Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:42:35.047879 env[1310]: time="2024-04-12T18:42:35.047810951Z" level=info msg="Loading containers: start." Apr 12 18:42:35.100000 audit[1345]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.100000 audit[1345]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc43241930 a2=0 a3=7ffc4324191c items=0 ppid=1310 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.100000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:42:35.102000 audit[1347]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1347 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.102000 audit[1347]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd0e745890 a2=0 a3=7ffd0e74587c items=0 ppid=1310 pid=1347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:42:35.104000 audit[1349]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1349 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.104000 audit[1349]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcc8fa26b0 a2=0 a3=7ffcc8fa269c items=0 ppid=1310 pid=1349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.104000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:42:35.106000 audit[1351]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.106000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffc0ffd4880 a2=0 a3=7ffc0ffd486c items=0 ppid=1310 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:42:35.108000 audit[1353]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.108000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff1c37c6b0 a2=0 a3=7fff1c37c69c items=0 ppid=1310 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:42:35.129000 audit[1358]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1358 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.129000 audit[1358]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeb51a39c0 a2=0 a3=7ffeb51a39ac items=0 ppid=1310 pid=1358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:42:35.138000 audit[1360]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1360 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.138000 audit[1360]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd00e251d0 a2=0 a3=7ffd00e251bc items=0 ppid=1310 pid=1360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.138000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:42:35.140000 audit[1362]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.140000 audit[1362]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff08c678c0 a2=0 a3=7fff08c678ac items=0 ppid=1310 pid=1362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:42:35.143000 audit[1364]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.143000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffff7c5fc10 a2=0 a3=7ffff7c5fbfc items=0 ppid=1310 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.143000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:35.152000 audit[1368]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1368 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.152000 audit[1368]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fff2b867fb0 a2=0 a3=7fff2b867f9c items=0 ppid=1310 pid=1368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:35.153000 audit[1369]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1369 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.153000 audit[1369]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff81eac8d0 a2=0 a3=7fff81eac8bc items=0 ppid=1310 pid=1369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.153000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:35.163309 kernel: Initializing XFRM netlink socket Apr 12 18:42:35.190182 env[1310]: time="2024-04-12T18:42:35.190136463Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:42:35.204000 audit[1377]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1377 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.204000 audit[1377]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe5da22f00 a2=0 a3=7ffe5da22eec items=0 ppid=1310 pid=1377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:42:35.217000 audit[1380]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1380 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.217000 audit[1380]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff66aded40 a2=0 a3=7fff66aded2c items=0 ppid=1310 pid=1380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.217000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:42:35.219000 audit[1383]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1383 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.219000 audit[1383]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff9dcac8d0 a2=0 a3=7fff9dcac8bc items=0 ppid=1310 pid=1383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.219000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:42:35.221000 audit[1385]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1385 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.221000 audit[1385]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff2f741380 a2=0 a3=7fff2f74136c items=0 ppid=1310 pid=1385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.221000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:42:35.223000 audit[1387]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1387 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.223000 audit[1387]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffee3803310 a2=0 a3=7ffee38032fc items=0 ppid=1310 pid=1387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.223000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:42:35.225000 audit[1389]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1389 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.225000 audit[1389]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffb629ce20 a2=0 a3=7fffb629ce0c items=0 ppid=1310 pid=1389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.225000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:42:35.227000 audit[1391]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1391 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.227000 audit[1391]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffe07abd580 a2=0 a3=7ffe07abd56c items=0 ppid=1310 pid=1391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.227000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:42:35.233000 audit[1394]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1394 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.233000 audit[1394]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7fffcdd20c50 a2=0 a3=7fffcdd20c3c items=0 ppid=1310 pid=1394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.233000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:42:35.235000 audit[1396]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1396 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.235000 audit[1396]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fffc70b12f0 a2=0 a3=7fffc70b12dc items=0 ppid=1310 pid=1396 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:42:35.236000 audit[1398]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1398 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.236000 audit[1398]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffd4040be70 a2=0 a3=7ffd4040be5c items=0 ppid=1310 pid=1398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.236000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:42:35.238000 audit[1400]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1400 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.238000 audit[1400]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd7e72a880 a2=0 a3=7ffd7e72a86c items=0 ppid=1310 pid=1400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.238000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:42:35.240188 systemd-networkd[1070]: docker0: Link UP Apr 12 18:42:35.247000 audit[1404]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1404 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.247000 audit[1404]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe8f3511e0 a2=0 a3=7ffe8f3511cc items=0 ppid=1310 pid=1404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.247000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:35.248000 audit[1405]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:42:35.248000 audit[1405]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc2cb36ef0 a2=0 a3=7ffc2cb36edc items=0 ppid=1310 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:35.248000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:42:35.250368 env[1310]: time="2024-04-12T18:42:35.250334508Z" level=info msg="Loading containers: done." Apr 12 18:42:35.259229 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck484018649-merged.mount: Deactivated successfully. Apr 12 18:42:35.264270 env[1310]: time="2024-04-12T18:42:35.264227257Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:42:35.264434 env[1310]: time="2024-04-12T18:42:35.264411472Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:42:35.264522 env[1310]: time="2024-04-12T18:42:35.264501531Z" level=info msg="Daemon has completed initialization" Apr 12 18:42:35.280330 systemd[1]: Started docker.service. Apr 12 18:42:35.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:35.283622 env[1310]: time="2024-04-12T18:42:35.283578063Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:42:35.299692 systemd[1]: Reloading. Apr 12 18:42:35.350129 /usr/lib/systemd/system-generators/torcx-generator[1455]: time="2024-04-12T18:42:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:42:35.350461 /usr/lib/systemd/system-generators/torcx-generator[1455]: time="2024-04-12T18:42:35Z" level=info msg="torcx already run" Apr 12 18:42:35.411882 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:42:35.411901 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:42:35.428679 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.485000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit: BPF prog-id=31 op=LOAD Apr 12 18:42:35.486000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit: BPF prog-id=32 op=LOAD Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.486000 audit: BPF prog-id=33 op=LOAD Apr 12 18:42:35.486000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:42:35.486000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.487000 audit: BPF prog-id=34 op=LOAD Apr 12 18:42:35.487000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit: BPF prog-id=35 op=LOAD Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit: BPF prog-id=36 op=LOAD Apr 12 18:42:35.488000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:42:35.488000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.488000 audit: BPF prog-id=37 op=LOAD Apr 12 18:42:35.488000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.489000 audit: BPF prog-id=38 op=LOAD Apr 12 18:42:35.489000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:42:35.490000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit: BPF prog-id=39 op=LOAD Apr 12 18:42:35.491000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit: BPF prog-id=40 op=LOAD Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.491000 audit: BPF prog-id=41 op=LOAD Apr 12 18:42:35.491000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:42:35.491000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit: BPF prog-id=42 op=LOAD Apr 12 18:42:35.492000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit: BPF prog-id=43 op=LOAD Apr 12 18:42:35.492000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.492000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit: BPF prog-id=44 op=LOAD Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:35.493000 audit: BPF prog-id=45 op=LOAD Apr 12 18:42:35.493000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:42:35.493000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:42:35.501220 systemd[1]: Started kubelet.service. Apr 12 18:42:35.500000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:35.547598 kubelet[1495]: E0412 18:42:35.547533 1495 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:42:35.549380 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:35.549496 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:35.548000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:35.912906 env[1168]: time="2024-04-12T18:42:35.912853614Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 18:42:36.622604 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount345086386.mount: Deactivated successfully. Apr 12 18:42:38.961210 env[1168]: time="2024-04-12T18:42:38.961145168Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:38.963102 env[1168]: time="2024-04-12T18:42:38.963074437Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:38.964960 env[1168]: time="2024-04-12T18:42:38.964921281Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:38.966872 env[1168]: time="2024-04-12T18:42:38.966834910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:38.967655 env[1168]: time="2024-04-12T18:42:38.967616176Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:e70a71eaa5605454dd0adfd46911b0203db5baf1107de51ba9943d2eaea23142\"" Apr 12 18:42:38.996504 env[1168]: time="2024-04-12T18:42:38.996454789Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 18:42:42.645171 env[1168]: time="2024-04-12T18:42:42.645097129Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:42.649669 env[1168]: time="2024-04-12T18:42:42.649617969Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:42.652798 env[1168]: time="2024-04-12T18:42:42.652767115Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:42.656010 env[1168]: time="2024-04-12T18:42:42.655940077Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:42.656619 env[1168]: time="2024-04-12T18:42:42.656567063Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:e5ae3e4dc6566b175cc53982cae28703dcd88916c37b4d2c0cb688faf8e05fad\"" Apr 12 18:42:42.672184 env[1168]: time="2024-04-12T18:42:42.672130105Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 18:42:44.759218 env[1168]: time="2024-04-12T18:42:44.759136603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.763297 env[1168]: time="2024-04-12T18:42:44.763236873Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.765749 env[1168]: time="2024-04-12T18:42:44.765707748Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.767540 env[1168]: time="2024-04-12T18:42:44.767507965Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:44.768162 env[1168]: time="2024-04-12T18:42:44.768134590Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:ad3260645145d9611fcf5e5936ddf7cf5be8990fe44160c960c2f3cc643fb4e4\"" Apr 12 18:42:44.780149 env[1168]: time="2024-04-12T18:42:44.780107268Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:42:45.657104 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:42:45.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.657305 systemd[1]: Stopped kubelet.service. Apr 12 18:42:45.658941 systemd[1]: Started kubelet.service. Apr 12 18:42:45.659835 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:42:45.659867 kernel: audit: type=1130 audit(1712947365.656:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.667268 kernel: audit: type=1131 audit(1712947365.656:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.667329 kernel: audit: type=1130 audit(1712947365.657:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:45.787959 kubelet[1537]: E0412 18:42:45.787898 1537 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:42:45.791661 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:45.791805 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:45.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:45.796288 kernel: audit: type=1131 audit(1712947365.790:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:46.284808 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount876766871.mount: Deactivated successfully. Apr 12 18:42:47.803776 env[1168]: time="2024-04-12T18:42:47.803691718Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.805901 env[1168]: time="2024-04-12T18:42:47.805859354Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.807546 env[1168]: time="2024-04-12T18:42:47.807510410Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.808826 env[1168]: time="2024-04-12T18:42:47.808795230Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:47.809189 env[1168]: time="2024-04-12T18:42:47.809146700Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:5ce97277076c6f5c87d43fec5e3eacad030c82c81b2756d2bba4569d22fc65dc\"" Apr 12 18:42:47.973856 env[1168]: time="2024-04-12T18:42:47.973813918Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:42:48.452774 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3747516490.mount: Deactivated successfully. Apr 12 18:42:48.458850 env[1168]: time="2024-04-12T18:42:48.458816354Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.460695 env[1168]: time="2024-04-12T18:42:48.460641117Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.462059 env[1168]: time="2024-04-12T18:42:48.462032447Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.463634 env[1168]: time="2024-04-12T18:42:48.463597482Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:48.464057 env[1168]: time="2024-04-12T18:42:48.464015236Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:42:48.474120 env[1168]: time="2024-04-12T18:42:48.474074424Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 18:42:49.428636 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount152415989.mount: Deactivated successfully. Apr 12 18:42:55.907292 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Apr 12 18:42:55.907517 systemd[1]: Stopped kubelet.service. Apr 12 18:42:55.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:55.914102 kernel: audit: type=1130 audit(1712947375.906:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:55.914191 kernel: audit: type=1131 audit(1712947375.906:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:55.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:55.962238 systemd[1]: Started kubelet.service. Apr 12 18:42:55.961000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:55.966264 kernel: audit: type=1130 audit(1712947375.961:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:56.027676 kubelet[1559]: E0412 18:42:56.027625 1559 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:42:56.029809 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:42:56.029935 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:42:56.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:56.033271 kernel: audit: type=1131 audit(1712947376.028:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:42:57.736234 env[1168]: time="2024-04-12T18:42:57.736174835Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:57.738722 env[1168]: time="2024-04-12T18:42:57.738656735Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:57.742557 env[1168]: time="2024-04-12T18:42:57.742515959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:57.744275 env[1168]: time="2024-04-12T18:42:57.744221262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:57.745234 env[1168]: time="2024-04-12T18:42:57.745197704Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:73deb9a3f702532592a4167455f8bf2e5f5d900bcc959ba2fd2d35c321de1af9\"" Apr 12 18:42:57.761120 env[1168]: time="2024-04-12T18:42:57.761076926Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:42:58.392743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3632691138.mount: Deactivated successfully. Apr 12 18:42:59.777017 env[1168]: time="2024-04-12T18:42:59.776955627Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:59.779877 env[1168]: time="2024-04-12T18:42:59.779847449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:59.781530 env[1168]: time="2024-04-12T18:42:59.781495333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:59.783431 env[1168]: time="2024-04-12T18:42:59.783397786Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:59.783920 env[1168]: time="2024-04-12T18:42:59.783885663Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Apr 12 18:43:01.990765 systemd[1]: Stopped kubelet.service. Apr 12 18:43:01.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:01.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:01.994282 kernel: audit: type=1130 audit(1712947381.989:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:01.994345 kernel: audit: type=1131 audit(1712947381.993:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:02.008818 systemd[1]: Reloading. Apr 12 18:43:02.065741 /usr/lib/systemd/system-generators/torcx-generator[1669]: time="2024-04-12T18:43:02Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:02.066157 /usr/lib/systemd/system-generators/torcx-generator[1669]: time="2024-04-12T18:43:02Z" level=info msg="torcx already run" Apr 12 18:43:02.246351 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:02.246368 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:02.263152 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:02.333543 kernel: audit: type=1400 audit(1712947382.320:384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333696 kernel: audit: type=1400 audit(1712947382.320:385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333718 kernel: audit: type=1400 audit(1712947382.320:386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333735 kernel: audit: type=1400 audit(1712947382.320:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.336872 kernel: audit: type=1400 audit(1712947382.320:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.336932 kernel: audit: type=1400 audit(1712947382.320:389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.339756 kernel: audit: type=1400 audit(1712947382.320:390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.342640 kernel: audit: type=1400 audit(1712947382.320:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit: BPF prog-id=46 op=LOAD Apr 12 18:43:02.326000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit: BPF prog-id=47 op=LOAD Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.332000 audit: BPF prog-id=48 op=LOAD Apr 12 18:43:02.332000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:43:02.332000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.333000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit: BPF prog-id=49 op=LOAD Apr 12 18:43:02.338000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit: BPF prog-id=50 op=LOAD Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit: BPF prog-id=51 op=LOAD Apr 12 18:43:02.344000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:43:02.344000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.344000 audit: BPF prog-id=52 op=LOAD Apr 12 18:43:02.344000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.345000 audit: BPF prog-id=53 op=LOAD Apr 12 18:43:02.345000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit: BPF prog-id=54 op=LOAD Apr 12 18:43:02.347000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit: BPF prog-id=55 op=LOAD Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.347000 audit: BPF prog-id=56 op=LOAD Apr 12 18:43:02.347000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:43:02.347000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit: BPF prog-id=57 op=LOAD Apr 12 18:43:02.348000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit: BPF prog-id=58 op=LOAD Apr 12 18:43:02.348000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit: BPF prog-id=59 op=LOAD Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:02.349000 audit: BPF prog-id=60 op=LOAD Apr 12 18:43:02.349000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:43:02.349000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:43:02.362062 systemd[1]: Started kubelet.service. Apr 12 18:43:02.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:02.505792 kubelet[1711]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:02.505792 kubelet[1711]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:43:02.505792 kubelet[1711]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:02.505792 kubelet[1711]: I0412 18:43:02.505740 1711 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:43:02.881164 kubelet[1711]: I0412 18:43:02.881030 1711 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:43:02.881164 kubelet[1711]: I0412 18:43:02.881080 1711 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:43:02.881381 kubelet[1711]: I0412 18:43:02.881334 1711 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:43:02.998909 kubelet[1711]: I0412 18:43:02.998858 1711 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:43:02.999788 kubelet[1711]: E0412 18:43:02.999762 1711 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.33:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.005242 kubelet[1711]: I0412 18:43:03.005214 1711 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:43:03.005460 kubelet[1711]: I0412 18:43:03.005444 1711 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:43:03.005654 kubelet[1711]: I0412 18:43:03.005631 1711 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:43:03.005764 kubelet[1711]: I0412 18:43:03.005664 1711 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:43:03.005764 kubelet[1711]: I0412 18:43:03.005672 1711 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:43:03.005812 kubelet[1711]: I0412 18:43:03.005782 1711 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:03.005905 kubelet[1711]: I0412 18:43:03.005888 1711 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:43:03.005905 kubelet[1711]: I0412 18:43:03.005906 1711 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:43:03.005952 kubelet[1711]: I0412 18:43:03.005938 1711 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:43:03.005975 kubelet[1711]: I0412 18:43:03.005959 1711 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:43:03.007428 kubelet[1711]: W0412 18:43:03.007373 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.007428 kubelet[1711]: W0412 18:43:03.007372 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.007428 kubelet[1711]: E0412 18:43:03.007423 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.007428 kubelet[1711]: E0412 18:43:03.007421 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.007681 kubelet[1711]: I0412 18:43:03.007503 1711 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:43:03.007782 kubelet[1711]: W0412 18:43:03.007750 1711 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:43:03.008334 kubelet[1711]: I0412 18:43:03.008317 1711 server.go:1232] "Started kubelet" Apr 12 18:43:03.007000 audit[1711]: AVC avc: denied { mac_admin } for pid=1711 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:03.007000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:03.007000 audit[1711]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c369c0 a1=c0006e07b0 a2=c000c36990 a3=25 items=0 ppid=1 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.007000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:03.007000 audit[1711]: AVC avc: denied { mac_admin } for pid=1711 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:03.007000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:03.009591 kubelet[1711]: E0412 18:43:03.009050 1711 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17c59c91bb2501d0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 3, 8297424, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 3, 8297424, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://10.0.0.33:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.33:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:43:03.009591 kubelet[1711]: I0412 18:43:03.009200 1711 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:43:03.009591 kubelet[1711]: E0412 18:43:03.009291 1711 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:43:03.009722 kubelet[1711]: E0412 18:43:03.009314 1711 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:43:03.009722 kubelet[1711]: I0412 18:43:03.009314 1711 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:43:03.009722 kubelet[1711]: I0412 18:43:03.009331 1711 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:43:03.009722 kubelet[1711]: I0412 18:43:03.009605 1711 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:43:03.009964 kubelet[1711]: I0412 18:43:03.009940 1711 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:43:03.007000 audit[1711]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000213480 a1=c0006e07c8 a2=c000c36a50 a3=25 items=0 ppid=1 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.007000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:03.011002 kubelet[1711]: I0412 18:43:03.010754 1711 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:43:03.011002 kubelet[1711]: I0412 18:43:03.010835 1711 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:43:03.011137 kubelet[1711]: I0412 18:43:03.011116 1711 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:43:03.011333 kubelet[1711]: I0412 18:43:03.011312 1711 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:43:03.011476 kubelet[1711]: I0412 18:43:03.011460 1711 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:43:03.011580 kubelet[1711]: W0412 18:43:03.011537 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.011580 kubelet[1711]: E0412 18:43:03.011584 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.011970 kubelet[1711]: E0412 18:43:03.011935 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="200ms" Apr 12 18:43:03.012000 audit[1723]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.012000 audit[1723]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffcc38d8110 a2=0 a3=7ffcc38d80fc items=0 ppid=1711 pid=1723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.012000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:43:03.013000 audit[1724]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.013000 audit[1724]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd95a9140 a2=0 a3=7fffd95a912c items=0 ppid=1711 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.013000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:43:03.016000 audit[1726]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.016000 audit[1726]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd2efefe40 a2=0 a3=7ffd2efefe2c items=0 ppid=1711 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.016000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:03.019000 audit[1731]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.019000 audit[1731]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffcf3578380 a2=0 a3=7ffcf357836c items=0 ppid=1711 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.019000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:03.027000 audit[1735]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.027000 audit[1735]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffaf84c970 a2=0 a3=7fffaf84c95c items=0 ppid=1711 pid=1735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.027000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:43:03.028656 kubelet[1711]: I0412 18:43:03.028621 1711 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:43:03.028000 audit[1736]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:03.028000 audit[1738]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.028000 audit[1738]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffca4f80b20 a2=0 a3=7ffca4f80b0c items=0 ppid=1711 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.028000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:43:03.028000 audit[1736]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe2b3777c0 a2=0 a3=7ffe2b3777ac items=0 ppid=1711 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.028000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:43:03.030557 kubelet[1711]: I0412 18:43:03.030543 1711 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:43:03.030683 kubelet[1711]: I0412 18:43:03.030668 1711 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:43:03.030782 kubelet[1711]: I0412 18:43:03.030766 1711 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:43:03.030901 kubelet[1711]: E0412 18:43:03.030886 1711 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:43:03.030000 audit[1740]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1740 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.030000 audit[1740]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffd4b52960 a2=0 a3=7fffd4b5294c items=0 ppid=1711 pid=1740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.030000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:43:03.031973 kubelet[1711]: W0412 18:43:03.031913 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.032019 kubelet[1711]: E0412 18:43:03.031978 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:03.031000 audit[1741]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:03.031000 audit[1741]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd76590650 a2=0 a3=7ffd7659063c items=0 ppid=1711 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:43:03.032481 kubelet[1711]: I0412 18:43:03.032315 1711 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:43:03.032481 kubelet[1711]: I0412 18:43:03.032338 1711 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:43:03.032481 kubelet[1711]: I0412 18:43:03.032354 1711 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:03.031000 audit[1742]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:03.031000 audit[1742]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1571a030 a2=0 a3=7ffc1571a01c items=0 ppid=1711 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.031000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:43:03.031000 audit[1743]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:03.031000 audit[1743]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffee4940ca0 a2=0 a3=7ffee4940c8c items=0 ppid=1711 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.031000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:43:03.032000 audit[1744]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:03.032000 audit[1744]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc91b722e0 a2=0 a3=7ffc91b722cc items=0 ppid=1711 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:43:03.112529 kubelet[1711]: I0412 18:43:03.112494 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:03.113029 kubelet[1711]: E0412 18:43:03.112995 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:03.121003 kubelet[1711]: I0412 18:43:03.120972 1711 policy_none.go:49] "None policy: Start" Apr 12 18:43:03.121811 kubelet[1711]: I0412 18:43:03.121786 1711 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:43:03.121914 kubelet[1711]: I0412 18:43:03.121832 1711 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:43:03.132057 kubelet[1711]: E0412 18:43:03.131950 1711 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Apr 12 18:43:03.190681 systemd[1]: Created slice kubepods.slice. Apr 12 18:43:03.196052 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:43:03.202325 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:43:03.203313 kubelet[1711]: I0412 18:43:03.203288 1711 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:43:03.202000 audit[1711]: AVC avc: denied { mac_admin } for pid=1711 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:03.202000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:03.202000 audit[1711]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008634d0 a1=c00007f578 a2=c0008634a0 a3=25 items=0 ppid=1 pid=1711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:03.202000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:03.203529 kubelet[1711]: I0412 18:43:03.203365 1711 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:43:03.203760 kubelet[1711]: I0412 18:43:03.203565 1711 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:43:03.204217 kubelet[1711]: E0412 18:43:03.204180 1711 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:43:03.212717 kubelet[1711]: E0412 18:43:03.212692 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="400ms" Apr 12 18:43:03.315145 kubelet[1711]: I0412 18:43:03.315092 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:03.315676 kubelet[1711]: E0412 18:43:03.315655 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:03.332906 kubelet[1711]: I0412 18:43:03.332854 1711 topology_manager.go:215] "Topology Admit Handler" podUID="d5372aa5088b2ee437766ab89f9ade42" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:43:03.334035 kubelet[1711]: I0412 18:43:03.334011 1711 topology_manager.go:215] "Topology Admit Handler" podUID="7ea520b1e9b7ab03da4e0d60de4cd055" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:43:03.334862 kubelet[1711]: I0412 18:43:03.334834 1711 topology_manager.go:215] "Topology Admit Handler" podUID="7bb06e2cba933e89936d947f3ee7de1d" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:43:03.340015 systemd[1]: Created slice kubepods-burstable-podd5372aa5088b2ee437766ab89f9ade42.slice. Apr 12 18:43:03.348503 systemd[1]: Created slice kubepods-burstable-pod7ea520b1e9b7ab03da4e0d60de4cd055.slice. Apr 12 18:43:03.357721 systemd[1]: Created slice kubepods-burstable-pod7bb06e2cba933e89936d947f3ee7de1d.slice. Apr 12 18:43:03.413362 kubelet[1711]: I0412 18:43:03.413313 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.413464 kubelet[1711]: I0412 18:43:03.413375 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:03.413464 kubelet[1711]: I0412 18:43:03.413398 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:03.413533 kubelet[1711]: I0412 18:43:03.413483 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:03.413667 kubelet[1711]: I0412 18:43:03.413623 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.413667 kubelet[1711]: I0412 18:43:03.413670 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.413784 kubelet[1711]: I0412 18:43:03.413717 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.413784 kubelet[1711]: I0412 18:43:03.413754 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:03.413784 kubelet[1711]: I0412 18:43:03.413773 1711 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7bb06e2cba933e89936d947f3ee7de1d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"7bb06e2cba933e89936d947f3ee7de1d\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:43:03.613604 kubelet[1711]: E0412 18:43:03.613566 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="800ms" Apr 12 18:43:03.647055 kubelet[1711]: E0412 18:43:03.647026 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:03.647810 env[1168]: time="2024-04-12T18:43:03.647765274Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d5372aa5088b2ee437766ab89f9ade42,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:03.655839 kubelet[1711]: E0412 18:43:03.655815 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:03.656308 env[1168]: time="2024-04-12T18:43:03.656222076Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7ea520b1e9b7ab03da4e0d60de4cd055,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:03.659498 kubelet[1711]: E0412 18:43:03.659477 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:03.659871 env[1168]: time="2024-04-12T18:43:03.659845877Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:7bb06e2cba933e89936d947f3ee7de1d,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:03.717406 kubelet[1711]: I0412 18:43:03.717340 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:03.717801 kubelet[1711]: E0412 18:43:03.717771 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:04.340188 kubelet[1711]: W0412 18:43:04.340126 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.343607 kubelet[1711]: E0412 18:43:04.343577 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.382577 kubelet[1711]: W0412 18:43:04.382538 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.382577 kubelet[1711]: E0412 18:43:04.382573 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.414047 kubelet[1711]: E0412 18:43:04.414023 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="1.6s" Apr 12 18:43:04.520378 kubelet[1711]: I0412 18:43:04.520332 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:04.520813 kubelet[1711]: E0412 18:43:04.520786 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:04.539213 kubelet[1711]: W0412 18:43:04.539164 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.539318 kubelet[1711]: E0412 18:43:04.539217 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.540500 kubelet[1711]: W0412 18:43:04.540472 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:04.540529 kubelet[1711]: E0412 18:43:04.540501 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:05.026869 kubelet[1711]: E0412 18:43:05.026830 1711 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.33:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:06.014385 kubelet[1711]: E0412 18:43:06.014335 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="3.2s" Apr 12 18:43:06.122150 kubelet[1711]: I0412 18:43:06.122106 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:06.122534 kubelet[1711]: E0412 18:43:06.122390 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:06.434514 kubelet[1711]: W0412 18:43:06.434471 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:06.434514 kubelet[1711]: E0412 18:43:06.434511 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.33:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.107342 kubelet[1711]: W0412 18:43:07.107283 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.107342 kubelet[1711]: E0412 18:43:07.107332 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.33:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.191122 kubelet[1711]: W0412 18:43:07.191068 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.191122 kubelet[1711]: E0412 18:43:07.191108 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.33:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.528597 kubelet[1711]: W0412 18:43:07.528533 1711 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.528597 kubelet[1711]: E0412 18:43:07.528573 1711 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.33:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:07.658393 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1042375286.mount: Deactivated successfully. Apr 12 18:43:08.053131 env[1168]: time="2024-04-12T18:43:08.053066929Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.091814 env[1168]: time="2024-04-12T18:43:08.091773176Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.132169 env[1168]: time="2024-04-12T18:43:08.132109381Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.147532 env[1168]: time="2024-04-12T18:43:08.147462058Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.215782 env[1168]: time="2024-04-12T18:43:08.215718804Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.237692 env[1168]: time="2024-04-12T18:43:08.237647789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.266489 env[1168]: time="2024-04-12T18:43:08.266424667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.291344 env[1168]: time="2024-04-12T18:43:08.291295922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.294352 env[1168]: time="2024-04-12T18:43:08.294304629Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.300711 env[1168]: time="2024-04-12T18:43:08.300660379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.374281 env[1168]: time="2024-04-12T18:43:08.374119441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.451072 env[1168]: time="2024-04-12T18:43:08.450987933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:08.669760 env[1168]: time="2024-04-12T18:43:08.669682565Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:08.669937 env[1168]: time="2024-04-12T18:43:08.669740444Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:08.669937 env[1168]: time="2024-04-12T18:43:08.669752368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:08.670100 env[1168]: time="2024-04-12T18:43:08.670002152Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6f3fdeac400eb12d32f20c2d64211d0b1b83e329759a7af9866cfbfe40952d26 pid=1752 runtime=io.containerd.runc.v2 Apr 12 18:43:08.688527 systemd[1]: Started cri-containerd-6f3fdeac400eb12d32f20c2d64211d0b1b83e329759a7af9866cfbfe40952d26.scope. Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737535 kernel: kauditd_printk_skb: 213 callbacks suppressed Apr 12 18:43:08.737654 kernel: audit: type=1400 audit(1712947388.723:572): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737674 kernel: audit: type=1400 audit(1712947388.723:573): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737688 kernel: audit: type=1400 audit(1712947388.723:574): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737719 kernel: audit: type=1400 audit(1712947388.723:575): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737881 env[1168]: time="2024-04-12T18:43:08.727816583Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:08.737881 env[1168]: time="2024-04-12T18:43:08.727859354Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:08.737881 env[1168]: time="2024-04-12T18:43:08.727872209Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:08.737881 env[1168]: time="2024-04-12T18:43:08.728043074Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/812d3d3ba88de9f4a8c2a6fb72f1083f1e96d6207e23fbcdfbfe39d6517974a1 pid=1785 runtime=io.containerd.runc.v2 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.746490 systemd[1]: Started cri-containerd-812d3d3ba88de9f4a8c2a6fb72f1083f1e96d6207e23fbcdfbfe39d6517974a1.scope. Apr 12 18:43:08.751519 kernel: audit: type=1400 audit(1712947388.723:576): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.751863 kernel: audit: type=1400 audit(1712947388.723:577): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.751882 kernel: audit: type=1400 audit(1712947388.723:578): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.757724 kernel: audit: type=1400 audit(1712947388.723:579): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.777773 kernel: audit: type=1400 audit(1712947388.723:580): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.777964 kernel: audit: type=1400 audit(1712947388.727:581): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.727000 audit: BPF prog-id=61 op=LOAD Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1752 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666336664656163343030656231326433326632306332643634323131 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1752 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666336664656163343030656231326433326632306332643634323131 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.728000 audit: BPF prog-id=62 op=LOAD Apr 12 18:43:08.728000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00029db10 items=0 ppid=1752 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.728000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666336664656163343030656231326433326632306332643634323131 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.734000 audit: BPF prog-id=63 op=LOAD Apr 12 18:43:08.734000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00029db58 items=0 ppid=1752 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.734000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666336664656163343030656231326433326632306332643634323131 Apr 12 18:43:08.737000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:43:08.737000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { perfmon } for pid=1761 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit[1761]: AVC avc: denied { bpf } for pid=1761 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.737000 audit: BPF prog-id=64 op=LOAD Apr 12 18:43:08.737000 audit[1761]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00029df68 items=0 ppid=1752 pid=1761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.737000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666336664656163343030656231326433326632306332643634323131 Apr 12 18:43:08.798014 env[1168]: time="2024-04-12T18:43:08.797878560Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:08.798014 env[1168]: time="2024-04-12T18:43:08.797950517Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:08.798014 env[1168]: time="2024-04-12T18:43:08.797961848Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:08.798442 env[1168]: time="2024-04-12T18:43:08.798378310Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/80817ae4bf5d31dfc8260240d9778baf8960e3b8f8dc8f36994f364237cb2450 pid=1809 runtime=io.containerd.runc.v2 Apr 12 18:43:08.909974 systemd[1]: Started cri-containerd-80817ae4bf5d31dfc8260240d9778baf8960e3b8f8dc8f36994f364237cb2450.scope. Apr 12 18:43:08.916367 kubelet[1711]: E0412 18:43:08.914770 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.917958 env[1168]: time="2024-04-12T18:43:08.913569101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:d5372aa5088b2ee437766ab89f9ade42,Namespace:kube-system,Attempt:0,} returns sandbox id \"6f3fdeac400eb12d32f20c2d64211d0b1b83e329759a7af9866cfbfe40952d26\"" Apr 12 18:43:08.917958 env[1168]: time="2024-04-12T18:43:08.916951308Z" level=info msg="CreateContainer within sandbox \"6f3fdeac400eb12d32f20c2d64211d0b1b83e329759a7af9866cfbfe40952d26\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit: BPF prog-id=65 op=LOAD Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1785 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326433643362613838646539663461386332613666623732663130 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1785 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326433643362613838646539663461386332613666623732663130 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.921000 audit: BPF prog-id=66 op=LOAD Apr 12 18:43:08.921000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000308fe0 items=0 ppid=1785 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326433643362613838646539663461386332613666623732663130 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit: BPF prog-id=67 op=LOAD Apr 12 18:43:08.922000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000309028 items=0 ppid=1785 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326433643362613838646539663461386332613666623732663130 Apr 12 18:43:08.922000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:43:08.922000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { perfmon } for pid=1794 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit[1794]: AVC avc: denied { bpf } for pid=1794 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.922000 audit: BPF prog-id=68 op=LOAD Apr 12 18:43:08.922000 audit[1794]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000309438 items=0 ppid=1785 pid=1794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.922000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831326433643362613838646539663461386332613666623732663130 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.928000 audit: BPF prog-id=69 op=LOAD Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1809 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383137616534626635643331646663383236303234306439373738 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=1809 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383137616534626635643331646663383236303234306439373738 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.929000 audit: BPF prog-id=70 op=LOAD Apr 12 18:43:08.929000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00009a350 items=0 ppid=1809 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383137616534626635643331646663383236303234306439373738 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.930000 audit: BPF prog-id=71 op=LOAD Apr 12 18:43:08.930000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00009a398 items=0 ppid=1809 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383137616534626635643331646663383236303234306439373738 Apr 12 18:43:08.931000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:43:08.931000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:08.931000 audit: BPF prog-id=72 op=LOAD Apr 12 18:43:08.931000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00009a7a8 items=0 ppid=1809 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:08.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830383137616534626635643331646663383236303234306439373738 Apr 12 18:43:08.961367 env[1168]: time="2024-04-12T18:43:08.961318624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:7bb06e2cba933e89936d947f3ee7de1d,Namespace:kube-system,Attempt:0,} returns sandbox id \"812d3d3ba88de9f4a8c2a6fb72f1083f1e96d6207e23fbcdfbfe39d6517974a1\"" Apr 12 18:43:08.962513 kubelet[1711]: E0412 18:43:08.962398 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.963477 env[1168]: time="2024-04-12T18:43:08.963440266Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7ea520b1e9b7ab03da4e0d60de4cd055,Namespace:kube-system,Attempt:0,} returns sandbox id \"80817ae4bf5d31dfc8260240d9778baf8960e3b8f8dc8f36994f364237cb2450\"" Apr 12 18:43:08.964698 kubelet[1711]: E0412 18:43:08.964668 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:08.964987 env[1168]: time="2024-04-12T18:43:08.964939836Z" level=info msg="CreateContainer within sandbox \"812d3d3ba88de9f4a8c2a6fb72f1083f1e96d6207e23fbcdfbfe39d6517974a1\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:43:08.966701 env[1168]: time="2024-04-12T18:43:08.966666147Z" level=info msg="CreateContainer within sandbox \"80817ae4bf5d31dfc8260240d9778baf8960e3b8f8dc8f36994f364237cb2450\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:43:09.043719 kubelet[1711]: E0412 18:43:09.043687 1711 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.33:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.33:6443: connect: connection refused Apr 12 18:43:09.216065 kubelet[1711]: E0412 18:43:09.215928 1711 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.33:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.33:6443: connect: connection refused" interval="6.4s" Apr 12 18:43:09.324577 kubelet[1711]: I0412 18:43:09.324523 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:09.324853 kubelet[1711]: E0412 18:43:09.324834 1711 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.33:6443/api/v1/nodes\": dial tcp 10.0.0.33:6443: connect: connection refused" node="localhost" Apr 12 18:43:09.342573 env[1168]: time="2024-04-12T18:43:09.342505617Z" level=info msg="CreateContainer within sandbox \"6f3fdeac400eb12d32f20c2d64211d0b1b83e329759a7af9866cfbfe40952d26\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"779b5bddd4be97ed8e3935f88fb584f6e0b080070c53af26dd931e9f800f895c\"" Apr 12 18:43:09.343414 env[1168]: time="2024-04-12T18:43:09.343384927Z" level=info msg="StartContainer for \"779b5bddd4be97ed8e3935f88fb584f6e0b080070c53af26dd931e9f800f895c\"" Apr 12 18:43:09.359778 systemd[1]: Started cri-containerd-779b5bddd4be97ed8e3935f88fb584f6e0b080070c53af26dd931e9f800f895c.scope. Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.375000 audit: BPF prog-id=73 op=LOAD Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1752 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396235626464643462653937656438653339333566383866623538 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1752 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396235626464643462653937656438653339333566383866623538 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit: BPF prog-id=74 op=LOAD Apr 12 18:43:09.376000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be2f0 items=0 ppid=1752 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396235626464643462653937656438653339333566383866623538 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit: BPF prog-id=75 op=LOAD Apr 12 18:43:09.376000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be338 items=0 ppid=1752 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396235626464643462653937656438653339333566383866623538 Apr 12 18:43:09.376000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:43:09.376000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { perfmon } for pid=1878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit[1878]: AVC avc: denied { bpf } for pid=1878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.376000 audit: BPF prog-id=76 op=LOAD Apr 12 18:43:09.376000 audit[1878]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be748 items=0 ppid=1752 pid=1878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737396235626464643462653937656438653339333566383866623538 Apr 12 18:43:09.381128 env[1168]: time="2024-04-12T18:43:09.381064295Z" level=info msg="CreateContainer within sandbox \"812d3d3ba88de9f4a8c2a6fb72f1083f1e96d6207e23fbcdfbfe39d6517974a1\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"61a33b4ed0acc64787c0431a9e262d8974b74993e9e4d562369d41336f2d277a\"" Apr 12 18:43:09.381741 env[1168]: time="2024-04-12T18:43:09.381711645Z" level=info msg="StartContainer for \"61a33b4ed0acc64787c0431a9e262d8974b74993e9e4d562369d41336f2d277a\"" Apr 12 18:43:09.404700 systemd[1]: Started cri-containerd-61a33b4ed0acc64787c0431a9e262d8974b74993e9e4d562369d41336f2d277a.scope. Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.418000 audit: BPF prog-id=77 op=LOAD Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bfc48 a2=10 a3=1c items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613333623465643061636336343738376330343331613965323632 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bf6b0 a2=3c a3=8 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613333623465643061636336343738376330343331613965323632 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit: BPF prog-id=78 op=LOAD Apr 12 18:43:09.419000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bf9d8 a2=78 a3=c000025220 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613333623465643061636336343738376330343331613965323632 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit: BPF prog-id=79 op=LOAD Apr 12 18:43:09.419000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bf770 a2=78 a3=c000025268 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613333623465643061636336343738376330343331613965323632 Apr 12 18:43:09.419000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:43:09.419000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { perfmon } for pid=1902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit[1902]: AVC avc: denied { bpf } for pid=1902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.419000 audit: BPF prog-id=80 op=LOAD Apr 12 18:43:09.419000 audit[1902]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bfc30 a2=78 a3=c000025678 items=0 ppid=1785 pid=1902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631613333623465643061636336343738376330343331613965323632 Apr 12 18:43:09.450344 env[1168]: time="2024-04-12T18:43:09.450237487Z" level=info msg="CreateContainer within sandbox \"80817ae4bf5d31dfc8260240d9778baf8960e3b8f8dc8f36994f364237cb2450\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"90e7c69c8b173b1519a3a9b1bcd098625294938a668c2d49f439d4a7491241d5\"" Apr 12 18:43:09.451146 env[1168]: time="2024-04-12T18:43:09.451115344Z" level=info msg="StartContainer for \"90e7c69c8b173b1519a3a9b1bcd098625294938a668c2d49f439d4a7491241d5\"" Apr 12 18:43:09.471492 systemd[1]: Started cri-containerd-90e7c69c8b173b1519a3a9b1bcd098625294938a668c2d49f439d4a7491241d5.scope. Apr 12 18:43:09.476202 env[1168]: time="2024-04-12T18:43:09.476151143Z" level=info msg="StartContainer for \"61a33b4ed0acc64787c0431a9e262d8974b74993e9e4d562369d41336f2d277a\" returns successfully" Apr 12 18:43:09.476640 env[1168]: time="2024-04-12T18:43:09.476495697Z" level=info msg="StartContainer for \"779b5bddd4be97ed8e3935f88fb584f6e0b080070c53af26dd931e9f800f895c\" returns successfully" Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.497000 audit: BPF prog-id=81 op=LOAD Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653763363963386231373362313531396133613962316263643039 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653763363963386231373362313531396133613962316263643039 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit: BPF prog-id=82 op=LOAD Apr 12 18:43:09.498000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000292ae0 items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653763363963386231373362313531396133613962316263643039 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit: BPF prog-id=83 op=LOAD Apr 12 18:43:09.498000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000292b28 items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653763363963386231373362313531396133613962316263643039 Apr 12 18:43:09.498000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:43:09.498000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { perfmon } for pid=1950 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit[1950]: AVC avc: denied { bpf } for pid=1950 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:09.498000 audit: BPF prog-id=84 op=LOAD Apr 12 18:43:09.498000 audit[1950]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000292f38 items=0 ppid=1809 pid=1950 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:09.498000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930653763363963386231373362313531396133613962316263643039 Apr 12 18:43:09.569282 env[1168]: time="2024-04-12T18:43:09.569203648Z" level=info msg="StartContainer for \"90e7c69c8b173b1519a3a9b1bcd098625294938a668c2d49f439d4a7491241d5\" returns successfully" Apr 12 18:43:09.684150 update_engine[1151]: I0412 18:43:09.684104 1151 update_attempter.cc:509] Updating boot flags... Apr 12 18:43:10.052968 kubelet[1711]: E0412 18:43:10.048993 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:10.052968 kubelet[1711]: E0412 18:43:10.050864 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:10.052968 kubelet[1711]: E0412 18:43:10.052782 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:10.836000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.836000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004266a40 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.836000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.836000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00443b050 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.836000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.837000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.837000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c003e08690 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.837000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.839000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.839000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c007738c90 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.839000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.843000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.843000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c003270480 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.843000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.843000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.843000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=5e a1=c002f22ba0 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:43:10.843000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:43:10.952000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.952000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:10.952000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0004207e0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:10.952000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000b7c000 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:10.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:10.952000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:11.037969 kubelet[1711]: E0412 18:43:11.037860 1711 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17c59c91bb2501d0", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 43, 3, 8297424, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 43, 3, 8297424, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'namespaces "default" not found' (will not retry!) Apr 12 18:43:11.054432 kubelet[1711]: E0412 18:43:11.054391 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:11.054843 kubelet[1711]: E0412 18:43:11.054459 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:11.054843 kubelet[1711]: E0412 18:43:11.054517 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:11.365204 kubelet[1711]: E0412 18:43:11.365164 1711 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:11.720040 kubelet[1711]: E0412 18:43:11.719992 1711 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:12.056750 kubelet[1711]: E0412 18:43:12.056643 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:12.293115 kubelet[1711]: E0412 18:43:12.293054 1711 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:13.010960 kubelet[1711]: I0412 18:43:13.010914 1711 apiserver.go:52] "Watching apiserver" Apr 12 18:43:13.111974 kubelet[1711]: I0412 18:43:13.111927 1711 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:43:13.204323 kubelet[1711]: E0412 18:43:13.204282 1711 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:43:13.468572 kubelet[1711]: E0412 18:43:13.468521 1711 csi_plugin.go:295] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:43:14.452000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:43:14.454025 kernel: kauditd_printk_skb: 356 callbacks suppressed Apr 12 18:43:14.454240 kernel: audit: type=1400 audit(1712947394.452:688): avc: denied { watch } for pid=1961 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521038 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:43:14.452000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f41100 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:14.464594 kernel: audit: type=1300 audit(1712947394.452:688): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f41100 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:14.464703 kernel: audit: type=1327 audit(1712947394.452:688): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:14.452000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:15.312960 kubelet[1711]: E0412 18:43:15.312914 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:15.619058 kubelet[1711]: E0412 18:43:15.618927 1711 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:43:15.726472 kubelet[1711]: I0412 18:43:15.726433 1711 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:15.729372 kubelet[1711]: I0412 18:43:15.729346 1711 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:43:16.397756 kubelet[1711]: E0412 18:43:16.397727 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:17.063430 kubelet[1711]: E0412 18:43:17.063381 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:17.105197 kubelet[1711]: E0412 18:43:17.105158 1711 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:17.118673 systemd[1]: Reloading. Apr 12 18:43:17.174602 /usr/lib/systemd/system-generators/torcx-generator[2022]: time="2024-04-12T18:43:17Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:43:17.175012 /usr/lib/systemd/system-generators/torcx-generator[2022]: time="2024-04-12T18:43:17Z" level=info msg="torcx already run" Apr 12 18:43:17.244561 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:43:17.244580 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:43:17.261547 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338906 kernel: audit: type=1400 audit(1712947397.332:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338952 kernel: audit: type=1400 audit(1712947397.332:690): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338981 kernel: audit: type=1400 audit(1712947397.332:691): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341833 kernel: audit: type=1400 audit(1712947397.332:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.344724 kernel: audit: type=1400 audit(1712947397.332:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.347616 kernel: audit: type=1400 audit(1712947397.332:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353457 kernel: audit: type=1400 audit(1712947397.332:695): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.335000 audit: BPF prog-id=85 op=LOAD Apr 12 18:43:17.335000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.336000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit: BPF prog-id=86 op=LOAD Apr 12 18:43:17.338000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit: BPF prog-id=87 op=LOAD Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.344000 audit: BPF prog-id=88 op=LOAD Apr 12 18:43:17.344000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:43:17.344000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit: BPF prog-id=89 op=LOAD Apr 12 18:43:17.350000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit: BPF prog-id=90 op=LOAD Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit: BPF prog-id=91 op=LOAD Apr 12 18:43:17.353000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:43:17.353000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit: BPF prog-id=92 op=LOAD Apr 12 18:43:17.353000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit: BPF prog-id=93 op=LOAD Apr 12 18:43:17.354000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.354000 audit: BPF prog-id=94 op=LOAD Apr 12 18:43:17.354000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.356000 audit: BPF prog-id=95 op=LOAD Apr 12 18:43:17.356000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit: BPF prog-id=96 op=LOAD Apr 12 18:43:17.357000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit: BPF prog-id=97 op=LOAD Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit: BPF prog-id=98 op=LOAD Apr 12 18:43:17.357000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:43:17.357000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit: BPF prog-id=99 op=LOAD Apr 12 18:43:17.358000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.358000 audit: BPF prog-id=100 op=LOAD Apr 12 18:43:17.358000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit: BPF prog-id=101 op=LOAD Apr 12 18:43:17.359000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit: BPF prog-id=102 op=LOAD Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.359000 audit: BPF prog-id=103 op=LOAD Apr 12 18:43:17.359000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:43:17.359000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit: BPF prog-id=104 op=LOAD Apr 12 18:43:17.360000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.360000 audit: BPF prog-id=105 op=LOAD Apr 12 18:43:17.361000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:43:17.372530 kubelet[1711]: I0412 18:43:17.372498 1711 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:43:17.372728 systemd[1]: Stopping kubelet.service... Apr 12 18:43:17.392463 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:43:17.392632 systemd[1]: Stopped kubelet.service. Apr 12 18:43:17.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:17.392685 systemd[1]: kubelet.service: Consumed 1.171s CPU time. Apr 12 18:43:17.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:17.394275 systemd[1]: Started kubelet.service. Apr 12 18:43:17.439374 kubelet[2062]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:17.439374 kubelet[2062]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:43:17.439374 kubelet[2062]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:43:17.439735 kubelet[2062]: I0412 18:43:17.439398 2062 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:43:17.443416 kubelet[2062]: I0412 18:43:17.443394 2062 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:43:17.443416 kubelet[2062]: I0412 18:43:17.443413 2062 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:43:17.443577 kubelet[2062]: I0412 18:43:17.443555 2062 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:43:17.446610 kubelet[2062]: I0412 18:43:17.446586 2062 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:43:17.447687 kubelet[2062]: I0412 18:43:17.447650 2062 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:43:17.456759 kubelet[2062]: I0412 18:43:17.456735 2062 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:43:17.456927 kubelet[2062]: I0412 18:43:17.456909 2062 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:43:17.457099 kubelet[2062]: I0412 18:43:17.457081 2062 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:43:17.457189 kubelet[2062]: I0412 18:43:17.457108 2062 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:43:17.457189 kubelet[2062]: I0412 18:43:17.457117 2062 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:43:17.457189 kubelet[2062]: I0412 18:43:17.457153 2062 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:17.457286 kubelet[2062]: I0412 18:43:17.457240 2062 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:43:17.457286 kubelet[2062]: I0412 18:43:17.457265 2062 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:43:17.457327 kubelet[2062]: I0412 18:43:17.457286 2062 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:43:17.457327 kubelet[2062]: I0412 18:43:17.457307 2062 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:43:17.462000 audit[2062]: AVC avc: denied { mac_admin } for pid=2062 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.462000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:17.462000 audit[2062]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000dca300 a1=c0005db068 a2=c000dca2d0 a3=25 items=0 ppid=1 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.462000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:17.462000 audit[2062]: AVC avc: denied { mac_admin } for pid=2062 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.462000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:17.462000 audit[2062]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000579980 a1=c0005db080 a2=c000dca390 a3=25 items=0 ppid=1 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.462000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.458238 2062 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.459046 2062 server.go:1232] "Started kubelet" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.459497 2062 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.460439 2062 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.462495 2062 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.462524 2062 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.462543 2062 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.463909 2062 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:43:17.467733 kubelet[2062]: I0412 18:43:17.464064 2062 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:43:17.468163 kubelet[2062]: E0412 18:43:17.468140 2062 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:43:17.468163 kubelet[2062]: E0412 18:43:17.468163 2062 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:43:17.469065 kubelet[2062]: I0412 18:43:17.469053 2062 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:43:17.469144 kubelet[2062]: I0412 18:43:17.469127 2062 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:43:17.469640 kubelet[2062]: I0412 18:43:17.469604 2062 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:43:17.482185 kubelet[2062]: I0412 18:43:17.482150 2062 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:43:17.483610 kubelet[2062]: I0412 18:43:17.483106 2062 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:43:17.483610 kubelet[2062]: I0412 18:43:17.483134 2062 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:43:17.483610 kubelet[2062]: I0412 18:43:17.483152 2062 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:43:17.483610 kubelet[2062]: E0412 18:43:17.483191 2062 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:43:17.509092 kubelet[2062]: I0412 18:43:17.509059 2062 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:43:17.509092 kubelet[2062]: I0412 18:43:17.509080 2062 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:43:17.509092 kubelet[2062]: I0412 18:43:17.509096 2062 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:43:17.509309 kubelet[2062]: I0412 18:43:17.509269 2062 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:43:17.509309 kubelet[2062]: I0412 18:43:17.509288 2062 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:43:17.509309 kubelet[2062]: I0412 18:43:17.509293 2062 policy_none.go:49] "None policy: Start" Apr 12 18:43:17.509899 kubelet[2062]: I0412 18:43:17.509881 2062 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:43:17.509943 kubelet[2062]: I0412 18:43:17.509910 2062 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:43:17.510070 kubelet[2062]: I0412 18:43:17.510051 2062 state_mem.go:75] "Updated machine memory state" Apr 12 18:43:17.513651 kubelet[2062]: I0412 18:43:17.513624 2062 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:43:17.513000 audit[2062]: AVC avc: denied { mac_admin } for pid=2062 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:17.513000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:43:17.513000 audit[2062]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0012eab70 a1=c0012f3f68 a2=c0012eab40 a3=25 items=0 ppid=1 pid=2062 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:17.513000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:43:17.513894 kubelet[2062]: I0412 18:43:17.513684 2062 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:43:17.513894 kubelet[2062]: I0412 18:43:17.513863 2062 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:43:17.572478 kubelet[2062]: I0412 18:43:17.572430 2062 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:43:17.583691 kubelet[2062]: I0412 18:43:17.583645 2062 topology_manager.go:215] "Topology Admit Handler" podUID="d5372aa5088b2ee437766ab89f9ade42" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:43:17.583843 kubelet[2062]: I0412 18:43:17.583824 2062 topology_manager.go:215] "Topology Admit Handler" podUID="7ea520b1e9b7ab03da4e0d60de4cd055" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:43:17.583984 kubelet[2062]: I0412 18:43:17.583959 2062 topology_manager.go:215] "Topology Admit Handler" podUID="7bb06e2cba933e89936d947f3ee7de1d" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:43:17.670753 kubelet[2062]: I0412 18:43:17.670704 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:17.670962 kubelet[2062]: I0412 18:43:17.670764 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7bb06e2cba933e89936d947f3ee7de1d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"7bb06e2cba933e89936d947f3ee7de1d\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:43:17.670962 kubelet[2062]: I0412 18:43:17.670828 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:17.670962 kubelet[2062]: I0412 18:43:17.670914 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:17.671069 kubelet[2062]: I0412 18:43:17.671013 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:17.671069 kubelet[2062]: I0412 18:43:17.671046 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:17.671154 kubelet[2062]: I0412 18:43:17.671077 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:17.671154 kubelet[2062]: I0412 18:43:17.671141 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:17.671238 kubelet[2062]: I0412 18:43:17.671168 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/d5372aa5088b2ee437766ab89f9ade42-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"d5372aa5088b2ee437766ab89f9ade42\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:17.759503 kubelet[2062]: E0412 18:43:17.759439 2062 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Apr 12 18:43:17.759990 kubelet[2062]: E0412 18:43:17.759955 2062 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:17.798789 kubelet[2062]: I0412 18:43:17.798736 2062 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Apr 12 18:43:17.798960 kubelet[2062]: I0412 18:43:17.798823 2062 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:43:18.029854 kubelet[2062]: E0412 18:43:18.029729 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:18.060946 kubelet[2062]: E0412 18:43:18.060911 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:18.060946 kubelet[2062]: E0412 18:43:18.060965 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:18.458403 kubelet[2062]: I0412 18:43:18.458343 2062 apiserver.go:52] "Watching apiserver" Apr 12 18:43:18.470285 kubelet[2062]: I0412 18:43:18.470033 2062 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:43:18.492908 kubelet[2062]: E0412 18:43:18.492873 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:18.690697 kubelet[2062]: E0412 18:43:18.690649 2062 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Apr 12 18:43:18.691226 kubelet[2062]: E0412 18:43:18.691182 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:18.691575 kubelet[2062]: I0412 18:43:18.691552 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.691509279 podCreationTimestamp="2024-04-12 18:43:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:18.690897303 +0000 UTC m=+1.292011803" watchObservedRunningTime="2024-04-12 18:43:18.691509279 +0000 UTC m=+1.292623749" Apr 12 18:43:19.044940 kubelet[2062]: E0412 18:43:19.044888 2062 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:43:19.045680 kubelet[2062]: E0412 18:43:19.045486 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:19.086012 kubelet[2062]: I0412 18:43:19.085913 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=3.085878343 podCreationTimestamp="2024-04-12 18:43:16 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:19.08564389 +0000 UTC m=+1.686758370" watchObservedRunningTime="2024-04-12 18:43:19.085878343 +0000 UTC m=+1.686992813" Apr 12 18:43:19.496972 kubelet[2062]: E0412 18:43:19.494030 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:19.496972 kubelet[2062]: E0412 18:43:19.494544 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:19.496972 kubelet[2062]: E0412 18:43:19.494937 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:19.880858 kubelet[2062]: I0412 18:43:19.880751 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.880689005 podCreationTimestamp="2024-04-12 18:43:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:19.267288511 +0000 UTC m=+1.868403011" watchObservedRunningTime="2024-04-12 18:43:19.880689005 +0000 UTC m=+2.481803485" Apr 12 18:43:20.494908 kubelet[2062]: E0412 18:43:20.494860 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:21.051610 kubelet[2062]: E0412 18:43:21.051581 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:21.496205 kubelet[2062]: E0412 18:43:21.496173 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:21.498419 kubelet[2062]: E0412 18:43:21.496901 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:23.325679 sudo[1292]: pam_unix(sudo:session): session closed for user root Apr 12 18:43:23.324000 audit[1292]: USER_END pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:23.326761 kernel: kauditd_printk_skb: 251 callbacks suppressed Apr 12 18:43:23.326817 kernel: audit: type=1106 audit(1712947403.324:938): pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:23.330100 sshd[1289]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:23.324000 audit[1292]: CRED_DISP pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:23.333005 systemd[1]: sshd@6-10.0.0.33:22-10.0.0.1:52020.service: Deactivated successfully. Apr 12 18:43:23.333724 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:43:23.333870 systemd[1]: session-7.scope: Consumed 3.934s CPU time. Apr 12 18:43:23.334333 systemd-logind[1150]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:43:23.335011 systemd-logind[1150]: Removed session 7. Apr 12 18:43:23.335628 kernel: audit: type=1104 audit(1712947403.324:939): pid=1292 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:43:23.335680 kernel: audit: type=1106 audit(1712947403.329:940): pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:23.329000 audit[1289]: USER_END pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:23.340639 kernel: audit: type=1104 audit(1712947403.330:941): pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:23.330000 audit[1289]: CRED_DISP pid=1289 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:23.331000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.33:22-10.0.0.1:52020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:23.347932 kernel: audit: type=1131 audit(1712947403.331:942): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.33:22-10.0.0.1:52020 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:26.392000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.392000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117ee80 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.404285 kernel: audit: type=1400 audit(1712947406.392:943): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.404362 kernel: audit: type=1300 audit(1712947406.392:943): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117ee80 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.404386 kernel: audit: type=1327 audit(1712947406.392:943): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.392000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.393000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.413578 kernel: audit: type=1400 audit(1712947406.393:944): avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.413633 kernel: audit: type=1300 audit(1712947406.393:944): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117eec0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.393000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117eec0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.394000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.394000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00117f080 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:26.394000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:43:26.394000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00104a4c0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:43:26.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:43:27.321403 kubelet[2062]: I0412 18:43:27.321368 2062 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:43:27.321931 env[1168]: time="2024-04-12T18:43:27.321885034Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:43:27.322279 kubelet[2062]: I0412 18:43:27.322229 2062 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:43:28.181489 kubelet[2062]: I0412 18:43:28.181439 2062 topology_manager.go:215] "Topology Admit Handler" podUID="f42e6fc4-c7d9-41f3-95c9-46eb61699da3" podNamespace="kube-system" podName="kube-proxy-v4hn5" Apr 12 18:43:28.187231 systemd[1]: Created slice kubepods-besteffort-podf42e6fc4_c7d9_41f3_95c9_46eb61699da3.slice. Apr 12 18:43:28.238732 kubelet[2062]: I0412 18:43:28.238651 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f42e6fc4-c7d9-41f3-95c9-46eb61699da3-xtables-lock\") pod \"kube-proxy-v4hn5\" (UID: \"f42e6fc4-c7d9-41f3-95c9-46eb61699da3\") " pod="kube-system/kube-proxy-v4hn5" Apr 12 18:43:28.238732 kubelet[2062]: I0412 18:43:28.238722 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/f42e6fc4-c7d9-41f3-95c9-46eb61699da3-kube-proxy\") pod \"kube-proxy-v4hn5\" (UID: \"f42e6fc4-c7d9-41f3-95c9-46eb61699da3\") " pod="kube-system/kube-proxy-v4hn5" Apr 12 18:43:28.239083 kubelet[2062]: I0412 18:43:28.238764 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f42e6fc4-c7d9-41f3-95c9-46eb61699da3-lib-modules\") pod \"kube-proxy-v4hn5\" (UID: \"f42e6fc4-c7d9-41f3-95c9-46eb61699da3\") " pod="kube-system/kube-proxy-v4hn5" Apr 12 18:43:28.239083 kubelet[2062]: I0412 18:43:28.238795 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-d7zw9\" (UniqueName: \"kubernetes.io/projected/f42e6fc4-c7d9-41f3-95c9-46eb61699da3-kube-api-access-d7zw9\") pod \"kube-proxy-v4hn5\" (UID: \"f42e6fc4-c7d9-41f3-95c9-46eb61699da3\") " pod="kube-system/kube-proxy-v4hn5" Apr 12 18:43:28.300976 kubelet[2062]: I0412 18:43:28.300932 2062 topology_manager.go:215] "Topology Admit Handler" podUID="19562457-8b7b-486a-a59e-e8e95435ae4b" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-txhqk" Apr 12 18:43:28.307665 systemd[1]: Created slice kubepods-besteffort-pod19562457_8b7b_486a_a59e_e8e95435ae4b.slice. Apr 12 18:43:28.339764 kubelet[2062]: I0412 18:43:28.339713 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/19562457-8b7b-486a-a59e-e8e95435ae4b-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-txhqk\" (UID: \"19562457-8b7b-486a-a59e-e8e95435ae4b\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-txhqk" Apr 12 18:43:28.339764 kubelet[2062]: I0412 18:43:28.339778 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j5dff\" (UniqueName: \"kubernetes.io/projected/19562457-8b7b-486a-a59e-e8e95435ae4b-kube-api-access-j5dff\") pod \"tigera-operator-6bfc79cb9c-txhqk\" (UID: \"19562457-8b7b-486a-a59e-e8e95435ae4b\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-txhqk" Apr 12 18:43:28.495157 kubelet[2062]: E0412 18:43:28.495018 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:28.496093 env[1168]: time="2024-04-12T18:43:28.496056509Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v4hn5,Uid:f42e6fc4-c7d9-41f3-95c9-46eb61699da3,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:28.566079 env[1168]: time="2024-04-12T18:43:28.565986433Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:28.566079 env[1168]: time="2024-04-12T18:43:28.566038671Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:28.566079 env[1168]: time="2024-04-12T18:43:28.566049312Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:28.566594 env[1168]: time="2024-04-12T18:43:28.566544674Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9 pid=2160 runtime=io.containerd.runc.v2 Apr 12 18:43:28.581890 systemd[1]: Started cri-containerd-b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9.scope. Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.595104 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:43:28.595163 kernel: audit: type=1400 audit(1712947408.592:947): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.601422 kernel: audit: type=1400 audit(1712947408.592:948): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.601562 kernel: audit: type=1400 audit(1712947408.592:949): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.607570 kernel: audit: type=1400 audit(1712947408.592:950): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.607617 kernel: audit: type=1400 audit(1712947408.592:951): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.613451 kernel: audit: type=1400 audit(1712947408.592:952): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.613497 kernel: audit: type=1400 audit(1712947408.592:953): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.613917 env[1168]: time="2024-04-12T18:43:28.613860526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-txhqk,Uid:19562457-8b7b-486a-a59e-e8e95435ae4b,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.619403 kernel: audit: type=1400 audit(1712947408.592:954): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.619449 kernel: audit: type=1400 audit(1712947408.592:955): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit: BPF prog-id=106 op=LOAD Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2160 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.625335 kernel: audit: type=1400 audit(1712947408.600:956): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663239633837373134343830376632313336303865373363396235 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2160 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663239633837373134343830376632313336303865373363396235 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.600000 audit: BPF prog-id=107 op=LOAD Apr 12 18:43:28.600000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0002e6cc0 items=0 ppid=2160 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.600000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663239633837373134343830376632313336303865373363396235 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.606000 audit: BPF prog-id=108 op=LOAD Apr 12 18:43:28.606000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0002e6d08 items=0 ppid=2160 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.606000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663239633837373134343830376632313336303865373363396235 Apr 12 18:43:28.612000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:43:28.612000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { perfmon } for pid=2171 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit[2171]: AVC avc: denied { bpf } for pid=2171 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.612000 audit: BPF prog-id=109 op=LOAD Apr 12 18:43:28.612000 audit[2171]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0002e7118 items=0 ppid=2160 pid=2171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239663239633837373134343830376632313336303865373363396235 Apr 12 18:43:28.635931 env[1168]: time="2024-04-12T18:43:28.635868156Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-v4hn5,Uid:f42e6fc4-c7d9-41f3-95c9-46eb61699da3,Namespace:kube-system,Attempt:0,} returns sandbox id \"b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9\"" Apr 12 18:43:28.636783 kubelet[2062]: E0412 18:43:28.636755 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:28.638813 env[1168]: time="2024-04-12T18:43:28.638765329Z" level=info msg="CreateContainer within sandbox \"b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:43:28.847236 env[1168]: time="2024-04-12T18:43:28.847038075Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:28.847236 env[1168]: time="2024-04-12T18:43:28.847136561Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:28.847236 env[1168]: time="2024-04-12T18:43:28.847164914Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:28.847933 kubelet[2062]: E0412 18:43:28.847878 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:28.848599 env[1168]: time="2024-04-12T18:43:28.848440425Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6fa782c434215c64dcedfd0bbce3495410902d992b68c615dc85db97574b7a9f pid=2202 runtime=io.containerd.runc.v2 Apr 12 18:43:28.860620 systemd[1]: Started cri-containerd-6fa782c434215c64dcedfd0bbce3495410902d992b68c615dc85db97574b7a9f.scope. Apr 12 18:43:28.865013 env[1168]: time="2024-04-12T18:43:28.864952689Z" level=info msg="CreateContainer within sandbox \"b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8f6e59050fe59518f0e8421429feb397b96479f4b415c37cb2c63701f3a1427d\"" Apr 12 18:43:28.866143 env[1168]: time="2024-04-12T18:43:28.866122922Z" level=info msg="StartContainer for \"8f6e59050fe59518f0e8421429feb397b96479f4b415c37cb2c63701f3a1427d\"" Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.877000 audit: BPF prog-id=110 op=LOAD Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613738326334333432313563363464636564666430626263653334 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613738326334333432313563363464636564666430626263653334 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit: BPF prog-id=111 op=LOAD Apr 12 18:43:28.878000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002e5d90 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613738326334333432313563363464636564666430626263653334 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit: BPF prog-id=112 op=LOAD Apr 12 18:43:28.878000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002e5dd8 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613738326334333432313563363464636564666430626263653334 Apr 12 18:43:28.878000 audit: BPF prog-id=112 op=UNLOAD Apr 12 18:43:28.878000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { perfmon } for pid=2211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit[2211]: AVC avc: denied { bpf } for pid=2211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.878000 audit: BPF prog-id=113 op=LOAD Apr 12 18:43:28.878000 audit[2211]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003dc1e8 items=0 ppid=2202 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666613738326334333432313563363464636564666430626263653334 Apr 12 18:43:28.884564 systemd[1]: Started cri-containerd-8f6e59050fe59518f0e8421429feb397b96479f4b415c37cb2c63701f3a1427d.scope. Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f8bf548a458 items=0 ppid=2160 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366535393035306665353935313866306538343231343239666562 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit: BPF prog-id=114 op=LOAD Apr 12 18:43:28.904000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000328d68 items=0 ppid=2160 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366535393035306665353935313866306538343231343239666562 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit: BPF prog-id=115 op=LOAD Apr 12 18:43:28.904000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000328db8 items=0 ppid=2160 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366535393035306665353935313866306538343231343239666562 Apr 12 18:43:28.904000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:43:28.904000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:28.904000 audit: BPF prog-id=116 op=LOAD Apr 12 18:43:28.904000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000328e48 items=0 ppid=2160 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.904000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3866366535393035306665353935313866306538343231343239666562 Apr 12 18:43:28.908173 env[1168]: time="2024-04-12T18:43:28.907050870Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-txhqk,Uid:19562457-8b7b-486a-a59e-e8e95435ae4b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"6fa782c434215c64dcedfd0bbce3495410902d992b68c615dc85db97574b7a9f\"" Apr 12 18:43:28.909057 env[1168]: time="2024-04-12T18:43:28.909001802Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:43:28.955828 env[1168]: time="2024-04-12T18:43:28.955600725Z" level=info msg="StartContainer for \"8f6e59050fe59518f0e8421429feb397b96479f4b415c37cb2c63701f3a1427d\" returns successfully" Apr 12 18:43:28.982000 audit[2296]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2296 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:28.982000 audit[2296]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd5f1f7f50 a2=0 a3=7ffd5f1f7f3c items=0 ppid=2249 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:28.982000 audit[2297]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:28.982000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe1c66c170 a2=0 a3=7ffe1c66c15c items=0 ppid=2249 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.982000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:43:28.983000 audit[2298]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2298 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:28.983000 audit[2298]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe567005b0 a2=0 a3=7ffe5670059c items=0 ppid=2249 pid=2298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:28.983000 audit[2299]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:28.983000 audit[2299]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc6220e90 a2=0 a3=7ffdc6220e7c items=0 ppid=2249 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:43:28.985000 audit[2300]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:28.985000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffed8b1cc50 a2=0 a3=7ffed8b1cc3c items=0 ppid=2249 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.985000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:28.987000 audit[2301]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:28.987000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef73ff1c0 a2=0 a3=7ffef73ff1ac items=0 ppid=2249 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:28.987000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:43:29.085000 audit[2302]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.085000 audit[2302]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffd0be0c6d0 a2=0 a3=7ffd0be0c6bc items=0 ppid=2249 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.085000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:29.087000 audit[2304]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.087000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb766d940 a2=0 a3=7ffeb766d92c items=0 ppid=2249 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.087000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:43:29.091000 audit[2307]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.091000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffeb2179d50 a2=0 a3=7ffeb2179d3c items=0 ppid=2249 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.091000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:43:29.092000 audit[2308]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.092000 audit[2308]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe2abfbe50 a2=0 a3=7ffe2abfbe3c items=0 ppid=2249 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.092000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:29.094000 audit[2310]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.094000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcda5dfc90 a2=0 a3=7ffcda5dfc7c items=0 ppid=2249 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.094000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:29.095000 audit[2311]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.095000 audit[2311]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd50982f40 a2=0 a3=7ffd50982f2c items=0 ppid=2249 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.095000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:29.098000 audit[2313]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.098000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe99dca020 a2=0 a3=7ffe99dca00c items=0 ppid=2249 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.098000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:29.102000 audit[2316]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.102000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc11a05c20 a2=0 a3=7ffc11a05c0c items=0 ppid=2249 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.102000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:43:29.103000 audit[2317]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.103000 audit[2317]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd333ffd70 a2=0 a3=7ffd333ffd5c items=0 ppid=2249 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.103000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:29.105000 audit[2319]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.105000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffef0124f40 a2=0 a3=7ffef0124f2c items=0 ppid=2249 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.105000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:29.106000 audit[2320]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.106000 audit[2320]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe728a0140 a2=0 a3=7ffe728a012c items=0 ppid=2249 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.106000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:29.109000 audit[2322]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.109000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc09f8b3a0 a2=0 a3=7ffc09f8b38c items=0 ppid=2249 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.109000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:29.112000 audit[2325]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.112000 audit[2325]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffca96e1490 a2=0 a3=7ffca96e147c items=0 ppid=2249 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.112000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:29.116000 audit[2328]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.116000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdccf928d0 a2=0 a3=7ffdccf928bc items=0 ppid=2249 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.116000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:29.117000 audit[2329]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.117000 audit[2329]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffb8558ae0 a2=0 a3=7fffb8558acc items=0 ppid=2249 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.117000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:29.119000 audit[2331]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.119000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7fffde1e6750 a2=0 a3=7fffde1e673c items=0 ppid=2249 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.119000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:29.123000 audit[2334]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.123000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffffb0ed0c0 a2=0 a3=7ffffb0ed0ac items=0 ppid=2249 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.123000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:29.124000 audit[2335]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2335 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.124000 audit[2335]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff275840b0 a2=0 a3=7fff2758409c items=0 ppid=2249 pid=2335 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.124000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:29.126000 audit[2337]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:43:29.126000 audit[2337]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe240afb70 a2=0 a3=7ffe240afb5c items=0 ppid=2249 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.126000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:29.144000 audit[2343]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:29.144000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd64f619b0 a2=0 a3=7ffd64f6199c items=0 ppid=2249 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.144000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:29.152000 audit[2343]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:29.152000 audit[2343]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffd64f619b0 a2=0 a3=7ffd64f6199c items=0 ppid=2249 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.152000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:29.154000 audit[2349]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2349 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.154000 audit[2349]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffc3241bcc0 a2=0 a3=7ffc3241bcac items=0 ppid=2249 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.154000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:43:29.156000 audit[2351]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2351 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.156000 audit[2351]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe97a699e0 a2=0 a3=7ffe97a699cc items=0 ppid=2249 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.156000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:43:29.159000 audit[2354]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2354 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.159000 audit[2354]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe31f4d1e0 a2=0 a3=7ffe31f4d1cc items=0 ppid=2249 pid=2354 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.159000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:43:29.160000 audit[2355]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2355 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.160000 audit[2355]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5f380410 a2=0 a3=7ffe5f3803fc items=0 ppid=2249 pid=2355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.160000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:43:29.162000 audit[2357]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2357 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.162000 audit[2357]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe3de86cf0 a2=0 a3=7ffe3de86cdc items=0 ppid=2249 pid=2357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.162000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:43:29.163000 audit[2358]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.163000 audit[2358]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc5a38b7c0 a2=0 a3=7ffc5a38b7ac items=0 ppid=2249 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.163000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:43:29.165000 audit[2360]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2360 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.165000 audit[2360]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffcbcf37d00 a2=0 a3=7ffcbcf37cec items=0 ppid=2249 pid=2360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.165000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:43:29.168000 audit[2363]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2363 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.168000 audit[2363]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffec761c000 a2=0 a3=7ffec761bfec items=0 ppid=2249 pid=2363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.168000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:43:29.169000 audit[2364]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.169000 audit[2364]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffea5f40990 a2=0 a3=7ffea5f4097c items=0 ppid=2249 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:43:29.171000 audit[2366]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2366 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.171000 audit[2366]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfa624ea0 a2=0 a3=7ffdfa624e8c items=0 ppid=2249 pid=2366 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.171000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:43:29.172000 audit[2367]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.172000 audit[2367]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc71e30d80 a2=0 a3=7ffc71e30d6c items=0 ppid=2249 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:43:29.175000 audit[2369]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2369 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.175000 audit[2369]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffce11d56b0 a2=0 a3=7ffce11d569c items=0 ppid=2249 pid=2369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.175000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:43:29.178000 audit[2372]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2372 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.178000 audit[2372]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc1b275500 a2=0 a3=7ffc1b2754ec items=0 ppid=2249 pid=2372 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.178000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:43:29.181000 audit[2375]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2375 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.181000 audit[2375]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe94536f10 a2=0 a3=7ffe94536efc items=0 ppid=2249 pid=2375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.181000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:43:29.182000 audit[2376]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.182000 audit[2376]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffe1013a620 a2=0 a3=7ffe1013a60c items=0 ppid=2249 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.182000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:43:29.184000 audit[2378]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2378 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.184000 audit[2378]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fffaa2d4c50 a2=0 a3=7fffaa2d4c3c items=0 ppid=2249 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.184000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:29.187000 audit[2381]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2381 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.187000 audit[2381]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc3cc5f6c0 a2=0 a3=7ffc3cc5f6ac items=0 ppid=2249 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.187000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:43:29.188000 audit[2382]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.188000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6c9e9350 a2=0 a3=7fff6c9e933c items=0 ppid=2249 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.188000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:43:29.190000 audit[2384]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2384 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.190000 audit[2384]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcaa4ad7e0 a2=0 a3=7ffcaa4ad7cc items=0 ppid=2249 pid=2384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.190000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:43:29.191000 audit[2385]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.191000 audit[2385]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc86a09a30 a2=0 a3=7ffc86a09a1c items=0 ppid=2249 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.191000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:43:29.193000 audit[2387]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.193000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd5289cfa0 a2=0 a3=7ffd5289cf8c items=0 ppid=2249 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.193000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:29.195000 audit[2390]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2390 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:43:29.195000 audit[2390]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcbfa0b1f0 a2=0 a3=7ffcbfa0b1dc items=0 ppid=2249 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.195000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:43:29.198000 audit[2392]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:29.198000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffd3a3e8be0 a2=0 a3=7ffd3a3e8bcc items=0 ppid=2249 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.198000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:29.198000 audit[2392]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:43:29.198000 audit[2392]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffd3a3e8be0 a2=0 a3=7ffd3a3e8bcc items=0 ppid=2249 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:29.198000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:29.367875 systemd[1]: run-containerd-runc-k8s.io-b9f29c877144807f213608e73c9b582ef2ae26a942d3dc63b597b953cc00acf9-runc.yivWMU.mount: Deactivated successfully. Apr 12 18:43:29.508964 kubelet[2062]: E0412 18:43:29.508917 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:34.997377 env[1168]: time="2024-04-12T18:43:34.997318868Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:35.009336 env[1168]: time="2024-04-12T18:43:35.009280127Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:35.016934 env[1168]: time="2024-04-12T18:43:35.016866340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:35.030600 env[1168]: time="2024-04-12T18:43:35.030532703Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:35.031208 env[1168]: time="2024-04-12T18:43:35.031167917Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:43:35.033021 env[1168]: time="2024-04-12T18:43:35.032982479Z" level=info msg="CreateContainer within sandbox \"6fa782c434215c64dcedfd0bbce3495410902d992b68c615dc85db97574b7a9f\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:43:35.237232 env[1168]: time="2024-04-12T18:43:35.237150953Z" level=info msg="CreateContainer within sandbox \"6fa782c434215c64dcedfd0bbce3495410902d992b68c615dc85db97574b7a9f\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"e0c73754863c8f356782a3b7b95b729c9ce943ff730eb95ae3ec89a159f7cb4f\"" Apr 12 18:43:35.237666 env[1168]: time="2024-04-12T18:43:35.237632388Z" level=info msg="StartContainer for \"e0c73754863c8f356782a3b7b95b729c9ce943ff730eb95ae3ec89a159f7cb4f\"" Apr 12 18:43:35.254491 systemd[1]: Started cri-containerd-e0c73754863c8f356782a3b7b95b729c9ce943ff730eb95ae3ec89a159f7cb4f.scope. Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.271275 kernel: kauditd_printk_skb: 300 callbacks suppressed Apr 12 18:43:35.271372 kernel: audit: type=1400 audit(1712947415.262:1040): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.271405 kernel: audit: type=1400 audit(1712947415.262:1041): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.271525 kernel: audit: type=1400 audit(1712947415.262:1042): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.277469 kernel: audit: type=1400 audit(1712947415.262:1043): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.277538 kernel: audit: type=1400 audit(1712947415.262:1044): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.284062 kernel: audit: type=1400 audit(1712947415.262:1045): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.284327 kernel: audit: type=1400 audit(1712947415.262:1046): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.289895 kernel: audit: type=1400 audit(1712947415.262:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.289961 kernel: audit: type=1400 audit(1712947415.262:1048): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.295708 kernel: audit: type=1400 audit(1712947415.266:1049): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit: BPF prog-id=117 op=LOAD Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2202 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633733373534383633633866333536373832613362376239356237 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=2202 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633733373534383633633866333536373832613362376239356237 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.266000 audit: BPF prog-id=118 op=LOAD Apr 12 18:43:35.266000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0003101d0 items=0 ppid=2202 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.266000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633733373534383633633866333536373832613362376239356237 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.270000 audit: BPF prog-id=119 op=LOAD Apr 12 18:43:35.270000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000310218 items=0 ppid=2202 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633733373534383633633866333536373832613362376239356237 Apr 12 18:43:35.273000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:43:35.273000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { perfmon } for pid=2400 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit[2400]: AVC avc: denied { bpf } for pid=2400 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:35.273000 audit: BPF prog-id=120 op=LOAD Apr 12 18:43:35.273000 audit[2400]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000310628 items=0 ppid=2202 pid=2400 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:35.273000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6530633733373534383633633866333536373832613362376239356237 Apr 12 18:43:35.448976 env[1168]: time="2024-04-12T18:43:35.448911331Z" level=info msg="StartContainer for \"e0c73754863c8f356782a3b7b95b729c9ce943ff730eb95ae3ec89a159f7cb4f\" returns successfully" Apr 12 18:43:35.524471 kubelet[2062]: I0412 18:43:35.524044 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-v4hn5" podStartSLOduration=7.524001593 podCreationTimestamp="2024-04-12 18:43:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:43:29.579660969 +0000 UTC m=+12.180775449" watchObservedRunningTime="2024-04-12 18:43:35.524001593 +0000 UTC m=+18.125116073" Apr 12 18:43:35.524471 kubelet[2062]: I0412 18:43:35.524194 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-txhqk" podStartSLOduration=1.400742421 podCreationTimestamp="2024-04-12 18:43:28 +0000 UTC" firstStartedPulling="2024-04-12 18:43:28.908144478 +0000 UTC m=+11.509258958" lastFinishedPulling="2024-04-12 18:43:35.031576516 +0000 UTC m=+17.632690996" observedRunningTime="2024-04-12 18:43:35.523948574 +0000 UTC m=+18.125063054" watchObservedRunningTime="2024-04-12 18:43:35.524174459 +0000 UTC m=+18.125288939" Apr 12 18:43:37.880000 audit[2435]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:37.880000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdf4a70910 a2=0 a3=7ffdf4a708fc items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:37.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:37.880000 audit[2435]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2435 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:37.880000 audit[2435]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf4a70910 a2=0 a3=0 items=0 ppid=2249 pid=2435 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:37.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:37.888000 audit[2437]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:37.888000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe2ed7fd50 a2=0 a3=7ffe2ed7fd3c items=0 ppid=2249 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:37.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:37.888000 audit[2437]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2437 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:37.888000 audit[2437]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffe2ed7fd50 a2=0 a3=0 items=0 ppid=2249 pid=2437 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:37.888000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:38.329126 kubelet[2062]: I0412 18:43:38.329076 2062 topology_manager.go:215] "Topology Admit Handler" podUID="7661e879-5b49-473f-bfbc-d83c03e7ab74" podNamespace="calico-system" podName="calico-typha-678f55664b-zbvgb" Apr 12 18:43:38.334562 systemd[1]: Created slice kubepods-besteffort-pod7661e879_5b49_473f_bfbc_d83c03e7ab74.slice. Apr 12 18:43:38.405408 kubelet[2062]: I0412 18:43:38.405343 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7661e879-5b49-473f-bfbc-d83c03e7ab74-tigera-ca-bundle\") pod \"calico-typha-678f55664b-zbvgb\" (UID: \"7661e879-5b49-473f-bfbc-d83c03e7ab74\") " pod="calico-system/calico-typha-678f55664b-zbvgb" Apr 12 18:43:38.405408 kubelet[2062]: I0412 18:43:38.405405 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7661e879-5b49-473f-bfbc-d83c03e7ab74-typha-certs\") pod \"calico-typha-678f55664b-zbvgb\" (UID: \"7661e879-5b49-473f-bfbc-d83c03e7ab74\") " pod="calico-system/calico-typha-678f55664b-zbvgb" Apr 12 18:43:38.405633 kubelet[2062]: I0412 18:43:38.405437 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-z6htb\" (UniqueName: \"kubernetes.io/projected/7661e879-5b49-473f-bfbc-d83c03e7ab74-kube-api-access-z6htb\") pod \"calico-typha-678f55664b-zbvgb\" (UID: \"7661e879-5b49-473f-bfbc-d83c03e7ab74\") " pod="calico-system/calico-typha-678f55664b-zbvgb" Apr 12 18:43:38.837090 kubelet[2062]: I0412 18:43:38.837049 2062 topology_manager.go:215] "Topology Admit Handler" podUID="312162e2-37c5-41d9-9996-12f00ad281cf" podNamespace="calico-system" podName="calico-node-lz4gl" Apr 12 18:43:38.847205 systemd[1]: Created slice kubepods-besteffort-pod312162e2_37c5_41d9_9996_12f00ad281cf.slice. Apr 12 18:43:38.897000 audit[2441]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:38.897000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc5ce104a0 a2=0 a3=7ffc5ce1048c items=0 ppid=2249 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:38.898000 audit[2441]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:38.898000 audit[2441]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc5ce104a0 a2=0 a3=0 items=0 ppid=2249 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:38.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:38.910142 kubelet[2062]: I0412 18:43:38.910110 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-flexvol-driver-host\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910226 kubelet[2062]: I0412 18:43:38.910155 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-lib-modules\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910226 kubelet[2062]: I0412 18:43:38.910176 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/312162e2-37c5-41d9-9996-12f00ad281cf-node-certs\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910370 kubelet[2062]: I0412 18:43:38.910337 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-cni-bin-dir\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910436 kubelet[2062]: I0412 18:43:38.910400 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-znlvh\" (UniqueName: \"kubernetes.io/projected/312162e2-37c5-41d9-9996-12f00ad281cf-kube-api-access-znlvh\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910467 kubelet[2062]: I0412 18:43:38.910452 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-policysync\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910491 kubelet[2062]: I0412 18:43:38.910484 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/312162e2-37c5-41d9-9996-12f00ad281cf-tigera-ca-bundle\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910518 kubelet[2062]: I0412 18:43:38.910503 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-cni-net-dir\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910544 kubelet[2062]: I0412 18:43:38.910521 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-xtables-lock\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910605 kubelet[2062]: I0412 18:43:38.910589 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-var-run-calico\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910653 kubelet[2062]: I0412 18:43:38.910615 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-var-lib-calico\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.910701 kubelet[2062]: I0412 18:43:38.910673 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/312162e2-37c5-41d9-9996-12f00ad281cf-cni-log-dir\") pod \"calico-node-lz4gl\" (UID: \"312162e2-37c5-41d9-9996-12f00ad281cf\") " pod="calico-system/calico-node-lz4gl" Apr 12 18:43:38.938391 kubelet[2062]: E0412 18:43:38.938359 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:38.939410 env[1168]: time="2024-04-12T18:43:38.939043688Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678f55664b-zbvgb,Uid:7661e879-5b49-473f-bfbc-d83c03e7ab74,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:39.017780 kubelet[2062]: I0412 18:43:39.017730 2062 topology_manager.go:215] "Topology Admit Handler" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" podNamespace="calico-system" podName="csi-node-driver-hkzhm" Apr 12 18:43:39.018050 kubelet[2062]: E0412 18:43:39.018009 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:39.018628 kubelet[2062]: E0412 18:43:39.018604 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.018628 kubelet[2062]: W0412 18:43:39.018622 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.018739 kubelet[2062]: E0412 18:43:39.018658 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.032814 kubelet[2062]: E0412 18:43:39.032786 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.032814 kubelet[2062]: W0412 18:43:39.032804 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.032978 kubelet[2062]: E0412 18:43:39.032835 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.062342 env[1168]: time="2024-04-12T18:43:39.061941914Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:39.062342 env[1168]: time="2024-04-12T18:43:39.061976399Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:39.062342 env[1168]: time="2024-04-12T18:43:39.061989724Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:39.062342 env[1168]: time="2024-04-12T18:43:39.062097326Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9adbea3233819d9898ff90e82798823c665e89016b3ef2cf53b0923c92a18078 pid=2453 runtime=io.containerd.runc.v2 Apr 12 18:43:39.075934 systemd[1]: Started cri-containerd-9adbea3233819d9898ff90e82798823c665e89016b3ef2cf53b0923c92a18078.scope. Apr 12 18:43:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.089000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit: BPF prog-id=121 op=LOAD Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646265613332333338313964393839386666393065383237393838 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646265613332333338313964393839386666393065383237393838 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.090000 audit: BPF prog-id=122 op=LOAD Apr 12 18:43:39.090000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003749d0 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.090000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646265613332333338313964393839386666393065383237393838 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit: BPF prog-id=123 op=LOAD Apr 12 18:43:39.091000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000374a18 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646265613332333338313964393839386666393065383237393838 Apr 12 18:43:39.091000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:43:39.091000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { perfmon } for pid=2461 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit[2461]: AVC avc: denied { bpf } for pid=2461 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.091000 audit: BPF prog-id=124 op=LOAD Apr 12 18:43:39.091000 audit[2461]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000374e28 items=0 ppid=2453 pid=2461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.091000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961646265613332333338313964393839386666393065383237393838 Apr 12 18:43:39.097561 kubelet[2062]: E0412 18:43:39.097534 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.097561 kubelet[2062]: W0412 18:43:39.097553 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.097662 kubelet[2062]: E0412 18:43:39.097575 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.097782 kubelet[2062]: E0412 18:43:39.097766 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.097852 kubelet[2062]: W0412 18:43:39.097783 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.097852 kubelet[2062]: E0412 18:43:39.097802 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.098023 kubelet[2062]: E0412 18:43:39.098008 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.098023 kubelet[2062]: W0412 18:43:39.098023 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.098109 kubelet[2062]: E0412 18:43:39.098037 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.098235 kubelet[2062]: E0412 18:43:39.098220 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.098235 kubelet[2062]: W0412 18:43:39.098235 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.098358 kubelet[2062]: E0412 18:43:39.098309 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.098536 kubelet[2062]: E0412 18:43:39.098522 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.098536 kubelet[2062]: W0412 18:43:39.098535 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.098536 kubelet[2062]: E0412 18:43:39.098549 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.098741 kubelet[2062]: E0412 18:43:39.098727 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.098741 kubelet[2062]: W0412 18:43:39.098740 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.098827 kubelet[2062]: E0412 18:43:39.098753 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.098982 kubelet[2062]: E0412 18:43:39.098967 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.098982 kubelet[2062]: W0412 18:43:39.098983 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.099069 kubelet[2062]: E0412 18:43:39.098997 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.099313 kubelet[2062]: E0412 18:43:39.099296 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.099313 kubelet[2062]: W0412 18:43:39.099310 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.099409 kubelet[2062]: E0412 18:43:39.099325 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.100223 kubelet[2062]: E0412 18:43:39.100208 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.100223 kubelet[2062]: W0412 18:43:39.100222 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.100325 kubelet[2062]: E0412 18:43:39.100236 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.100504 kubelet[2062]: E0412 18:43:39.100490 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.100504 kubelet[2062]: W0412 18:43:39.100504 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.100576 kubelet[2062]: E0412 18:43:39.100519 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.100803 kubelet[2062]: E0412 18:43:39.100709 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.100803 kubelet[2062]: W0412 18:43:39.100719 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.100803 kubelet[2062]: E0412 18:43:39.100731 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.101011 kubelet[2062]: E0412 18:43:39.100983 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.101011 kubelet[2062]: W0412 18:43:39.101008 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.101099 kubelet[2062]: E0412 18:43:39.101040 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.101312 kubelet[2062]: E0412 18:43:39.101295 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.101312 kubelet[2062]: W0412 18:43:39.101306 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.101312 kubelet[2062]: E0412 18:43:39.101316 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.101510 kubelet[2062]: E0412 18:43:39.101491 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.101510 kubelet[2062]: W0412 18:43:39.101502 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.101510 kubelet[2062]: E0412 18:43:39.101517 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.101717 kubelet[2062]: E0412 18:43:39.101702 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.101717 kubelet[2062]: W0412 18:43:39.101712 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.101942 kubelet[2062]: E0412 18:43:39.101721 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.101942 kubelet[2062]: E0412 18:43:39.101917 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.101942 kubelet[2062]: W0412 18:43:39.101925 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.101942 kubelet[2062]: E0412 18:43:39.101936 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.102142 kubelet[2062]: E0412 18:43:39.102123 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.102142 kubelet[2062]: W0412 18:43:39.102133 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.102142 kubelet[2062]: E0412 18:43:39.102142 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.102420 kubelet[2062]: E0412 18:43:39.102403 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.102467 kubelet[2062]: W0412 18:43:39.102424 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.102467 kubelet[2062]: E0412 18:43:39.102435 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.102650 kubelet[2062]: E0412 18:43:39.102625 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.102650 kubelet[2062]: W0412 18:43:39.102646 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.102725 kubelet[2062]: E0412 18:43:39.102661 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.102889 kubelet[2062]: E0412 18:43:39.102872 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.102889 kubelet[2062]: W0412 18:43:39.102883 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.102889 kubelet[2062]: E0412 18:43:39.102893 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.116661 kubelet[2062]: E0412 18:43:39.116495 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.116661 kubelet[2062]: W0412 18:43:39.116512 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.116661 kubelet[2062]: E0412 18:43:39.116533 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.116661 kubelet[2062]: I0412 18:43:39.116560 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/48a0ac37-b3e0-4094-b5d5-7ce7f37d562c-varrun\") pod \"csi-node-driver-hkzhm\" (UID: \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\") " pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:39.117066 kubelet[2062]: E0412 18:43:39.116948 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.117066 kubelet[2062]: W0412 18:43:39.116959 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.117066 kubelet[2062]: E0412 18:43:39.116970 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.117066 kubelet[2062]: I0412 18:43:39.116986 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8xd6v\" (UniqueName: \"kubernetes.io/projected/48a0ac37-b3e0-4094-b5d5-7ce7f37d562c-kube-api-access-8xd6v\") pod \"csi-node-driver-hkzhm\" (UID: \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\") " pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:39.117405 kubelet[2062]: E0412 18:43:39.117245 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.117405 kubelet[2062]: W0412 18:43:39.117301 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.117405 kubelet[2062]: E0412 18:43:39.117313 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.117405 kubelet[2062]: I0412 18:43:39.117329 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/48a0ac37-b3e0-4094-b5d5-7ce7f37d562c-registration-dir\") pod \"csi-node-driver-hkzhm\" (UID: \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\") " pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:39.117705 kubelet[2062]: E0412 18:43:39.117586 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.117705 kubelet[2062]: W0412 18:43:39.117598 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.117705 kubelet[2062]: E0412 18:43:39.117609 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.117705 kubelet[2062]: I0412 18:43:39.117625 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/48a0ac37-b3e0-4094-b5d5-7ce7f37d562c-socket-dir\") pod \"csi-node-driver-hkzhm\" (UID: \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\") " pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:39.118035 kubelet[2062]: E0412 18:43:39.117891 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118035 kubelet[2062]: W0412 18:43:39.117901 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.118035 kubelet[2062]: E0412 18:43:39.117911 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.118035 kubelet[2062]: I0412 18:43:39.117929 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/48a0ac37-b3e0-4094-b5d5-7ce7f37d562c-kubelet-dir\") pod \"csi-node-driver-hkzhm\" (UID: \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\") " pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:39.118302 kubelet[2062]: E0412 18:43:39.118182 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118302 kubelet[2062]: W0412 18:43:39.118192 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.118302 kubelet[2062]: E0412 18:43:39.118282 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.118397 kubelet[2062]: E0412 18:43:39.118385 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118426 kubelet[2062]: W0412 18:43:39.118395 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.118563 kubelet[2062]: E0412 18:43:39.118501 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.118608 kubelet[2062]: E0412 18:43:39.118595 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118608 kubelet[2062]: W0412 18:43:39.118603 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.118735 kubelet[2062]: E0412 18:43:39.118691 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.118787 kubelet[2062]: E0412 18:43:39.118763 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118787 kubelet[2062]: W0412 18:43:39.118770 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.118920 kubelet[2062]: E0412 18:43:39.118864 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.118965 kubelet[2062]: E0412 18:43:39.118948 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.118965 kubelet[2062]: W0412 18:43:39.118958 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.119009 kubelet[2062]: E0412 18:43:39.118975 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.119173 kubelet[2062]: E0412 18:43:39.119153 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.119173 kubelet[2062]: W0412 18:43:39.119167 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.119219 kubelet[2062]: E0412 18:43:39.119180 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.119699 kubelet[2062]: E0412 18:43:39.119676 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.119699 kubelet[2062]: W0412 18:43:39.119691 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.119825 kubelet[2062]: E0412 18:43:39.119705 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.119986 kubelet[2062]: E0412 18:43:39.119965 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.119986 kubelet[2062]: W0412 18:43:39.119978 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.120051 kubelet[2062]: E0412 18:43:39.119992 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.120192 kubelet[2062]: E0412 18:43:39.120177 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.120192 kubelet[2062]: W0412 18:43:39.120191 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.120322 kubelet[2062]: E0412 18:43:39.120204 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.120464 kubelet[2062]: E0412 18:43:39.120448 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.120464 kubelet[2062]: W0412 18:43:39.120462 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.120529 kubelet[2062]: E0412 18:43:39.120475 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.127003 env[1168]: time="2024-04-12T18:43:39.126950729Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-678f55664b-zbvgb,Uid:7661e879-5b49-473f-bfbc-d83c03e7ab74,Namespace:calico-system,Attempt:0,} returns sandbox id \"9adbea3233819d9898ff90e82798823c665e89016b3ef2cf53b0923c92a18078\"" Apr 12 18:43:39.127783 kubelet[2062]: E0412 18:43:39.127683 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:39.131063 env[1168]: time="2024-04-12T18:43:39.131026307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:43:39.150213 kubelet[2062]: E0412 18:43:39.150186 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:39.150658 env[1168]: time="2024-04-12T18:43:39.150628041Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lz4gl,Uid:312162e2-37c5-41d9-9996-12f00ad281cf,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:39.219004 kubelet[2062]: E0412 18:43:39.218973 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.219004 kubelet[2062]: W0412 18:43:39.218993 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.219004 kubelet[2062]: E0412 18:43:39.219012 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.219296 kubelet[2062]: E0412 18:43:39.219191 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.219296 kubelet[2062]: W0412 18:43:39.219199 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.219296 kubelet[2062]: E0412 18:43:39.219222 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.219413 kubelet[2062]: E0412 18:43:39.219402 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.219413 kubelet[2062]: W0412 18:43:39.219409 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.219488 kubelet[2062]: E0412 18:43:39.219417 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.219597 kubelet[2062]: E0412 18:43:39.219581 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.219597 kubelet[2062]: W0412 18:43:39.219589 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.219597 kubelet[2062]: E0412 18:43:39.219602 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.219860 kubelet[2062]: E0412 18:43:39.219839 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.219860 kubelet[2062]: W0412 18:43:39.219856 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.219951 kubelet[2062]: E0412 18:43:39.219886 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.220175 kubelet[2062]: E0412 18:43:39.220153 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.220175 kubelet[2062]: W0412 18:43:39.220169 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.220298 kubelet[2062]: E0412 18:43:39.220198 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.220418 kubelet[2062]: E0412 18:43:39.220396 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.220418 kubelet[2062]: W0412 18:43:39.220412 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.220523 kubelet[2062]: E0412 18:43:39.220451 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.220699 kubelet[2062]: E0412 18:43:39.220678 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.220699 kubelet[2062]: W0412 18:43:39.220693 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.220801 kubelet[2062]: E0412 18:43:39.220728 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.220894 kubelet[2062]: E0412 18:43:39.220871 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.220894 kubelet[2062]: W0412 18:43:39.220890 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.220991 kubelet[2062]: E0412 18:43:39.220929 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221067 kubelet[2062]: E0412 18:43:39.221043 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221067 kubelet[2062]: W0412 18:43:39.221062 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221193 kubelet[2062]: E0412 18:43:39.221090 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221233 kubelet[2062]: E0412 18:43:39.221210 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221233 kubelet[2062]: W0412 18:43:39.221219 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221318 kubelet[2062]: E0412 18:43:39.221243 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221402 kubelet[2062]: E0412 18:43:39.221379 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221402 kubelet[2062]: W0412 18:43:39.221398 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221504 kubelet[2062]: E0412 18:43:39.221426 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221601 kubelet[2062]: E0412 18:43:39.221584 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221601 kubelet[2062]: W0412 18:43:39.221595 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221686 kubelet[2062]: E0412 18:43:39.221608 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221739 kubelet[2062]: E0412 18:43:39.221726 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221739 kubelet[2062]: W0412 18:43:39.221735 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221829 kubelet[2062]: E0412 18:43:39.221744 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.221912 kubelet[2062]: E0412 18:43:39.221901 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.221912 kubelet[2062]: W0412 18:43:39.221910 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.221995 kubelet[2062]: E0412 18:43:39.221923 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222050 kubelet[2062]: E0412 18:43:39.222040 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222087 kubelet[2062]: W0412 18:43:39.222050 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.222087 kubelet[2062]: E0412 18:43:39.222065 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222194 kubelet[2062]: E0412 18:43:39.222181 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222194 kubelet[2062]: W0412 18:43:39.222190 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.222292 kubelet[2062]: E0412 18:43:39.222199 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222379 kubelet[2062]: E0412 18:43:39.222356 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222379 kubelet[2062]: W0412 18:43:39.222362 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.222479 kubelet[2062]: E0412 18:43:39.222417 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222539 kubelet[2062]: E0412 18:43:39.222519 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222539 kubelet[2062]: W0412 18:43:39.222530 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.222648 kubelet[2062]: E0412 18:43:39.222600 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222683 kubelet[2062]: E0412 18:43:39.222665 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222683 kubelet[2062]: W0412 18:43:39.222671 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.222753 kubelet[2062]: E0412 18:43:39.222699 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.222874 kubelet[2062]: E0412 18:43:39.222838 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.222874 kubelet[2062]: W0412 18:43:39.222858 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.223036 kubelet[2062]: E0412 18:43:39.222890 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.223036 kubelet[2062]: E0412 18:43:39.222988 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.223036 kubelet[2062]: W0412 18:43:39.222995 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.223036 kubelet[2062]: E0412 18:43:39.223007 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.223183 kubelet[2062]: E0412 18:43:39.223177 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.223183 kubelet[2062]: W0412 18:43:39.223183 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.223269 kubelet[2062]: E0412 18:43:39.223206 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.223500 kubelet[2062]: E0412 18:43:39.223480 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.223500 kubelet[2062]: W0412 18:43:39.223496 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.223619 kubelet[2062]: E0412 18:43:39.223515 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.223969 kubelet[2062]: E0412 18:43:39.223950 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.223969 kubelet[2062]: W0412 18:43:39.223963 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.224082 kubelet[2062]: E0412 18:43:39.223983 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.230620 kubelet[2062]: E0412 18:43:39.230591 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:39.230620 kubelet[2062]: W0412 18:43:39.230616 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:39.230801 kubelet[2062]: E0412 18:43:39.230640 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:39.258339 env[1168]: time="2024-04-12T18:43:39.257477416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:43:39.258339 env[1168]: time="2024-04-12T18:43:39.257516841Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:43:39.258339 env[1168]: time="2024-04-12T18:43:39.257529825Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:43:39.258339 env[1168]: time="2024-04-12T18:43:39.257663756Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216 pid=2553 runtime=io.containerd.runc.v2 Apr 12 18:43:39.282110 systemd[1]: Started cri-containerd-59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216.scope. Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.295000 audit: BPF prog-id=125 op=LOAD Apr 12 18:43:39.296000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.296000 audit[2560]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2553 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626634623765373030373635333564373435663637396166306336 Apr 12 18:43:39.296000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.296000 audit[2560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=2553 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626634623765373030373635333564373435663637396166306336 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit: BPF prog-id=126 op=LOAD Apr 12 18:43:39.297000 audit[2560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000024670 items=0 ppid=2553 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626634623765373030373635333564373435663637396166306336 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.297000 audit: BPF prog-id=127 op=LOAD Apr 12 18:43:39.297000 audit[2560]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000246b8 items=0 ppid=2553 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.297000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626634623765373030373635333564373435663637396166306336 Apr 12 18:43:39.298000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:43:39.298000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { perfmon } for pid=2560 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit[2560]: AVC avc: denied { bpf } for pid=2560 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:39.298000 audit: BPF prog-id=128 op=LOAD Apr 12 18:43:39.298000 audit[2560]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000024ac8 items=0 ppid=2553 pid=2560 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:39.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3539626634623765373030373635333564373435663637396166306336 Apr 12 18:43:39.316110 env[1168]: time="2024-04-12T18:43:39.316051830Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-lz4gl,Uid:312162e2-37c5-41d9-9996-12f00ad281cf,Namespace:calico-system,Attempt:0,} returns sandbox id \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\"" Apr 12 18:43:39.316831 kubelet[2062]: E0412 18:43:39.316797 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:40.484221 kubelet[2062]: E0412 18:43:40.484171 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:41.232940 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1323092807.mount: Deactivated successfully. Apr 12 18:43:42.483829 kubelet[2062]: E0412 18:43:42.483777 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:42.562734 env[1168]: time="2024-04-12T18:43:42.562679599Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:42.567187 env[1168]: time="2024-04-12T18:43:42.567140639Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:42.569590 env[1168]: time="2024-04-12T18:43:42.569539936Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:42.571818 env[1168]: time="2024-04-12T18:43:42.571775355Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:42.572722 env[1168]: time="2024-04-12T18:43:42.572685104Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:43:42.574718 env[1168]: time="2024-04-12T18:43:42.574687466Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:43:42.584491 env[1168]: time="2024-04-12T18:43:42.584447840Z" level=info msg="CreateContainer within sandbox \"9adbea3233819d9898ff90e82798823c665e89016b3ef2cf53b0923c92a18078\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:43:42.595511 env[1168]: time="2024-04-12T18:43:42.595463242Z" level=info msg="CreateContainer within sandbox \"9adbea3233819d9898ff90e82798823c665e89016b3ef2cf53b0923c92a18078\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"228cb2e83a1277b132ff5bf1e56be7e258c9fb066dfbd725ec5e032eb52f8472\"" Apr 12 18:43:42.595926 env[1168]: time="2024-04-12T18:43:42.595903158Z" level=info msg="StartContainer for \"228cb2e83a1277b132ff5bf1e56be7e258c9fb066dfbd725ec5e032eb52f8472\"" Apr 12 18:43:42.617509 systemd[1]: Started cri-containerd-228cb2e83a1277b132ff5bf1e56be7e258c9fb066dfbd725ec5e032eb52f8472.scope. Apr 12 18:43:42.639320 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:43:42.639493 kernel: audit: type=1400 audit(1712947422.633:1100): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.645272 kernel: audit: type=1400 audit(1712947422.633:1101): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.645352 kernel: audit: type=1400 audit(1712947422.633:1102): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.648799 kernel: audit: type=1400 audit(1712947422.633:1103): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.648850 kernel: audit: type=1400 audit(1712947422.633:1104): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.654798 kernel: audit: type=1400 audit(1712947422.633:1105): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.654854 kernel: audit: type=1400 audit(1712947422.633:1106): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.661166 kernel: audit: type=1400 audit(1712947422.633:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.661212 kernel: audit: type=1400 audit(1712947422.633:1108): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.667632 kernel: audit: type=1400 audit(1712947422.633:1109): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit: BPF prog-id=129 op=LOAD Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2453 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:42.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232386362326538336131323737623133326666356266316535366265 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2453 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:42.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232386362326538336131323737623133326666356266316535366265 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.633000 audit: BPF prog-id=130 op=LOAD Apr 12 18:43:42.633000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000250410 items=0 ppid=2453 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:42.633000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232386362326538336131323737623133326666356266316535366265 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit: BPF prog-id=131 op=LOAD Apr 12 18:43:42.638000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000250458 items=0 ppid=2453 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:42.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232386362326538336131323737623133326666356266316535366265 Apr 12 18:43:42.638000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:43:42.638000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:42.638000 audit: BPF prog-id=132 op=LOAD Apr 12 18:43:42.638000 audit[2596]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000250868 items=0 ppid=2453 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:42.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3232386362326538336131323737623133326666356266316535366265 Apr 12 18:43:42.682474 env[1168]: time="2024-04-12T18:43:42.682412824Z" level=info msg="StartContainer for \"228cb2e83a1277b132ff5bf1e56be7e258c9fb066dfbd725ec5e032eb52f8472\" returns successfully" Apr 12 18:43:43.534775 kubelet[2062]: E0412 18:43:43.534741 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:43.548223 kubelet[2062]: I0412 18:43:43.548183 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-678f55664b-zbvgb" podStartSLOduration=2.105118383 podCreationTimestamp="2024-04-12 18:43:38 +0000 UTC" firstStartedPulling="2024-04-12 18:43:39.130698892 +0000 UTC m=+21.731813372" lastFinishedPulling="2024-04-12 18:43:42.573718696 +0000 UTC m=+25.174833226" observedRunningTime="2024-04-12 18:43:43.547706056 +0000 UTC m=+26.148820546" watchObservedRunningTime="2024-04-12 18:43:43.548138237 +0000 UTC m=+26.149252717" Apr 12 18:43:43.634104 kubelet[2062]: E0412 18:43:43.634069 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.634104 kubelet[2062]: W0412 18:43:43.634090 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.634104 kubelet[2062]: E0412 18:43:43.634114 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.634406 kubelet[2062]: E0412 18:43:43.634283 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.634406 kubelet[2062]: W0412 18:43:43.634291 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.634406 kubelet[2062]: E0412 18:43:43.634302 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.634522 kubelet[2062]: E0412 18:43:43.634436 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.634522 kubelet[2062]: W0412 18:43:43.634443 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.634522 kubelet[2062]: E0412 18:43:43.634451 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.634625 kubelet[2062]: E0412 18:43:43.634594 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.634625 kubelet[2062]: W0412 18:43:43.634605 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.634625 kubelet[2062]: E0412 18:43:43.634621 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.634841 kubelet[2062]: E0412 18:43:43.634824 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.634841 kubelet[2062]: W0412 18:43:43.634840 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.634922 kubelet[2062]: E0412 18:43:43.634855 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.635074 kubelet[2062]: E0412 18:43:43.635061 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.635074 kubelet[2062]: W0412 18:43:43.635073 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.635166 kubelet[2062]: E0412 18:43:43.635088 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.635270 kubelet[2062]: E0412 18:43:43.635246 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.635270 kubelet[2062]: W0412 18:43:43.635269 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.635359 kubelet[2062]: E0412 18:43:43.635281 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.635489 kubelet[2062]: E0412 18:43:43.635474 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.635489 kubelet[2062]: W0412 18:43:43.635486 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.635575 kubelet[2062]: E0412 18:43:43.635502 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.635688 kubelet[2062]: E0412 18:43:43.635673 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.635688 kubelet[2062]: W0412 18:43:43.635684 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.635808 kubelet[2062]: E0412 18:43:43.635695 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.635874 kubelet[2062]: E0412 18:43:43.635854 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.635874 kubelet[2062]: W0412 18:43:43.635870 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636026 kubelet[2062]: E0412 18:43:43.635890 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.636072 kubelet[2062]: E0412 18:43:43.636053 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.636072 kubelet[2062]: W0412 18:43:43.636063 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636142 kubelet[2062]: E0412 18:43:43.636076 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.636246 kubelet[2062]: E0412 18:43:43.636216 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.636246 kubelet[2062]: W0412 18:43:43.636241 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636358 kubelet[2062]: E0412 18:43:43.636273 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.636445 kubelet[2062]: E0412 18:43:43.636429 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.636445 kubelet[2062]: W0412 18:43:43.636439 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636522 kubelet[2062]: E0412 18:43:43.636452 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.636641 kubelet[2062]: E0412 18:43:43.636612 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.636641 kubelet[2062]: W0412 18:43:43.636632 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636748 kubelet[2062]: E0412 18:43:43.636649 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.636822 kubelet[2062]: E0412 18:43:43.636807 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.636822 kubelet[2062]: W0412 18:43:43.636818 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.636912 kubelet[2062]: E0412 18:43:43.636831 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.650496 kubelet[2062]: E0412 18:43:43.650461 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.650496 kubelet[2062]: W0412 18:43:43.650490 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.650671 kubelet[2062]: E0412 18:43:43.650523 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.650799 kubelet[2062]: E0412 18:43:43.650780 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.650799 kubelet[2062]: W0412 18:43:43.650797 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.650906 kubelet[2062]: E0412 18:43:43.650819 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.651078 kubelet[2062]: E0412 18:43:43.651061 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.651151 kubelet[2062]: W0412 18:43:43.651086 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.651151 kubelet[2062]: E0412 18:43:43.651102 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.651306 kubelet[2062]: E0412 18:43:43.651290 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.651306 kubelet[2062]: W0412 18:43:43.651299 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.651409 kubelet[2062]: E0412 18:43:43.651312 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.651470 kubelet[2062]: E0412 18:43:43.651451 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.651470 kubelet[2062]: W0412 18:43:43.651465 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.651561 kubelet[2062]: E0412 18:43:43.651480 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.651694 kubelet[2062]: E0412 18:43:43.651675 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.651694 kubelet[2062]: W0412 18:43:43.651686 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.651809 kubelet[2062]: E0412 18:43:43.651700 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.651908 kubelet[2062]: E0412 18:43:43.651888 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.651908 kubelet[2062]: W0412 18:43:43.651905 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652006 kubelet[2062]: E0412 18:43:43.651954 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.652117 kubelet[2062]: E0412 18:43:43.652101 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.652117 kubelet[2062]: W0412 18:43:43.652116 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652208 kubelet[2062]: E0412 18:43:43.652153 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.652317 kubelet[2062]: E0412 18:43:43.652301 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.652317 kubelet[2062]: W0412 18:43:43.652312 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652591 kubelet[2062]: E0412 18:43:43.652347 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.652591 kubelet[2062]: E0412 18:43:43.652464 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.652591 kubelet[2062]: W0412 18:43:43.652489 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652591 kubelet[2062]: E0412 18:43:43.652509 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.652753 kubelet[2062]: E0412 18:43:43.652725 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.652753 kubelet[2062]: W0412 18:43:43.652734 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652753 kubelet[2062]: E0412 18:43:43.652749 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.652895 kubelet[2062]: E0412 18:43:43.652882 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.652895 kubelet[2062]: W0412 18:43:43.652891 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.652994 kubelet[2062]: E0412 18:43:43.652901 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.653098 kubelet[2062]: E0412 18:43:43.653066 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.653098 kubelet[2062]: W0412 18:43:43.653079 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.653098 kubelet[2062]: E0412 18:43:43.653100 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.653532 kubelet[2062]: E0412 18:43:43.653514 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.653532 kubelet[2062]: W0412 18:43:43.653525 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.653532 kubelet[2062]: E0412 18:43:43.653538 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.653978 kubelet[2062]: E0412 18:43:43.653697 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.653978 kubelet[2062]: W0412 18:43:43.653705 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.653978 kubelet[2062]: E0412 18:43:43.653724 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.654187 kubelet[2062]: E0412 18:43:43.654170 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.654187 kubelet[2062]: W0412 18:43:43.654185 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.654320 kubelet[2062]: E0412 18:43:43.654200 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.654384 kubelet[2062]: E0412 18:43:43.654368 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.654384 kubelet[2062]: W0412 18:43:43.654379 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.654384 kubelet[2062]: E0412 18:43:43.654388 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:43.654807 kubelet[2062]: E0412 18:43:43.654785 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:43.654807 kubelet[2062]: W0412 18:43:43.654793 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:43.654807 kubelet[2062]: E0412 18:43:43.654802 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.483828 kubelet[2062]: E0412 18:43:44.483791 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:44.536067 kubelet[2062]: I0412 18:43:44.536035 2062 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:44.536597 kubelet[2062]: E0412 18:43:44.536582 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:44.541472 kubelet[2062]: E0412 18:43:44.541454 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.541562 kubelet[2062]: W0412 18:43:44.541471 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.541562 kubelet[2062]: E0412 18:43:44.541505 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.541690 kubelet[2062]: E0412 18:43:44.541671 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.541690 kubelet[2062]: W0412 18:43:44.541683 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.541758 kubelet[2062]: E0412 18:43:44.541702 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.541952 kubelet[2062]: E0412 18:43:44.541936 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.541952 kubelet[2062]: W0412 18:43:44.541950 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.542048 kubelet[2062]: E0412 18:43:44.541966 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.542143 kubelet[2062]: E0412 18:43:44.542131 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.542175 kubelet[2062]: W0412 18:43:44.542141 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.542175 kubelet[2062]: E0412 18:43:44.542154 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.542470 kubelet[2062]: E0412 18:43:44.542445 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.542470 kubelet[2062]: W0412 18:43:44.542458 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.542470 kubelet[2062]: E0412 18:43:44.542472 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.542665 kubelet[2062]: E0412 18:43:44.542650 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.542665 kubelet[2062]: W0412 18:43:44.542661 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.542751 kubelet[2062]: E0412 18:43:44.542672 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.542838 kubelet[2062]: E0412 18:43:44.542828 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.542838 kubelet[2062]: W0412 18:43:44.542836 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.542889 kubelet[2062]: E0412 18:43:44.542844 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.542989 kubelet[2062]: E0412 18:43:44.542980 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.542989 kubelet[2062]: W0412 18:43:44.542988 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543038 kubelet[2062]: E0412 18:43:44.542997 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.543150 kubelet[2062]: E0412 18:43:44.543142 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.543175 kubelet[2062]: W0412 18:43:44.543151 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543175 kubelet[2062]: E0412 18:43:44.543161 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.543322 kubelet[2062]: E0412 18:43:44.543314 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.543322 kubelet[2062]: W0412 18:43:44.543322 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543375 kubelet[2062]: E0412 18:43:44.543330 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.543464 kubelet[2062]: E0412 18:43:44.543455 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.543464 kubelet[2062]: W0412 18:43:44.543463 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543514 kubelet[2062]: E0412 18:43:44.543470 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.543621 kubelet[2062]: E0412 18:43:44.543613 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.543648 kubelet[2062]: W0412 18:43:44.543620 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543648 kubelet[2062]: E0412 18:43:44.543637 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.543808 kubelet[2062]: E0412 18:43:44.543793 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.543808 kubelet[2062]: W0412 18:43:44.543802 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.543861 kubelet[2062]: E0412 18:43:44.543818 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.544055 kubelet[2062]: E0412 18:43:44.543968 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.544055 kubelet[2062]: W0412 18:43:44.543980 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.544055 kubelet[2062]: E0412 18:43:44.543991 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.544394 kubelet[2062]: E0412 18:43:44.544380 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.544394 kubelet[2062]: W0412 18:43:44.544393 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.544471 kubelet[2062]: E0412 18:43:44.544407 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.556780 kubelet[2062]: E0412 18:43:44.556731 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.556780 kubelet[2062]: W0412 18:43:44.556757 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.556780 kubelet[2062]: E0412 18:43:44.556783 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.557059 kubelet[2062]: E0412 18:43:44.557037 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.557059 kubelet[2062]: W0412 18:43:44.557043 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.557213 kubelet[2062]: E0412 18:43:44.557062 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.557316 kubelet[2062]: E0412 18:43:44.557289 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.557316 kubelet[2062]: W0412 18:43:44.557313 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.557388 kubelet[2062]: E0412 18:43:44.557345 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.557615 kubelet[2062]: E0412 18:43:44.557593 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.557615 kubelet[2062]: W0412 18:43:44.557607 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.557721 kubelet[2062]: E0412 18:43:44.557625 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.557818 kubelet[2062]: E0412 18:43:44.557805 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.557818 kubelet[2062]: W0412 18:43:44.557816 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.557881 kubelet[2062]: E0412 18:43:44.557835 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558011 kubelet[2062]: E0412 18:43:44.557992 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558011 kubelet[2062]: W0412 18:43:44.558003 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558081 kubelet[2062]: E0412 18:43:44.558018 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558192 kubelet[2062]: E0412 18:43:44.558176 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558192 kubelet[2062]: W0412 18:43:44.558188 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558270 kubelet[2062]: E0412 18:43:44.558206 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558391 kubelet[2062]: E0412 18:43:44.558377 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558391 kubelet[2062]: W0412 18:43:44.558389 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558461 kubelet[2062]: E0412 18:43:44.558404 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558570 kubelet[2062]: E0412 18:43:44.558555 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558570 kubelet[2062]: W0412 18:43:44.558566 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558659 kubelet[2062]: E0412 18:43:44.558597 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558744 kubelet[2062]: E0412 18:43:44.558725 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558744 kubelet[2062]: W0412 18:43:44.558736 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558826 kubelet[2062]: E0412 18:43:44.558762 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.558912 kubelet[2062]: E0412 18:43:44.558896 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.558912 kubelet[2062]: W0412 18:43:44.558907 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.558985 kubelet[2062]: E0412 18:43:44.558925 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.559229 kubelet[2062]: E0412 18:43:44.559210 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.559229 kubelet[2062]: W0412 18:43:44.559223 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.559366 kubelet[2062]: E0412 18:43:44.559243 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.559475 kubelet[2062]: E0412 18:43:44.559433 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.559475 kubelet[2062]: W0412 18:43:44.559441 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.559475 kubelet[2062]: E0412 18:43:44.559459 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.559644 kubelet[2062]: E0412 18:43:44.559628 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.559644 kubelet[2062]: W0412 18:43:44.559638 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.559725 kubelet[2062]: E0412 18:43:44.559653 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.559841 kubelet[2062]: E0412 18:43:44.559825 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.559841 kubelet[2062]: W0412 18:43:44.559836 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.559938 kubelet[2062]: E0412 18:43:44.559853 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.560025 kubelet[2062]: E0412 18:43:44.560013 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.560025 kubelet[2062]: W0412 18:43:44.560021 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.560086 kubelet[2062]: E0412 18:43:44.560035 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.560231 kubelet[2062]: E0412 18:43:44.560215 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.560231 kubelet[2062]: W0412 18:43:44.560228 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.560322 kubelet[2062]: E0412 18:43:44.560241 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:44.560716 kubelet[2062]: E0412 18:43:44.560686 2062 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:43:44.560716 kubelet[2062]: W0412 18:43:44.560706 2062 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:43:44.560716 kubelet[2062]: E0412 18:43:44.560717 2062 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:43:46.483850 kubelet[2062]: E0412 18:43:46.483795 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:46.892411 env[1168]: time="2024-04-12T18:43:46.892283790Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:46.905538 env[1168]: time="2024-04-12T18:43:46.905492524Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:46.910954 env[1168]: time="2024-04-12T18:43:46.910918032Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:46.916616 env[1168]: time="2024-04-12T18:43:46.916574013Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:46.917692 env[1168]: time="2024-04-12T18:43:46.917650985Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:43:46.920664 env[1168]: time="2024-04-12T18:43:46.920617998Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:43:46.977165 env[1168]: time="2024-04-12T18:43:46.977107896Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d\"" Apr 12 18:43:46.977915 env[1168]: time="2024-04-12T18:43:46.977885487Z" level=info msg="StartContainer for \"d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d\"" Apr 12 18:43:46.996244 systemd[1]: Started cri-containerd-d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d.scope. Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7ff3ff1502f8 items=0 ppid=2553 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623963396331363934623365303265623165633936616565346138 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit: BPF prog-id=133 op=LOAD Apr 12 18:43:47.009000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000024e88 items=0 ppid=2553 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623963396331363934623365303265623165633936616565346138 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit: BPF prog-id=134 op=LOAD Apr 12 18:43:47.009000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000024ed8 items=0 ppid=2553 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623963396331363934623365303265623165633936616565346138 Apr 12 18:43:47.009000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:43:47.009000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { perfmon } for pid=2703 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit[2703]: AVC avc: denied { bpf } for pid=2703 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:47.009000 audit: BPF prog-id=135 op=LOAD Apr 12 18:43:47.009000 audit[2703]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000024f68 items=0 ppid=2553 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432623963396331363934623365303265623165633936616565346138 Apr 12 18:43:47.034154 systemd[1]: cri-containerd-d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d.scope: Deactivated successfully. Apr 12 18:43:47.038000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:43:47.054064 env[1168]: time="2024-04-12T18:43:47.054004639Z" level=info msg="StartContainer for \"d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d\" returns successfully" Apr 12 18:43:47.069935 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d-rootfs.mount: Deactivated successfully. Apr 12 18:43:47.542294 kubelet[2062]: E0412 18:43:47.542246 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:47.578870 systemd[1]: Started sshd@7-10.0.0.33:22-10.0.0.1:33162.service. Apr 12 18:43:47.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.33:22-10.0.0.1:33162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.611285 env[1168]: time="2024-04-12T18:43:47.611176495Z" level=info msg="shim disconnected" id=d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d Apr 12 18:43:47.611285 env[1168]: time="2024-04-12T18:43:47.611280581Z" level=warning msg="cleaning up after shim disconnected" id=d2b9c9c1694b3e02eb1ec96aee4a83a305bc32ae42891f55694b4e017ea5691d namespace=k8s.io Apr 12 18:43:47.611285 env[1168]: time="2024-04-12T18:43:47.611296601Z" level=info msg="cleaning up dead shim" Apr 12 18:43:47.618722 env[1168]: time="2024-04-12T18:43:47.618685235Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:43:47Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2752 runtime=io.containerd.runc.v2\n" Apr 12 18:43:47.633000 audit[2750]: USER_ACCT pid=2750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.635360 sshd[2750]: Accepted publickey for core from 10.0.0.1 port 33162 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:47.672000 audit[2750]: CRED_ACQ pid=2750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.699230 sshd[2750]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:47.699834 kernel: kauditd_printk_skb: 93 callbacks suppressed Apr 12 18:43:47.699876 kernel: audit: type=1103 audit(1712947427.672:1127): pid=2750 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.703975 systemd-logind[1150]: New session 8 of user core. Apr 12 18:43:47.704831 systemd[1]: Started session-8.scope. Apr 12 18:43:47.705685 kernel: audit: type=1006 audit(1712947427.672:1128): pid=2750 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:43:47.705731 kernel: audit: type=1300 audit(1712947427.672:1128): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32ad8260 a2=3 a3=0 items=0 ppid=1 pid=2750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.672000 audit[2750]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff32ad8260 a2=3 a3=0 items=0 ppid=1 pid=2750 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:47.710285 kernel: audit: type=1327 audit(1712947427.672:1128): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:47.672000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:47.708000 audit[2750]: USER_START pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.715484 kernel: audit: type=1105 audit(1712947427.708:1129): pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.715530 kernel: audit: type=1103 audit(1712947427.709:1130): pid=2764 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.709000 audit[2764]: CRED_ACQ pid=2764 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.903562 sshd[2750]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:47.903000 audit[2750]: USER_END pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.906761 systemd[1]: sshd@7-10.0.0.33:22-10.0.0.1:33162.service: Deactivated successfully. Apr 12 18:43:47.907470 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:43:47.908147 systemd-logind[1150]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:43:47.908910 systemd-logind[1150]: Removed session 8. Apr 12 18:43:47.903000 audit[2750]: CRED_DISP pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.912905 kernel: audit: type=1106 audit(1712947427.903:1131): pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.912968 kernel: audit: type=1104 audit(1712947427.903:1132): pid=2750 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:47.912989 kernel: audit: type=1131 audit(1712947427.905:1133): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.33:22-10.0.0.1:33162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.33:22-10.0.0.1:33162 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:47.970410 kubelet[2062]: I0412 18:43:47.970351 2062 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:43:47.971160 kubelet[2062]: E0412 18:43:47.971130 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:48.238000 audit[2782]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:48.238000 audit[2782]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffcf58db050 a2=0 a3=7ffcf58db03c items=0 ppid=2249 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:48.266284 kernel: audit: type=1325 audit(1712947428.238:1134): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:48.238000 audit[2782]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:43:48.238000 audit[2782]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffcf58db050 a2=0 a3=7ffcf58db03c items=0 ppid=2249 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:48.238000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:43:48.484373 kubelet[2062]: E0412 18:43:48.484319 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:48.545530 kubelet[2062]: E0412 18:43:48.545434 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:48.545836 kubelet[2062]: E0412 18:43:48.545740 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:48.546168 env[1168]: time="2024-04-12T18:43:48.546137621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:43:50.484294 kubelet[2062]: E0412 18:43:50.484229 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:50.517107 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3514559607.mount: Deactivated successfully. Apr 12 18:43:52.484135 kubelet[2062]: E0412 18:43:52.484023 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:52.908627 systemd[1]: Started sshd@8-10.0.0.33:22-10.0.0.1:38580.service. Apr 12 18:43:52.913585 kernel: kauditd_printk_skb: 5 callbacks suppressed Apr 12 18:43:52.913639 kernel: audit: type=1130 audit(1712947432.907:1136): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.33:22-10.0.0.1:38580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:52.907000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.33:22-10.0.0.1:38580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:52.945000 audit[2784]: USER_ACCT pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.950000 audit[2784]: CRED_ACQ pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.951690 sshd[2784]: Accepted publickey for core from 10.0.0.1 port 38580 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:52.952077 sshd[2784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:52.952293 kernel: audit: type=1101 audit(1712947432.945:1137): pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.952335 kernel: audit: type=1103 audit(1712947432.950:1138): pid=2784 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.957935 kernel: audit: type=1006 audit(1712947432.950:1139): pid=2784 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:43:52.950000 audit[2784]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefb4c69e0 a2=3 a3=0 items=0 ppid=1 pid=2784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.961823 kernel: audit: type=1300 audit(1712947432.950:1139): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffefb4c69e0 a2=3 a3=0 items=0 ppid=1 pid=2784 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:52.950000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:52.963276 kernel: audit: type=1327 audit(1712947432.950:1139): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:52.963478 systemd-logind[1150]: New session 9 of user core. Apr 12 18:43:52.964218 systemd[1]: Started session-9.scope. Apr 12 18:43:52.968000 audit[2784]: USER_START pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.972000 audit[2786]: CRED_ACQ pid=2786 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.977278 kernel: audit: type=1105 audit(1712947432.968:1140): pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:52.977332 kernel: audit: type=1103 audit(1712947432.972:1141): pid=2786 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:53.289895 sshd[2784]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:53.290000 audit[2784]: USER_END pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:53.293547 systemd[1]: sshd@8-10.0.0.33:22-10.0.0.1:38580.service: Deactivated successfully. Apr 12 18:43:53.294421 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:43:53.295140 systemd-logind[1150]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:43:53.296038 systemd-logind[1150]: Removed session 9. Apr 12 18:43:53.290000 audit[2784]: CRED_DISP pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:53.300571 kernel: audit: type=1106 audit(1712947433.290:1142): pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:53.300677 kernel: audit: type=1104 audit(1712947433.290:1143): pid=2784 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:53.292000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.33:22-10.0.0.1:38580 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:53.933628 env[1168]: time="2024-04-12T18:43:53.933574772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.938314 env[1168]: time="2024-04-12T18:43:53.936723412Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.938314 env[1168]: time="2024-04-12T18:43:53.937953461Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.941001 env[1168]: time="2024-04-12T18:43:53.940944516Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:43:53.941901 env[1168]: time="2024-04-12T18:43:53.941857008Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:43:53.943775 env[1168]: time="2024-04-12T18:43:53.943738651Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:43:53.957537 env[1168]: time="2024-04-12T18:43:53.957482790Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416\"" Apr 12 18:43:53.958311 env[1168]: time="2024-04-12T18:43:53.958248397Z" level=info msg="StartContainer for \"6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416\"" Apr 12 18:43:53.980822 systemd[1]: Started cri-containerd-6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416.scope. Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f87c071ecc8 items=0 ppid=2553 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346562333463336632333463373764643339623965626666323432 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.994000 audit: BPF prog-id=136 op=LOAD Apr 12 18:43:53.994000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000304c38 items=0 ppid=2553 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.994000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346562333463336632333463373764643339623965626666323432 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.995000 audit: BPF prog-id=137 op=LOAD Apr 12 18:43:53.995000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000304c88 items=0 ppid=2553 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.995000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346562333463336632333463373764643339623965626666323432 Apr 12 18:43:53.996000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:43:53.996000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { perfmon } for pid=2805 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit[2805]: AVC avc: denied { bpf } for pid=2805 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:43:53.996000 audit: BPF prog-id=138 op=LOAD Apr 12 18:43:53.996000 audit[2805]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000304d18 items=0 ppid=2553 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:53.996000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665346562333463336632333463373764643339623965626666323432 Apr 12 18:43:54.011534 env[1168]: time="2024-04-12T18:43:54.011462262Z" level=info msg="StartContainer for \"6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416\" returns successfully" Apr 12 18:43:54.484414 kubelet[2062]: E0412 18:43:54.484362 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:54.557983 kubelet[2062]: E0412 18:43:54.557948 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:55.559494 kubelet[2062]: E0412 18:43:55.559461 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:55.813396 env[1168]: time="2024-04-12T18:43:55.813213484Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:43:55.815660 systemd[1]: cri-containerd-6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416.scope: Deactivated successfully. Apr 12 18:43:55.819000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:43:55.831458 kubelet[2062]: I0412 18:43:55.831135 2062 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:43:55.837862 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416-rootfs.mount: Deactivated successfully. Apr 12 18:43:56.000078 kubelet[2062]: I0412 18:43:56.000019 2062 topology_manager.go:215] "Topology Admit Handler" podUID="06f292d4-e5f2-40ca-8722-8655edf4fd42" podNamespace="kube-system" podName="coredns-5dd5756b68-xp5r2" Apr 12 18:43:56.002526 kubelet[2062]: I0412 18:43:56.002475 2062 topology_manager.go:215] "Topology Admit Handler" podUID="0940ea5e-9c1a-4cf8-b5d5-edd646ede038" podNamespace="calico-system" podName="calico-kube-controllers-55f8f7cd74-88bhj" Apr 12 18:43:56.002634 kubelet[2062]: I0412 18:43:56.002624 2062 topology_manager.go:215] "Topology Admit Handler" podUID="5cdd6bce-2467-4dd1-ba02-13a31e4457f1" podNamespace="kube-system" podName="coredns-5dd5756b68-gxrpl" Apr 12 18:43:56.006206 systemd[1]: Created slice kubepods-burstable-pod06f292d4_e5f2_40ca_8722_8655edf4fd42.slice. Apr 12 18:43:56.010697 systemd[1]: Created slice kubepods-burstable-pod5cdd6bce_2467_4dd1_ba02_13a31e4457f1.slice. Apr 12 18:43:56.014403 systemd[1]: Created slice kubepods-besteffort-pod0940ea5e_9c1a_4cf8_b5d5_edd646ede038.slice. Apr 12 18:43:56.035166 kubelet[2062]: I0412 18:43:56.035112 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vbl52\" (UniqueName: \"kubernetes.io/projected/06f292d4-e5f2-40ca-8722-8655edf4fd42-kube-api-access-vbl52\") pod \"coredns-5dd5756b68-xp5r2\" (UID: \"06f292d4-e5f2-40ca-8722-8655edf4fd42\") " pod="kube-system/coredns-5dd5756b68-xp5r2" Apr 12 18:43:56.035377 kubelet[2062]: I0412 18:43:56.035184 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/06f292d4-e5f2-40ca-8722-8655edf4fd42-config-volume\") pod \"coredns-5dd5756b68-xp5r2\" (UID: \"06f292d4-e5f2-40ca-8722-8655edf4fd42\") " pod="kube-system/coredns-5dd5756b68-xp5r2" Apr 12 18:43:56.035377 kubelet[2062]: I0412 18:43:56.035246 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jsjz6\" (UniqueName: \"kubernetes.io/projected/5cdd6bce-2467-4dd1-ba02-13a31e4457f1-kube-api-access-jsjz6\") pod \"coredns-5dd5756b68-gxrpl\" (UID: \"5cdd6bce-2467-4dd1-ba02-13a31e4457f1\") " pod="kube-system/coredns-5dd5756b68-gxrpl" Apr 12 18:43:56.035377 kubelet[2062]: I0412 18:43:56.035344 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-m4z86\" (UniqueName: \"kubernetes.io/projected/0940ea5e-9c1a-4cf8-b5d5-edd646ede038-kube-api-access-m4z86\") pod \"calico-kube-controllers-55f8f7cd74-88bhj\" (UID: \"0940ea5e-9c1a-4cf8-b5d5-edd646ede038\") " pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" Apr 12 18:43:56.035377 kubelet[2062]: I0412 18:43:56.035367 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0940ea5e-9c1a-4cf8-b5d5-edd646ede038-tigera-ca-bundle\") pod \"calico-kube-controllers-55f8f7cd74-88bhj\" (UID: \"0940ea5e-9c1a-4cf8-b5d5-edd646ede038\") " pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" Apr 12 18:43:56.035513 kubelet[2062]: I0412 18:43:56.035387 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5cdd6bce-2467-4dd1-ba02-13a31e4457f1-config-volume\") pod \"coredns-5dd5756b68-gxrpl\" (UID: \"5cdd6bce-2467-4dd1-ba02-13a31e4457f1\") " pod="kube-system/coredns-5dd5756b68-gxrpl" Apr 12 18:43:56.309542 kubelet[2062]: E0412 18:43:56.309481 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:56.310487 env[1168]: time="2024-04-12T18:43:56.310064672Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xp5r2,Uid:06f292d4-e5f2-40ca-8722-8655edf4fd42,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:56.313489 kubelet[2062]: E0412 18:43:56.313462 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:56.313977 env[1168]: time="2024-04-12T18:43:56.313933183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gxrpl,Uid:5cdd6bce-2467-4dd1-ba02-13a31e4457f1,Namespace:kube-system,Attempt:0,}" Apr 12 18:43:56.317399 env[1168]: time="2024-04-12T18:43:56.317360105Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8f7cd74-88bhj,Uid:0940ea5e-9c1a-4cf8-b5d5-edd646ede038,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:56.488195 systemd[1]: Created slice kubepods-besteffort-pod48a0ac37_b3e0_4094_b5d5_7ce7f37d562c.slice. Apr 12 18:43:56.490021 env[1168]: time="2024-04-12T18:43:56.489976366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hkzhm,Uid:48a0ac37-b3e0-4094-b5d5-7ce7f37d562c,Namespace:calico-system,Attempt:0,}" Apr 12 18:43:56.525425 env[1168]: time="2024-04-12T18:43:56.525355948Z" level=info msg="shim disconnected" id=6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416 Apr 12 18:43:56.525425 env[1168]: time="2024-04-12T18:43:56.525405892Z" level=warning msg="cleaning up after shim disconnected" id=6e4eb34c3f234c77dd39b9ebff242e07a876f6461ec16faec3b91a028d78b416 namespace=k8s.io Apr 12 18:43:56.525425 env[1168]: time="2024-04-12T18:43:56.525425458Z" level=info msg="cleaning up dead shim" Apr 12 18:43:56.531923 env[1168]: time="2024-04-12T18:43:56.531873330Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:43:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2849 runtime=io.containerd.runc.v2\n" Apr 12 18:43:56.674199 kubelet[2062]: E0412 18:43:56.674152 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:43:56.675628 env[1168]: time="2024-04-12T18:43:56.675583178Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:43:57.807483 env[1168]: time="2024-04-12T18:43:57.807399237Z" level=error msg="Failed to destroy network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.807985 env[1168]: time="2024-04-12T18:43:57.807944349Z" level=error msg="encountered an error cleaning up failed sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.808062 env[1168]: time="2024-04-12T18:43:57.808001418Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xp5r2,Uid:06f292d4-e5f2-40ca-8722-8655edf4fd42,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.808430 kubelet[2062]: E0412 18:43:57.808372 2062 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.808713 kubelet[2062]: E0412 18:43:57.808472 2062 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xp5r2" Apr 12 18:43:57.809449 kubelet[2062]: E0412 18:43:57.809409 2062 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xp5r2" Apr 12 18:43:57.809531 kubelet[2062]: E0412 18:43:57.809486 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-xp5r2_kube-system(06f292d4-e5f2-40ca-8722-8655edf4fd42)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-xp5r2_kube-system(06f292d4-e5f2-40ca-8722-8655edf4fd42)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xp5r2" podUID="06f292d4-e5f2-40ca-8722-8655edf4fd42" Apr 12 18:43:57.833076 env[1168]: time="2024-04-12T18:43:57.832972712Z" level=error msg="Failed to destroy network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.833516 env[1168]: time="2024-04-12T18:43:57.833474924Z" level=error msg="Failed to destroy network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.833645 env[1168]: time="2024-04-12T18:43:57.833616129Z" level=error msg="encountered an error cleaning up failed sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.833708 env[1168]: time="2024-04-12T18:43:57.833675801Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hkzhm,Uid:48a0ac37-b3e0-4094-b5d5-7ce7f37d562c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.834148 env[1168]: time="2024-04-12T18:43:57.833818509Z" level=error msg="encountered an error cleaning up failed sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.834148 env[1168]: time="2024-04-12T18:43:57.833869125Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gxrpl,Uid:5cdd6bce-2467-4dd1-ba02-13a31e4457f1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.834247 kubelet[2062]: E0412 18:43:57.833961 2062 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.834247 kubelet[2062]: E0412 18:43:57.834007 2062 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.834247 kubelet[2062]: E0412 18:43:57.834035 2062 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:57.834247 kubelet[2062]: E0412 18:43:57.834040 2062 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-gxrpl" Apr 12 18:43:57.834454 kubelet[2062]: E0412 18:43:57.834059 2062 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-gxrpl" Apr 12 18:43:57.834454 kubelet[2062]: E0412 18:43:57.834061 2062 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-hkzhm" Apr 12 18:43:57.834454 kubelet[2062]: E0412 18:43:57.834113 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-gxrpl_kube-system(5cdd6bce-2467-4dd1-ba02-13a31e4457f1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-gxrpl_kube-system(5cdd6bce-2467-4dd1-ba02-13a31e4457f1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-gxrpl" podUID="5cdd6bce-2467-4dd1-ba02-13a31e4457f1" Apr 12 18:43:57.836325 kubelet[2062]: E0412 18:43:57.834115 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-hkzhm_calico-system(48a0ac37-b3e0-4094-b5d5-7ce7f37d562c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-hkzhm_calico-system(48a0ac37-b3e0-4094-b5d5-7ce7f37d562c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:57.837430 env[1168]: time="2024-04-12T18:43:57.837321854Z" level=error msg="Failed to destroy network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.837835 env[1168]: time="2024-04-12T18:43:57.837781718Z" level=error msg="encountered an error cleaning up failed sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.837907 env[1168]: time="2024-04-12T18:43:57.837854114Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8f7cd74-88bhj,Uid:0940ea5e-9c1a-4cf8-b5d5-edd646ede038,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.838094 kubelet[2062]: E0412 18:43:57.838076 2062 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:57.838159 kubelet[2062]: E0412 18:43:57.838115 2062 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" Apr 12 18:43:57.838159 kubelet[2062]: E0412 18:43:57.838133 2062 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" Apr 12 18:43:57.838232 kubelet[2062]: E0412 18:43:57.838185 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-55f8f7cd74-88bhj_calico-system(0940ea5e-9c1a-4cf8-b5d5-edd646ede038)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-55f8f7cd74-88bhj_calico-system(0940ea5e-9c1a-4cf8-b5d5-edd646ede038)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" podUID="0940ea5e-9c1a-4cf8-b5d5-edd646ede038" Apr 12 18:43:58.294338 systemd[1]: Started sshd@9-10.0.0.33:22-10.0.0.1:38584.service. Apr 12 18:43:58.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.33:22-10.0.0.1:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:58.312321 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 18:43:58.312471 kernel: audit: type=1130 audit(1712947438.293:1152): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.33:22-10.0.0.1:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:58.351000 audit[3015]: USER_ACCT pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.352588 sshd[3015]: Accepted publickey for core from 10.0.0.1 port 38584 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:43:58.354873 sshd[3015]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:43:58.353000 audit[3015]: CRED_ACQ pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.359246 systemd-logind[1150]: New session 10 of user core. Apr 12 18:43:58.360131 systemd[1]: Started session-10.scope. Apr 12 18:43:58.361351 kernel: audit: type=1101 audit(1712947438.351:1153): pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.361429 kernel: audit: type=1103 audit(1712947438.353:1154): pid=3015 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.361454 kernel: audit: type=1006 audit(1712947438.353:1155): pid=3015 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:43:58.353000 audit[3015]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd264a8a90 a2=3 a3=0 items=0 ppid=1 pid=3015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:58.368636 kernel: audit: type=1300 audit(1712947438.353:1155): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd264a8a90 a2=3 a3=0 items=0 ppid=1 pid=3015 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:43:58.368714 kernel: audit: type=1327 audit(1712947438.353:1155): proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:58.353000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:43:58.369977 kernel: audit: type=1105 audit(1712947438.363:1156): pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.363000 audit[3015]: USER_START pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.374152 kernel: audit: type=1103 audit(1712947438.365:1157): pid=3017 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.365000 audit[3017]: CRED_ACQ pid=3017 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.511737 sshd[3015]: pam_unix(sshd:session): session closed for user core Apr 12 18:43:58.511000 audit[3015]: USER_END pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.514406 systemd[1]: sshd@9-10.0.0.33:22-10.0.0.1:38584.service: Deactivated successfully. Apr 12 18:43:58.515294 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:43:58.515910 systemd-logind[1150]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:43:58.516698 systemd-logind[1150]: Removed session 10. Apr 12 18:43:58.511000 audit[3015]: CRED_DISP pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.560391 kernel: audit: type=1106 audit(1712947438.511:1158): pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.560453 kernel: audit: type=1104 audit(1712947438.511:1159): pid=3015 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:43:58.513000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.33:22-10.0.0.1:38584 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:43:58.618582 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67-shm.mount: Deactivated successfully. Apr 12 18:43:58.618676 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27-shm.mount: Deactivated successfully. Apr 12 18:43:58.618727 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781-shm.mount: Deactivated successfully. Apr 12 18:43:58.680493 kubelet[2062]: I0412 18:43:58.679941 2062 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:43:58.680909 env[1168]: time="2024-04-12T18:43:58.680857654Z" level=info msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" Apr 12 18:43:58.681666 kubelet[2062]: I0412 18:43:58.681635 2062 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:43:58.682265 env[1168]: time="2024-04-12T18:43:58.682188802Z" level=info msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" Apr 12 18:43:58.683197 kubelet[2062]: I0412 18:43:58.683176 2062 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:43:58.683685 env[1168]: time="2024-04-12T18:43:58.683653952Z" level=info msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" Apr 12 18:43:58.684750 kubelet[2062]: I0412 18:43:58.684720 2062 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:43:58.685144 env[1168]: time="2024-04-12T18:43:58.685101418Z" level=info msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" Apr 12 18:43:58.712956 env[1168]: time="2024-04-12T18:43:58.712890439Z" level=error msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" failed" error="failed to destroy network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:58.713232 kubelet[2062]: E0412 18:43:58.713206 2062 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:43:58.713339 kubelet[2062]: E0412 18:43:58.713308 2062 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27"} Apr 12 18:43:58.713382 kubelet[2062]: E0412 18:43:58.713344 2062 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5cdd6bce-2467-4dd1-ba02-13a31e4457f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:58.713448 kubelet[2062]: E0412 18:43:58.713383 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5cdd6bce-2467-4dd1-ba02-13a31e4457f1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-gxrpl" podUID="5cdd6bce-2467-4dd1-ba02-13a31e4457f1" Apr 12 18:43:58.715708 env[1168]: time="2024-04-12T18:43:58.715673883Z" level=error msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" failed" error="failed to destroy network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:58.715875 env[1168]: time="2024-04-12T18:43:58.715754063Z" level=error msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" failed" error="failed to destroy network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:58.715992 kubelet[2062]: E0412 18:43:58.715963 2062 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:43:58.716077 kubelet[2062]: E0412 18:43:58.716005 2062 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d"} Apr 12 18:43:58.716077 kubelet[2062]: E0412 18:43:58.716035 2062 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:58.716077 kubelet[2062]: E0412 18:43:58.715964 2062 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:43:58.716077 kubelet[2062]: E0412 18:43:58.716069 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-hkzhm" podUID="48a0ac37-b3e0-4094-b5d5-7ce7f37d562c" Apr 12 18:43:58.716077 kubelet[2062]: E0412 18:43:58.716073 2062 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781"} Apr 12 18:43:58.716326 kubelet[2062]: E0412 18:43:58.716100 2062 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"06f292d4-e5f2-40ca-8722-8655edf4fd42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:58.716326 kubelet[2062]: E0412 18:43:58.716126 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"06f292d4-e5f2-40ca-8722-8655edf4fd42\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xp5r2" podUID="06f292d4-e5f2-40ca-8722-8655edf4fd42" Apr 12 18:43:58.722717 env[1168]: time="2024-04-12T18:43:58.722654804Z" level=error msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" failed" error="failed to destroy network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:43:58.722911 kubelet[2062]: E0412 18:43:58.722886 2062 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:43:58.722911 kubelet[2062]: E0412 18:43:58.722910 2062 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67"} Apr 12 18:43:58.722989 kubelet[2062]: E0412 18:43:58.722936 2062 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0940ea5e-9c1a-4cf8-b5d5-edd646ede038\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:43:58.722989 kubelet[2062]: E0412 18:43:58.722956 2062 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0940ea5e-9c1a-4cf8-b5d5-edd646ede038\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" podUID="0940ea5e-9c1a-4cf8-b5d5-edd646ede038" Apr 12 18:44:03.515458 systemd[1]: Started sshd@10-10.0.0.33:22-10.0.0.1:59018.service. Apr 12 18:44:03.521414 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:03.521459 kernel: audit: type=1130 audit(1712947443.514:1161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.33:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.514000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.33:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:03.550000 audit[3135]: USER_ACCT pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.556554 sshd[3135]: Accepted publickey for core from 10.0.0.1 port 59018 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:03.555000 audit[3135]: CRED_ACQ pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.556975 sshd[3135]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:03.557355 kernel: audit: type=1101 audit(1712947443.550:1162): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.557407 kernel: audit: type=1103 audit(1712947443.555:1163): pid=3135 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.563042 kernel: audit: type=1006 audit(1712947443.555:1164): pid=3135 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:44:03.555000 audit[3135]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5e99b550 a2=3 a3=0 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:03.569465 kernel: audit: type=1300 audit(1712947443.555:1164): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5e99b550 a2=3 a3=0 items=0 ppid=1 pid=3135 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:03.569518 kernel: audit: type=1327 audit(1712947443.555:1164): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:03.573318 systemd-logind[1150]: New session 11 of user core. Apr 12 18:44:03.574489 systemd[1]: Started session-11.scope. Apr 12 18:44:03.587158 kernel: audit: type=1105 audit(1712947443.577:1165): pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.587226 kernel: audit: type=1103 audit(1712947443.579:1166): pid=3137 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.577000 audit[3135]: USER_START pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.579000 audit[3137]: CRED_ACQ pid=3137 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.690328 sshd[3135]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:03.689000 audit[3135]: USER_END pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.692855 systemd[1]: sshd@10-10.0.0.33:22-10.0.0.1:59018.service: Deactivated successfully. Apr 12 18:44:03.693863 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:44:03.694927 systemd-logind[1150]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:44:03.695803 systemd-logind[1150]: Removed session 11. Apr 12 18:44:03.690000 audit[3135]: CRED_DISP pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.699376 kernel: audit: type=1106 audit(1712947443.689:1167): pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.699427 kernel: audit: type=1104 audit(1712947443.690:1168): pid=3135 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:03.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.33:22-10.0.0.1:59018 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:04.663129 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount22011537.mount: Deactivated successfully. Apr 12 18:44:07.541042 env[1168]: time="2024-04-12T18:44:07.540974400Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:07.543793 env[1168]: time="2024-04-12T18:44:07.543752609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:07.545340 env[1168]: time="2024-04-12T18:44:07.545293456Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:07.547238 env[1168]: time="2024-04-12T18:44:07.547209125Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:07.547661 env[1168]: time="2024-04-12T18:44:07.547626980Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:44:07.559205 env[1168]: time="2024-04-12T18:44:07.559158325Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:44:07.575394 env[1168]: time="2024-04-12T18:44:07.575336226Z" level=info msg="CreateContainer within sandbox \"59bf4b7e70076535d745f679af0c6288620121cf1aa5632f7b7e54bd8ff05216\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2f21656db6c1111867abd96efbb337eb3d0ed73f497cf18cbe53bf5c99aed0a6\"" Apr 12 18:44:07.575828 env[1168]: time="2024-04-12T18:44:07.575797244Z" level=info msg="StartContainer for \"2f21656db6c1111867abd96efbb337eb3d0ed73f497cf18cbe53bf5c99aed0a6\"" Apr 12 18:44:07.591093 systemd[1]: Started cri-containerd-2f21656db6c1111867abd96efbb337eb3d0ed73f497cf18cbe53bf5c99aed0a6.scope. Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001996b0 a2=3c a3=7f76cc5ed7b8 items=0 ppid=2553 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323136353664623663313131313836376162643936656662623333 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit: BPF prog-id=139 op=LOAD Apr 12 18:44:07.605000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001999d8 a2=78 a3=c0002f2118 items=0 ppid=2553 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323136353664623663313131313836376162643936656662623333 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit: BPF prog-id=140 op=LOAD Apr 12 18:44:07.605000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000199770 a2=78 a3=c0002f2168 items=0 ppid=2553 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323136353664623663313131313836376162643936656662623333 Apr 12 18:44:07.605000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:44:07.605000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { perfmon } for pid=3158 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit[3158]: AVC avc: denied { bpf } for pid=3158 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:07.605000 audit: BPF prog-id=141 op=LOAD Apr 12 18:44:07.605000 audit[3158]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000199c30 a2=78 a3=c0002f21f8 items=0 ppid=2553 pid=3158 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:07.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3266323136353664623663313131313836376162643936656662623333 Apr 12 18:44:07.692801 env[1168]: time="2024-04-12T18:44:07.692726519Z" level=info msg="StartContainer for \"2f21656db6c1111867abd96efbb337eb3d0ed73f497cf18cbe53bf5c99aed0a6\" returns successfully" Apr 12 18:44:07.701061 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:44:07.701184 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:44:07.706029 kubelet[2062]: E0412 18:44:07.706005 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:08.694652 systemd[1]: Started sshd@11-10.0.0.33:22-10.0.0.1:59022.service. Apr 12 18:44:08.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.33:22-10.0.0.1:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:08.696198 kernel: kauditd_printk_skb: 44 callbacks suppressed Apr 12 18:44:08.696277 kernel: audit: type=1130 audit(1712947448.693:1176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.33:22-10.0.0.1:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:08.707695 kubelet[2062]: E0412 18:44:08.707662 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:08.729000 audit[3245]: USER_ACCT pid=3245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.732371 sshd[3245]: Accepted publickey for core from 10.0.0.1 port 59022 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:08.741111 kernel: audit: type=1101 audit(1712947448.729:1177): pid=3245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.741277 kernel: audit: type=1103 audit(1712947448.735:1178): pid=3245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.735000 audit[3245]: CRED_ACQ pid=3245 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.740000 audit[3245]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe972ddfd0 a2=3 a3=0 items=0 ppid=1 pid=3245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:08.744795 sshd[3245]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:08.750833 kernel: audit: type=1006 audit(1712947448.740:1179): pid=3245 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:44:08.750964 kernel: audit: type=1300 audit(1712947448.740:1179): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe972ddfd0 a2=3 a3=0 items=0 ppid=1 pid=3245 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:08.751000 kernel: audit: type=1327 audit(1712947448.740:1179): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:08.740000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:08.750645 systemd[1]: Started session-12.scope. Apr 12 18:44:08.751308 systemd-logind[1150]: New session 12 of user core. Apr 12 18:44:08.755000 audit[3245]: USER_START pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.764799 kernel: audit: type=1105 audit(1712947448.755:1180): pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.764923 kernel: audit: type=1103 audit(1712947448.756:1181): pid=3268 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.756000 audit[3268]: CRED_ACQ pid=3268 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.863794 sshd[3245]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:08.863000 audit[3245]: USER_END pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.866407 systemd[1]: sshd@11-10.0.0.33:22-10.0.0.1:59022.service: Deactivated successfully. Apr 12 18:44:08.867231 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:44:08.867905 systemd-logind[1150]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:44:08.868811 systemd-logind[1150]: Removed session 12. Apr 12 18:44:08.863000 audit[3245]: CRED_DISP pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.872536 kernel: audit: type=1106 audit(1712947448.863:1182): pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.872618 kernel: audit: type=1104 audit(1712947448.863:1183): pid=3245 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:08.863000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.33:22-10.0.0.1:59022 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:09.100000 audit[3319]: AVC avc: denied { write } for pid=3319 comm="tee" name="fd" dev="proc" ino=26087 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.100000 audit[3319]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc765cd990 a2=241 a3=1b6 items=1 ppid=3296 pid=3319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.100000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:44:09.100000 audit: PATH item=0 name="/dev/fd/63" inode=26084 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.100000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.114000 audit[3313]: AVC avc: denied { write } for pid=3313 comm="tee" name="fd" dev="proc" ino=23475 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.114000 audit[3313]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc970fa97f a2=241 a3=1b6 items=1 ppid=3289 pid=3313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.114000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:44:09.114000 audit: PATH item=0 name="/dev/fd/63" inode=26081 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.114000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.131000 audit[3332]: AVC avc: denied { write } for pid=3332 comm="tee" name="fd" dev="proc" ino=23485 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.131000 audit[3355]: AVC avc: denied { write } for pid=3355 comm="tee" name="fd" dev="proc" ino=24931 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.131000 audit[3355]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffce101e98f a2=241 a3=1b6 items=1 ppid=3290 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.131000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:44:09.131000 audit: PATH item=0 name="/dev/fd/63" inode=23479 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.131000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.134000 audit[3344]: AVC avc: denied { write } for pid=3344 comm="tee" name="fd" dev="proc" ino=23488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.134000 audit[3360]: AVC avc: denied { write } for pid=3360 comm="tee" name="fd" dev="proc" ino=26104 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.134000 audit[3360]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd92c4d991 a2=241 a3=1b6 items=1 ppid=3293 pid=3360 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.134000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:44:09.134000 audit: PATH item=0 name="/dev/fd/63" inode=26101 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.134000 audit[3344]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd6112598f a2=241 a3=1b6 items=1 ppid=3324 pid=3344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.134000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:44:09.134000 audit: PATH item=0 name="/dev/fd/63" inode=24148 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.134000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.131000 audit[3332]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffcb442998f a2=241 a3=1b6 items=1 ppid=3302 pid=3332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.131000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:44:09.131000 audit: PATH item=0 name="/dev/fd/63" inode=24143 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.131000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.148000 audit[3358]: AVC avc: denied { write } for pid=3358 comm="tee" name="fd" dev="proc" ino=26111 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:44:09.148000 audit[3358]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe72338980 a2=241 a3=1b6 items=1 ppid=3320 pid=3358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.148000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:44:09.148000 audit: PATH item=0 name="/dev/fd/63" inode=26100 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:44:09.148000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit: BPF prog-id=142 op=LOAD Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce4d9c930 a2=70 a3=7f391d45d000 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.395000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit: BPF prog-id=143 op=LOAD Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffce4d9c930 a2=70 a3=6f items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.395000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffce4d9c8e0 a2=70 a3=7ffce4d9c930 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit: BPF prog-id=144 op=LOAD Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffce4d9c8c0 a2=70 a3=7ffce4d9c930 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.395000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce4d9c9a0 a2=70 a3=0 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.395000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.395000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce4d9c990 a2=70 a3=0 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.395000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffce4d9c900 a2=70 a3=0 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.396000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffce4d9c9d0 a2=70 a3=1d46e10 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.396000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffce4d9c9d0 a2=70 a3=1d43880 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.396000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { perfmon } for pid=3434 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit[3434]: AVC avc: denied { bpf } for pid=3434 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.396000 audit: BPF prog-id=145 op=LOAD Apr 12 18:44:09.396000 audit[3434]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffce4d9c8f0 a2=70 a3=0 items=0 ppid=3303 pid=3434 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.396000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:44:09.401000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.401000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd14815100 a2=70 a3=208 items=0 ppid=3303 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:44:09.401000 audit[3439]: AVC avc: denied { bpf } for pid=3439 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:09.401000 audit[3439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffd14814fd0 a2=70 a3=3 items=0 ppid=3303 pid=3439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.401000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:44:09.407000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:44:09.475000 audit[3467]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3467 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:09.475000 audit[3467]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffc16b155c0 a2=0 a3=7ffc16b155ac items=0 ppid=3303 pid=3467 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.475000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:09.480000 audit[3468]: NETFILTER_CFG table=nat:98 family=2 entries=15 op=nft_register_chain pid=3468 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:09.480000 audit[3468]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffeb7a73470 a2=0 a3=7ffeb7a7345c items=0 ppid=3303 pid=3468 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.480000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:09.481000 audit[3469]: NETFILTER_CFG table=filter:99 family=2 entries=39 op=nft_register_chain pid=3469 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:09.481000 audit[3469]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffecddf0190 a2=0 a3=7ffecddf017c items=0 ppid=3303 pid=3469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:09.486000 audit[3466]: NETFILTER_CFG table=raw:100 family=2 entries=19 op=nft_register_chain pid=3466 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:09.486000 audit[3466]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffc5f9cb890 a2=0 a3=7ffc5f9cb87c items=0 ppid=3303 pid=3466 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:09.486000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:10.308475 systemd-networkd[1070]: vxlan.calico: Link UP Apr 12 18:44:10.308487 systemd-networkd[1070]: vxlan.calico: Gained carrier Apr 12 18:44:10.484136 env[1168]: time="2024-04-12T18:44:10.484080360Z" level=info msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" Apr 12 18:44:10.533917 kubelet[2062]: I0412 18:44:10.533712 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-lz4gl" podStartSLOduration=4.303527382 podCreationTimestamp="2024-04-12 18:43:38 +0000 UTC" firstStartedPulling="2024-04-12 18:43:39.317755652 +0000 UTC m=+21.918870142" lastFinishedPulling="2024-04-12 18:44:07.547895617 +0000 UTC m=+50.149010087" observedRunningTime="2024-04-12 18:44:07.756571015 +0000 UTC m=+50.357685485" watchObservedRunningTime="2024-04-12 18:44:10.533667327 +0000 UTC m=+53.134781807" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.538 [INFO][3496] k8s.go 585: Cleaning up netns ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.538 [INFO][3496] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" iface="eth0" netns="/var/run/netns/cni-2f14b4cf-9f43-77c0-e8e2-2fcdd2165807" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.539 [INFO][3496] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" iface="eth0" netns="/var/run/netns/cni-2f14b4cf-9f43-77c0-e8e2-2fcdd2165807" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.539 [INFO][3496] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" iface="eth0" netns="/var/run/netns/cni-2f14b4cf-9f43-77c0-e8e2-2fcdd2165807" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.539 [INFO][3496] k8s.go 592: Releasing IP address(es) ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.539 [INFO][3496] utils.go 188: Calico CNI releasing IP address ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.588 [INFO][3506] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.588 [INFO][3506] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.588 [INFO][3506] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.595 [WARNING][3506] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.595 [INFO][3506] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.597 [INFO][3506] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:10.600595 env[1168]: 2024-04-12 18:44:10.599 [INFO][3496] k8s.go 598: Teardown processing complete. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:10.601321 env[1168]: time="2024-04-12T18:44:10.600659200Z" level=info msg="TearDown network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" successfully" Apr 12 18:44:10.601321 env[1168]: time="2024-04-12T18:44:10.600703575Z" level=info msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" returns successfully" Apr 12 18:44:10.601734 env[1168]: time="2024-04-12T18:44:10.601690060Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hkzhm,Uid:48a0ac37-b3e0-4094-b5d5-7ce7f37d562c,Namespace:calico-system,Attempt:1,}" Apr 12 18:44:10.602801 systemd[1]: run-netns-cni\x2d2f14b4cf\x2d9f43\x2d77c0\x2de8e2\x2d2fcdd2165807.mount: Deactivated successfully. Apr 12 18:44:11.281000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.281000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.281000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002143080 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:11.281000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000dd51e0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:11.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:11.281000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:11.298000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=521007 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.298000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00785cae0 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.298000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.298000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.298000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c005a1a660 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.298000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.307000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.307000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c006e72450 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.307000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.307000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c004266f40 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.307000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.308000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.308000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0068bf470 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.308000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.308000 audit[1889]: AVC avc: denied { watch } for pid=1889 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=521011 scontext=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:11.308000 audit[1889]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6a a1=c00785cb40 a2=fc6 a3=0 items=0 ppid=1752 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c228,c689 key=(null) Apr 12 18:44:11.308000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3333002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:44:11.484847 env[1168]: time="2024-04-12T18:44:11.484801876Z" level=info msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] k8s.go 585: Cleaning up netns ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" iface="eth0" netns="/var/run/netns/cni-58a1c44b-0b8f-f9e7-668e-c03f0a044d53" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" iface="eth0" netns="/var/run/netns/cni-58a1c44b-0b8f-f9e7-668e-c03f0a044d53" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" iface="eth0" netns="/var/run/netns/cni-58a1c44b-0b8f-f9e7-668e-c03f0a044d53" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] k8s.go 592: Releasing IP address(es) ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.596 [INFO][3532] utils.go 188: Calico CNI releasing IP address ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.615 [INFO][3539] ipam_plugin.go 415: Releasing address using handleID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.615 [INFO][3539] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.615 [INFO][3539] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.661 [WARNING][3539] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.661 [INFO][3539] ipam_plugin.go 443: Releasing address using workloadID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.662 [INFO][3539] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:11.666608 env[1168]: 2024-04-12 18:44:11.664 [INFO][3532] k8s.go 598: Teardown processing complete. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:11.667478 env[1168]: time="2024-04-12T18:44:11.667436434Z" level=info msg="TearDown network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" successfully" Apr 12 18:44:11.667579 env[1168]: time="2024-04-12T18:44:11.667555803Z" level=info msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" returns successfully" Apr 12 18:44:11.669593 systemd[1]: run-netns-cni\x2d58a1c44b\x2d0b8f\x2df9e7\x2d668e\x2dc03f0a044d53.mount: Deactivated successfully. Apr 12 18:44:11.671109 env[1168]: time="2024-04-12T18:44:11.671065052Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8f7cd74-88bhj,Uid:0940ea5e-9c1a-4cf8-b5d5-edd646ede038,Namespace:calico-system,Attempt:1,}" Apr 12 18:44:11.759422 systemd-networkd[1070]: vxlan.calico: Gained IPv6LL Apr 12 18:44:12.484821 env[1168]: time="2024-04-12T18:44:12.484776919Z" level=info msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" Apr 12 18:44:12.504797 systemd-networkd[1070]: calia0b9d7c79fc: Link UP Apr 12 18:44:12.507595 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:44:12.507677 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia0b9d7c79fc: link becomes ready Apr 12 18:44:12.507784 systemd-networkd[1070]: calia0b9d7c79fc: Gained carrier Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:11.927 [INFO][3549] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--hkzhm-eth0 csi-node-driver- calico-system 48a0ac37-b3e0-4094-b5d5-7ce7f37d562c 844 0 2024-04-12 18:43:38 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-hkzhm eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia0b9d7c79fc [] []}} ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:11.928 [INFO][3549] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:11.956 [INFO][3562] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" HandleID="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.232 [INFO][3562] ipam_plugin.go 268: Auto assigning IP ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" HandleID="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002618b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-hkzhm", "timestamp":"2024-04-12 18:44:11.956654582 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.300 [INFO][3562] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.300 [INFO][3562] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.300 [INFO][3562] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.467 [INFO][3562] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.472 [INFO][3562] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.475 [INFO][3562] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.477 [INFO][3562] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.479 [INFO][3562] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.479 [INFO][3562] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.480 [INFO][3562] ipam.go 1682: Creating new handle: k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.483 [INFO][3562] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.500 [INFO][3562] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.500 [INFO][3562] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" host="localhost" Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.500 [INFO][3562] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:12.563703 env[1168]: 2024-04-12 18:44:12.500 [INFO][3562] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" HandleID="k8s-pod-network.fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.502 [INFO][3549] k8s.go 385: Populated endpoint ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hkzhm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-hkzhm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia0b9d7c79fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.502 [INFO][3549] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.502 [INFO][3549] dataplane_linux.go 68: Setting the host side veth name to calia0b9d7c79fc ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.508 [INFO][3549] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.508 [INFO][3549] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hkzhm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c", Pod:"csi-node-driver-hkzhm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia0b9d7c79fc", MAC:"22:99:04:1c:6a:44", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:12.564509 env[1168]: 2024-04-12 18:44:12.562 [INFO][3549] k8s.go 498: Wrote updated endpoint to datastore ContainerID="fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c" Namespace="calico-system" Pod="csi-node-driver-hkzhm" WorkloadEndpoint="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:12.573000 audit[3624]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3624 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:12.573000 audit[3624]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffe7378b060 a2=0 a3=7ffe7378b04c items=0 ppid=3303 pid=3624 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.573000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:12.604960 env[1168]: time="2024-04-12T18:44:12.604885249Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:12.604960 env[1168]: time="2024-04-12T18:44:12.604958179Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:12.605132 env[1168]: time="2024-04-12T18:44:12.604981324Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:12.605157 env[1168]: time="2024-04-12T18:44:12.605125610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c pid=3632 runtime=io.containerd.runc.v2 Apr 12 18:44:12.615090 systemd[1]: Started cri-containerd-fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c.scope. Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit: BPF prog-id=146 op=LOAD Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3632 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316265346636386232313136313461636634653163643932313534 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3632 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316265346636386232313136313461636634653163643932313534 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit: BPF prog-id=147 op=LOAD Apr 12 18:44:12.631000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c0003ca9d0 items=0 ppid=3632 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316265346636386232313136313461636634653163643932313534 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.631000 audit: BPF prog-id=148 op=LOAD Apr 12 18:44:12.631000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c0003caa18 items=0 ppid=3632 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.631000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316265346636386232313136313461636634653163643932313534 Apr 12 18:44:12.632000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:44:12.632000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { perfmon } for pid=3641 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit[3641]: AVC avc: denied { bpf } for pid=3641 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.632000 audit: BPF prog-id=149 op=LOAD Apr 12 18:44:12.632000 audit[3641]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c0003cae28 items=0 ppid=3632 pid=3641 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.632000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665316265346636386232313136313461636634653163643932313534 Apr 12 18:44:12.636202 systemd-resolved[1106]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:12.654011 env[1168]: time="2024-04-12T18:44:12.653959351Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-hkzhm,Uid:48a0ac37-b3e0-4094-b5d5-7ce7f37d562c,Namespace:calico-system,Attempt:1,} returns sandbox id \"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c\"" Apr 12 18:44:12.655710 env[1168]: time="2024-04-12T18:44:12.655684632Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.625 [INFO][3593] k8s.go 585: Cleaning up netns ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.625 [INFO][3593] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" iface="eth0" netns="/var/run/netns/cni-ec56700b-8e4f-456f-1cde-e60617f62b16" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.625 [INFO][3593] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" iface="eth0" netns="/var/run/netns/cni-ec56700b-8e4f-456f-1cde-e60617f62b16" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.626 [INFO][3593] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" iface="eth0" netns="/var/run/netns/cni-ec56700b-8e4f-456f-1cde-e60617f62b16" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.626 [INFO][3593] k8s.go 592: Releasing IP address(es) ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.626 [INFO][3593] utils.go 188: Calico CNI releasing IP address ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.664 [INFO][3660] ipam_plugin.go 415: Releasing address using handleID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.665 [INFO][3660] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.665 [INFO][3660] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.672 [WARNING][3660] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.672 [INFO][3660] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.674 [INFO][3660] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:12.676372 env[1168]: 2024-04-12 18:44:12.675 [INFO][3593] k8s.go 598: Teardown processing complete. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:12.677027 env[1168]: time="2024-04-12T18:44:12.676991534Z" level=info msg="TearDown network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" successfully" Apr 12 18:44:12.677127 env[1168]: time="2024-04-12T18:44:12.677098350Z" level=info msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" returns successfully" Apr 12 18:44:12.677704 kubelet[2062]: E0412 18:44:12.677647 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:12.678621 systemd[1]: run-netns-cni\x2dec56700b\x2d8e4f\x2d456f\x2d1cde\x2de60617f62b16.mount: Deactivated successfully. Apr 12 18:44:12.678831 env[1168]: time="2024-04-12T18:44:12.678749408Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xp5r2,Uid:06f292d4-e5f2-40ca-8722-8655edf4fd42,Namespace:kube-system,Attempt:1,}" Apr 12 18:44:12.789049 systemd-networkd[1070]: cali57d74336800: Link UP Apr 12 18:44:12.791472 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali57d74336800: link becomes ready Apr 12 18:44:12.791906 systemd-networkd[1070]: cali57d74336800: Gained carrier Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.619 [INFO][3586] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0 calico-kube-controllers-55f8f7cd74- calico-system 0940ea5e-9c1a-4cf8-b5d5-edd646ede038 849 0 2024-04-12 18:43:39 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:55f8f7cd74 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-55f8f7cd74-88bhj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali57d74336800 [] []}} ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.619 [INFO][3586] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.655 [INFO][3666] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" HandleID="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.675 [INFO][3666] ipam_plugin.go 268: Auto assigning IP ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" HandleID="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000121820), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-55f8f7cd74-88bhj", "timestamp":"2024-04-12 18:44:12.655098728 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.675 [INFO][3666] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.675 [INFO][3666] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.675 [INFO][3666] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.681 [INFO][3666] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.768 [INFO][3666] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.772 [INFO][3666] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.773 [INFO][3666] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.775 [INFO][3666] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.775 [INFO][3666] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.776 [INFO][3666] ipam.go 1682: Creating new handle: k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6 Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.779 [INFO][3666] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.785 [INFO][3666] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.785 [INFO][3666] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" host="localhost" Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.785 [INFO][3666] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:12.812442 env[1168]: 2024-04-12 18:44:12.785 [INFO][3666] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" HandleID="k8s-pod-network.6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.787 [INFO][3586] k8s.go 385: Populated endpoint ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0", GenerateName:"calico-kube-controllers-55f8f7cd74-", Namespace:"calico-system", SelfLink:"", UID:"0940ea5e-9c1a-4cf8-b5d5-edd646ede038", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8f7cd74", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-55f8f7cd74-88bhj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali57d74336800", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.787 [INFO][3586] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.787 [INFO][3586] dataplane_linux.go 68: Setting the host side veth name to cali57d74336800 ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.789 [INFO][3586] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.794 [INFO][3586] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0", GenerateName:"calico-kube-controllers-55f8f7cd74-", Namespace:"calico-system", SelfLink:"", UID:"0940ea5e-9c1a-4cf8-b5d5-edd646ede038", ResourceVersion:"849", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8f7cd74", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6", Pod:"calico-kube-controllers-55f8f7cd74-88bhj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali57d74336800", MAC:"f6:ef:35:c2:e9:18", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:12.813219 env[1168]: 2024-04-12 18:44:12.809 [INFO][3586] k8s.go 498: Wrote updated endpoint to datastore ContainerID="6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6" Namespace="calico-system" Pod="calico-kube-controllers-55f8f7cd74-88bhj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:12.820000 audit[3696]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3696 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:12.820000 audit[3696]: SYSCALL arch=c000003e syscall=46 success=yes exit=18640 a0=3 a1=7ffe3d18eb80 a2=0 a3=7ffe3d18eb6c items=0 ppid=3303 pid=3696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.820000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:12.838476 env[1168]: time="2024-04-12T18:44:12.838390599Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:12.838476 env[1168]: time="2024-04-12T18:44:12.838437939Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:12.838476 env[1168]: time="2024-04-12T18:44:12.838447939Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:12.838993 env[1168]: time="2024-04-12T18:44:12.838895337Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6 pid=3703 runtime=io.containerd.runc.v2 Apr 12 18:44:12.852191 systemd[1]: run-containerd-runc-k8s.io-6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6-runc.nurE3Q.mount: Deactivated successfully. Apr 12 18:44:12.854198 systemd[1]: Started cri-containerd-6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6.scope. Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.866000 audit: BPF prog-id=150 op=LOAD Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3703 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353339303562346466376138343039356331323664643439383133 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3703 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353339303562346466376138343039356331323664643439383133 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit: BPF prog-id=151 op=LOAD Apr 12 18:44:12.867000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0001a7520 items=0 ppid=3703 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353339303562346466376138343039356331323664643439383133 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit: BPF prog-id=152 op=LOAD Apr 12 18:44:12.867000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0001a7568 items=0 ppid=3703 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353339303562346466376138343039356331323664643439383133 Apr 12 18:44:12.867000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:44:12.867000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { perfmon } for pid=3712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit[3712]: AVC avc: denied { bpf } for pid=3712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:12.867000 audit: BPF prog-id=153 op=LOAD Apr 12 18:44:12.867000 audit[3712]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0001a7978 items=0 ppid=3703 pid=3712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:12.867000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665353339303562346466376138343039356331323664643439383133 Apr 12 18:44:12.869215 systemd-resolved[1106]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:12.891162 env[1168]: time="2024-04-12T18:44:12.891008903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-55f8f7cd74-88bhj,Uid:0940ea5e-9c1a-4cf8-b5d5-edd646ede038,Namespace:calico-system,Attempt:1,} returns sandbox id \"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6\"" Apr 12 18:44:13.110365 systemd-networkd[1070]: cali8f697fd2151: Link UP Apr 12 18:44:13.113350 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8f697fd2151: link becomes ready Apr 12 18:44:13.114443 systemd-networkd[1070]: cali8f697fd2151: Gained carrier Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:12.975 [INFO][3738] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--xp5r2-eth0 coredns-5dd5756b68- kube-system 06f292d4-e5f2-40ca-8722-8655edf4fd42 858 0 2024-04-12 18:43:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-xp5r2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8f697fd2151 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:12.975 [INFO][3738] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:12.999 [INFO][3751] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" HandleID="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.009 [INFO][3751] ipam_plugin.go 268: Auto assigning IP ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" HandleID="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad5b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-xp5r2", "timestamp":"2024-04-12 18:44:12.99952753 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.009 [INFO][3751] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.009 [INFO][3751] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.009 [INFO][3751] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.011 [INFO][3751] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.060 [INFO][3751] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.063 [INFO][3751] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.065 [INFO][3751] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.067 [INFO][3751] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.067 [INFO][3751] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.068 [INFO][3751] ipam.go 1682: Creating new handle: k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.071 [INFO][3751] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.107 [INFO][3751] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.107 [INFO][3751] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" host="localhost" Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.107 [INFO][3751] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:13.254167 env[1168]: 2024-04-12 18:44:13.107 [INFO][3751] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" HandleID="k8s-pod-network.eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.108 [INFO][3738] k8s.go 385: Populated endpoint ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--xp5r2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06f292d4-e5f2-40ca-8722-8655edf4fd42", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-xp5r2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f697fd2151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.109 [INFO][3738] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.109 [INFO][3738] dataplane_linux.go 68: Setting the host side veth name to cali8f697fd2151 ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.110 [INFO][3738] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.112 [INFO][3738] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--xp5r2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06f292d4-e5f2-40ca-8722-8655edf4fd42", ResourceVersion:"858", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c", Pod:"coredns-5dd5756b68-xp5r2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f697fd2151", MAC:"9e:6c:98:2e:9c:b6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:13.254787 env[1168]: 2024-04-12 18:44:13.252 [INFO][3738] k8s.go 498: Wrote updated endpoint to datastore ContainerID="eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c" Namespace="kube-system" Pod="coredns-5dd5756b68-xp5r2" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:13.272000 audit[3773]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3773 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:13.272000 audit[3773]: SYSCALL arch=c000003e syscall=46 success=yes exit=22780 a0=3 a1=7ffef1c30e80 a2=0 a3=7ffef1c30e6c items=0 ppid=3303 pid=3773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.272000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:13.364115 env[1168]: time="2024-04-12T18:44:13.363945924Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:13.364115 env[1168]: time="2024-04-12T18:44:13.363981623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:13.364115 env[1168]: time="2024-04-12T18:44:13.363991752Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:13.364376 env[1168]: time="2024-04-12T18:44:13.364240700Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c pid=3781 runtime=io.containerd.runc.v2 Apr 12 18:44:13.374875 systemd[1]: Started cri-containerd-eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c.scope. Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.388000 audit: BPF prog-id=154 op=LOAD Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3781 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613734333264313066343161323832356336313766633637346233 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3781 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613734333264313066343161323832356336313766633637346233 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit: BPF prog-id=155 op=LOAD Apr 12 18:44:13.389000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000334460 items=0 ppid=3781 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613734333264313066343161323832356336313766633637346233 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit: BPF prog-id=156 op=LOAD Apr 12 18:44:13.389000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003344a8 items=0 ppid=3781 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613734333264313066343161323832356336313766633637346233 Apr 12 18:44:13.389000 audit: BPF prog-id=156 op=UNLOAD Apr 12 18:44:13.389000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { perfmon } for pid=3791 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit[3791]: AVC avc: denied { bpf } for pid=3791 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.389000 audit: BPF prog-id=157 op=LOAD Apr 12 18:44:13.389000 audit[3791]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003348b8 items=0 ppid=3781 pid=3791 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.389000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561613734333264313066343161323832356336313766633637346233 Apr 12 18:44:13.390850 systemd-resolved[1106]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:13.410725 env[1168]: time="2024-04-12T18:44:13.410662197Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xp5r2,Uid:06f292d4-e5f2-40ca-8722-8655edf4fd42,Namespace:kube-system,Attempt:1,} returns sandbox id \"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c\"" Apr 12 18:44:13.412076 kubelet[2062]: E0412 18:44:13.411468 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:13.414793 env[1168]: time="2024-04-12T18:44:13.414752673Z" level=info msg="CreateContainer within sandbox \"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:44:13.485232 env[1168]: time="2024-04-12T18:44:13.485179373Z" level=info msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" Apr 12 18:44:13.586402 env[1168]: time="2024-04-12T18:44:13.586341303Z" level=info msg="CreateContainer within sandbox \"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4c1942032e7ce2b79e39f910f04380af05bf12b1cd72948478627f38f1ea4956\"" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.540 [INFO][3831] k8s.go 585: Cleaning up netns ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.540 [INFO][3831] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" iface="eth0" netns="/var/run/netns/cni-5935f956-fb71-5d9b-a953-b9f456921cb3" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.541 [INFO][3831] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" iface="eth0" netns="/var/run/netns/cni-5935f956-fb71-5d9b-a953-b9f456921cb3" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.541 [INFO][3831] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" iface="eth0" netns="/var/run/netns/cni-5935f956-fb71-5d9b-a953-b9f456921cb3" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.541 [INFO][3831] k8s.go 592: Releasing IP address(es) ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.541 [INFO][3831] utils.go 188: Calico CNI releasing IP address ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.561 [INFO][3839] ipam_plugin.go 415: Releasing address using handleID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.561 [INFO][3839] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.561 [INFO][3839] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.583 [WARNING][3839] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.583 [INFO][3839] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.586 [INFO][3839] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:13.599327 env[1168]: 2024-04-12 18:44:13.587 [INFO][3831] k8s.go 598: Teardown processing complete. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:13.599327 env[1168]: time="2024-04-12T18:44:13.589091559Z" level=info msg="TearDown network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" successfully" Apr 12 18:44:13.599327 env[1168]: time="2024-04-12T18:44:13.589111998Z" level=info msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" returns successfully" Apr 12 18:44:13.599327 env[1168]: time="2024-04-12T18:44:13.593204437Z" level=info msg="StartContainer for \"4c1942032e7ce2b79e39f910f04380af05bf12b1cd72948478627f38f1ea4956\"" Apr 12 18:44:13.599327 env[1168]: time="2024-04-12T18:44:13.594070739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gxrpl,Uid:5cdd6bce-2467-4dd1-ba02-13a31e4457f1,Namespace:kube-system,Attempt:1,}" Apr 12 18:44:13.599990 kubelet[2062]: E0412 18:44:13.592510 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:13.641885 systemd[1]: Started cri-containerd-4c1942032e7ce2b79e39f910f04380af05bf12b1cd72948478627f38f1ea4956.scope. Apr 12 18:44:13.673138 systemd[1]: run-netns-cni\x2d5935f956\x2dfb71\x2d5d9b\x2da953\x2db9f456921cb3.mount: Deactivated successfully. Apr 12 18:44:13.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit: BPF prog-id=158 op=LOAD Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3781 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313934323033326537636532623739653339663931306630343338 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3781 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313934323033326537636532623739653339663931306630343338 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit: BPF prog-id=159 op=LOAD Apr 12 18:44:13.678000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000334ae0 items=0 ppid=3781 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313934323033326537636532623739653339663931306630343338 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.678000 audit: BPF prog-id=160 op=LOAD Apr 12 18:44:13.678000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000334b28 items=0 ppid=3781 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313934323033326537636532623739653339663931306630343338 Apr 12 18:44:13.679000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:44:13.679000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:13.679000 audit: BPF prog-id=161 op=LOAD Apr 12 18:44:13.679000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000334f38 items=0 ppid=3781 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463313934323033326537636532623739653339663931306630343338 Apr 12 18:44:13.762990 env[1168]: time="2024-04-12T18:44:13.762919294Z" level=info msg="StartContainer for \"4c1942032e7ce2b79e39f910f04380af05bf12b1cd72948478627f38f1ea4956\" returns successfully" Apr 12 18:44:13.772266 kubelet[2062]: E0412 18:44:13.772222 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:13.784424 kubelet[2062]: I0412 18:44:13.784390 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-xp5r2" podStartSLOduration=45.784355319 podCreationTimestamp="2024-04-12 18:43:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:44:13.78368841 +0000 UTC m=+56.384802890" watchObservedRunningTime="2024-04-12 18:44:13.784355319 +0000 UTC m=+56.385469799" Apr 12 18:44:13.808308 kernel: kauditd_printk_skb: 386 callbacks suppressed Apr 12 18:44:13.808432 kernel: audit: type=1325 audit(1712947453.804:1295): table=filter:104 family=2 entries=14 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.804000 audit[3879]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.804000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd9b963c30 a2=0 a3=7ffd9b963c1c items=0 ppid=2249 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.804000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.818407 kernel: audit: type=1300 audit(1712947453.804:1295): arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffd9b963c30 a2=0 a3=7ffd9b963c1c items=0 ppid=2249 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.818479 kernel: audit: type=1327 audit(1712947453.804:1295): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.810000 audit[3879]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.821781 kernel: audit: type=1325 audit(1712947453.810:1296): table=nat:105 family=2 entries=14 op=nft_register_rule pid=3879 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:13.821880 kernel: audit: type=1300 audit(1712947453.810:1296): arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd9b963c30 a2=0 a3=0 items=0 ppid=2249 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.810000 audit[3879]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd9b963c30 a2=0 a3=0 items=0 ppid=2249 pid=3879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.831079 kernel: audit: type=1327 audit(1712947453.810:1296): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.810000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:13.868045 systemd[1]: Started sshd@12-10.0.0.33:22-10.0.0.1:57952.service. Apr 12 18:44:13.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.33:22-10.0.0.1:57952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:13.874299 kernel: audit: type=1130 audit(1712947453.868:1297): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.33:22-10.0.0.1:57952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:13.904000 audit[3881]: USER_ACCT pid=3881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:13.904622 sshd[3881]: Accepted publickey for core from 10.0.0.1 port 57952 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:13.910299 kernel: audit: type=1101 audit(1712947453.904:1298): pid=3881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:13.910000 audit[3881]: CRED_ACQ pid=3881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:13.911721 sshd[3881]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:13.917453 kernel: audit: type=1103 audit(1712947453.910:1299): pid=3881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:13.917610 kernel: audit: type=1006 audit(1712947453.910:1300): pid=3881 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:44:13.910000 audit[3881]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc1560acd0 a2=3 a3=0 items=0 ppid=1 pid=3881 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:13.910000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:13.920022 systemd[1]: Started session-13.scope. Apr 12 18:44:13.920777 systemd-logind[1150]: New session 13 of user core. Apr 12 18:44:13.925000 audit[3881]: USER_START pid=3881 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:13.926000 audit[3900]: CRED_ACQ pid=3900 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.043963 systemd-networkd[1070]: cali9c59a7d9075: Link UP Apr 12 18:44:14.047425 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:44:14.047466 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9c59a7d9075: link becomes ready Apr 12 18:44:14.047067 systemd-networkd[1070]: cali9c59a7d9075: Gained carrier Apr 12 18:44:14.061296 sshd[3881]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:14.062000 audit[3881]: USER_END pid=3881 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.062000 audit[3881]: CRED_DISP pid=3881 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.064327 systemd[1]: sshd@12-10.0.0.33:22-10.0.0.1:57952.service: Deactivated successfully. Apr 12 18:44:14.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.33:22-10.0.0.1:57952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.064858 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:44:14.065380 systemd-logind[1150]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:44:14.066590 systemd[1]: Started sshd@13-10.0.0.33:22-10.0.0.1:57968.service. Apr 12 18:44:14.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.33:22-10.0.0.1:57968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.069950 systemd-logind[1150]: Removed session 13. Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.943 [INFO][3887] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--gxrpl-eth0 coredns-5dd5756b68- kube-system 5cdd6bce-2467-4dd1-ba02-13a31e4457f1 877 0 2024-04-12 18:43:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-gxrpl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9c59a7d9075 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.943 [INFO][3887] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.988 [INFO][3902] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" HandleID="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.997 [INFO][3902] ipam_plugin.go 268: Auto assigning IP ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" HandleID="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad8b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-gxrpl", "timestamp":"2024-04-12 18:44:13.988920931 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.997 [INFO][3902] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.997 [INFO][3902] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.997 [INFO][3902] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:13.999 [INFO][3902] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.014 [INFO][3902] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.021 [INFO][3902] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.022 [INFO][3902] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.028 [INFO][3902] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.028 [INFO][3902] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.029 [INFO][3902] ipam.go 1682: Creating new handle: k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5 Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.033 [INFO][3902] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.038 [INFO][3902] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.038 [INFO][3902] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" host="localhost" Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.038 [INFO][3902] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:14.073554 env[1168]: 2024-04-12 18:44:14.038 [INFO][3902] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" HandleID="k8s-pod-network.7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.040 [INFO][3887] k8s.go 385: Populated endpoint ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--gxrpl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5cdd6bce-2467-4dd1-ba02-13a31e4457f1", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-gxrpl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9c59a7d9075", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.040 [INFO][3887] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.040 [INFO][3887] dataplane_linux.go 68: Setting the host side veth name to cali9c59a7d9075 ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.047 [INFO][3887] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.049 [INFO][3887] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--gxrpl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5cdd6bce-2467-4dd1-ba02-13a31e4457f1", ResourceVersion:"877", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5", Pod:"coredns-5dd5756b68-gxrpl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9c59a7d9075", MAC:"be:6b:b1:a6:60:6f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:14.074083 env[1168]: 2024-04-12 18:44:14.072 [INFO][3887] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5" Namespace="kube-system" Pod="coredns-5dd5756b68-gxrpl" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:14.085000 audit[3935]: NETFILTER_CFG table=filter:106 family=2 entries=38 op=nft_register_chain pid=3935 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:44:14.085000 audit[3935]: SYSCALL arch=c000003e syscall=46 success=yes exit=19408 a0=3 a1=7ffff02c8170 a2=0 a3=7ffff02c815c items=0 ppid=3303 pid=3935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.085000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:44:14.097000 audit[3923]: USER_ACCT pid=3923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.098114 sshd[3923]: Accepted publickey for core from 10.0.0.1 port 57968 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:14.099000 audit[3923]: CRED_ACQ pid=3923 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.099000 audit[3923]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0f56ef90 a2=3 a3=0 items=0 ppid=1 pid=3923 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.099000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:14.099585 sshd[3923]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:14.103048 systemd-logind[1150]: New session 14 of user core. Apr 12 18:44:14.103951 systemd[1]: Started session-14.scope. Apr 12 18:44:14.108000 audit[3923]: USER_START pid=3923 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.109000 audit[3936]: CRED_ACQ pid=3936 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.121376 env[1168]: time="2024-04-12T18:44:14.121293639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:44:14.121376 env[1168]: time="2024-04-12T18:44:14.121340619Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:44:14.121376 env[1168]: time="2024-04-12T18:44:14.121352181Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:44:14.121718 env[1168]: time="2024-04-12T18:44:14.121672384Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5 pid=3944 runtime=io.containerd.runc.v2 Apr 12 18:44:14.126804 systemd-networkd[1070]: cali57d74336800: Gained IPv6LL Apr 12 18:44:14.138383 systemd[1]: Started cri-containerd-7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5.scope. Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.151000 audit: BPF prog-id=162 op=LOAD Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353039613461316431323432623635646365373030643133343537 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353039613461316431323432623635646365373030643133343537 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit: BPF prog-id=163 op=LOAD Apr 12 18:44:14.152000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0000243b0 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353039613461316431323432623635646365373030643133343537 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit: BPF prog-id=164 op=LOAD Apr 12 18:44:14.152000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0000243f8 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353039613461316431323432623635646365373030643133343537 Apr 12 18:44:14.152000 audit: BPF prog-id=164 op=UNLOAD Apr 12 18:44:14.152000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { perfmon } for pid=3954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit[3954]: AVC avc: denied { bpf } for pid=3954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:14.152000 audit: BPF prog-id=165 op=LOAD Apr 12 18:44:14.152000 audit[3954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000024808 items=0 ppid=3944 pid=3954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.152000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764353039613461316431323432623635646365373030643133343537 Apr 12 18:44:14.156194 systemd-resolved[1106]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:44:14.179141 env[1168]: time="2024-04-12T18:44:14.179085510Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-gxrpl,Uid:5cdd6bce-2467-4dd1-ba02-13a31e4457f1,Namespace:kube-system,Attempt:1,} returns sandbox id \"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5\"" Apr 12 18:44:14.179770 kubelet[2062]: E0412 18:44:14.179741 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:14.181369 env[1168]: time="2024-04-12T18:44:14.181325414Z" level=info msg="CreateContainer within sandbox \"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:44:14.318728 systemd-networkd[1070]: cali8f697fd2151: Gained IPv6LL Apr 12 18:44:14.446720 systemd-networkd[1070]: calia0b9d7c79fc: Gained IPv6LL Apr 12 18:44:14.515505 sshd[3923]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:14.516000 audit[3923]: USER_END pid=3923 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.516000 audit[3923]: CRED_DISP pid=3923 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.519864 systemd[1]: Started sshd@14-10.0.0.33:22-10.0.0.1:57980.service. Apr 12 18:44:14.519000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.33:22-10.0.0.1:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.520395 systemd[1]: sshd@13-10.0.0.33:22-10.0.0.1:57968.service: Deactivated successfully. Apr 12 18:44:14.520000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.33:22-10.0.0.1:57968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.521646 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:44:14.522362 systemd-logind[1150]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:44:14.523549 systemd-logind[1150]: Removed session 14. Apr 12 18:44:14.659000 audit[3993]: USER_ACCT pid=3993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.659630 sshd[3993]: Accepted publickey for core from 10.0.0.1 port 57980 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:14.659000 audit[3993]: CRED_ACQ pid=3993 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.660000 audit[3993]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc0347f8c0 a2=3 a3=0 items=0 ppid=1 pid=3993 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.660000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:14.660560 sshd[3993]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:14.664275 systemd-logind[1150]: New session 15 of user core. Apr 12 18:44:14.665145 systemd[1]: Started session-15.scope. Apr 12 18:44:14.670000 audit[3993]: USER_START pid=3993 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.672000 audit[3996]: CRED_ACQ pid=3996 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.775936 kubelet[2062]: E0412 18:44:14.775572 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:14.979921 sshd[3993]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:14.980000 audit[3993]: USER_END pid=3993 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.980000 audit[3993]: CRED_DISP pid=3993 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:14.982539 systemd[1]: sshd@14-10.0.0.33:22-10.0.0.1:57980.service: Deactivated successfully. Apr 12 18:44:14.982610 systemd-logind[1150]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:44:14.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.33:22-10.0.0.1:57980 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:14.983185 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:44:14.983966 systemd-logind[1150]: Removed session 15. Apr 12 18:44:14.985000 audit[4007]: NETFILTER_CFG table=filter:107 family=2 entries=11 op=nft_register_rule pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:14.985000 audit[4007]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff0eec77d0 a2=0 a3=7fff0eec77bc items=0 ppid=2249 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.985000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:14.987111 env[1168]: time="2024-04-12T18:44:14.987063273Z" level=info msg="CreateContainer within sandbox \"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"60d4d8c05248392960607ecb62e298ed7d8b33aa7f099a65c1ac289fe9be3f6b\"" Apr 12 18:44:14.987749 env[1168]: time="2024-04-12T18:44:14.987701937Z" level=info msg="StartContainer for \"60d4d8c05248392960607ecb62e298ed7d8b33aa7f099a65c1ac289fe9be3f6b\"" Apr 12 18:44:14.986000 audit[4007]: NETFILTER_CFG table=nat:108 family=2 entries=35 op=nft_register_chain pid=4007 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:14.986000 audit[4007]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff0eec77d0 a2=0 a3=7fff0eec77bc items=0 ppid=2249 pid=4007 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:14.986000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.007235 systemd[1]: Started cri-containerd-60d4d8c05248392960607ecb62e298ed7d8b33aa7f099a65c1ac289fe9be3f6b.scope. Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit: BPF prog-id=166 op=LOAD Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3944 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643464386330353234383339323936303630376563623632653239 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3944 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643464386330353234383339323936303630376563623632653239 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.016000 audit: BPF prog-id=167 op=LOAD Apr 12 18:44:15.016000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003865c0 items=0 ppid=3944 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643464386330353234383339323936303630376563623632653239 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit: BPF prog-id=168 op=LOAD Apr 12 18:44:15.017000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000386608 items=0 ppid=3944 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643464386330353234383339323936303630376563623632653239 Apr 12 18:44:15.017000 audit: BPF prog-id=168 op=UNLOAD Apr 12 18:44:15.017000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { perfmon } for pid=4016 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit[4016]: AVC avc: denied { bpf } for pid=4016 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:15.017000 audit: BPF prog-id=169 op=LOAD Apr 12 18:44:15.017000 audit[4016]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000386a18 items=0 ppid=3944 pid=4016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.017000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630643464386330353234383339323936303630376563623632653239 Apr 12 18:44:15.114973 env[1168]: time="2024-04-12T18:44:15.114742226Z" level=info msg="StartContainer for \"60d4d8c05248392960607ecb62e298ed7d8b33aa7f099a65c1ac289fe9be3f6b\" returns successfully" Apr 12 18:44:15.598505 systemd-networkd[1070]: cali9c59a7d9075: Gained IPv6LL Apr 12 18:44:15.773453 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1783236084.mount: Deactivated successfully. Apr 12 18:44:15.780151 kubelet[2062]: E0412 18:44:15.780114 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:15.780639 kubelet[2062]: E0412 18:44:15.780284 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:15.790595 kubelet[2062]: I0412 18:44:15.790284 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-gxrpl" podStartSLOduration=47.790206148 podCreationTimestamp="2024-04-12 18:43:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:44:15.790098001 +0000 UTC m=+58.391212481" watchObservedRunningTime="2024-04-12 18:44:15.790206148 +0000 UTC m=+58.391320618" Apr 12 18:44:15.799000 audit[4050]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=4050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.799000 audit[4050]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7fff865be8d0 a2=0 a3=7fff865be8bc items=0 ppid=2249 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.799000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:15.800000 audit[4050]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=4050 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:15.800000 audit[4050]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff865be8d0 a2=0 a3=7fff865be8bc items=0 ppid=2249 pid=4050 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:15.800000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.147762 env[1168]: time="2024-04-12T18:44:16.147710895Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:16.149466 env[1168]: time="2024-04-12T18:44:16.149439776Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:16.152190 env[1168]: time="2024-04-12T18:44:16.151324574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:16.152592 env[1168]: time="2024-04-12T18:44:16.152542757Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:16.153063 env[1168]: time="2024-04-12T18:44:16.153029770Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:44:16.154071 env[1168]: time="2024-04-12T18:44:16.154053610Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:44:16.155232 env[1168]: time="2024-04-12T18:44:16.155204363Z" level=info msg="CreateContainer within sandbox \"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:44:16.170847 env[1168]: time="2024-04-12T18:44:16.170786690Z" level=info msg="CreateContainer within sandbox \"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ae74b552d538c91ae916074516f71ef81edf0813a398d8b261ac650f000458fd\"" Apr 12 18:44:16.171350 env[1168]: time="2024-04-12T18:44:16.171328868Z" level=info msg="StartContainer for \"ae74b552d538c91ae916074516f71ef81edf0813a398d8b261ac650f000458fd\"" Apr 12 18:44:16.187744 systemd[1]: Started cri-containerd-ae74b552d538c91ae916074516f71ef81edf0813a398d8b261ac650f000458fd.scope. Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f148da64138 items=0 ppid=3632 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373462353532643533386339316165393136303734353136663731 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit: BPF prog-id=170 op=LOAD Apr 12 18:44:16.205000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000183038 items=0 ppid=3632 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373462353532643533386339316165393136303734353136663731 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.205000 audit: BPF prog-id=171 op=LOAD Apr 12 18:44:16.205000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000183088 items=0 ppid=3632 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373462353532643533386339316165393136303734353136663731 Apr 12 18:44:16.206000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:44:16.206000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { perfmon } for pid=4060 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit[4060]: AVC avc: denied { bpf } for pid=4060 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:16.206000 audit: BPF prog-id=172 op=LOAD Apr 12 18:44:16.206000 audit[4060]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000183118 items=0 ppid=3632 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.206000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165373462353532643533386339316165393136303734353136663731 Apr 12 18:44:16.220697 env[1168]: time="2024-04-12T18:44:16.220643714Z" level=info msg="StartContainer for \"ae74b552d538c91ae916074516f71ef81edf0813a398d8b261ac650f000458fd\" returns successfully" Apr 12 18:44:16.337000 audit[4089]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=4089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.337000 audit[4089]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc702daec0 a2=0 a3=7ffc702daeac items=0 ppid=2249 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.337000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.345000 audit[4089]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=4089 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:16.345000 audit[4089]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffc702daec0 a2=0 a3=7ffc702daeac items=0 ppid=2249 pid=4089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:16.345000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:16.783906 kubelet[2062]: E0412 18:44:16.783865 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:17.473536 env[1168]: time="2024-04-12T18:44:17.473492032Z" level=info msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.506 [WARNING][4106] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--gxrpl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5cdd6bce-2467-4dd1-ba02-13a31e4457f1", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5", Pod:"coredns-5dd5756b68-gxrpl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9c59a7d9075", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.506 [INFO][4106] k8s.go 585: Cleaning up netns ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.506 [INFO][4106] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" iface="eth0" netns="" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.506 [INFO][4106] k8s.go 592: Releasing IP address(es) ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.506 [INFO][4106] utils.go 188: Calico CNI releasing IP address ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.525 [INFO][4115] ipam_plugin.go 415: Releasing address using handleID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.526 [INFO][4115] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.526 [INFO][4115] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.532 [WARNING][4115] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.532 [INFO][4115] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.534 [INFO][4115] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.536389 env[1168]: 2024-04-12 18:44:17.535 [INFO][4106] k8s.go 598: Teardown processing complete. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.536935 env[1168]: time="2024-04-12T18:44:17.536407957Z" level=info msg="TearDown network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" successfully" Apr 12 18:44:17.536935 env[1168]: time="2024-04-12T18:44:17.536434298Z" level=info msg="StopPodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" returns successfully" Apr 12 18:44:17.536935 env[1168]: time="2024-04-12T18:44:17.536884228Z" level=info msg="RemovePodSandbox for \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" Apr 12 18:44:17.537009 env[1168]: time="2024-04-12T18:44:17.536916099Z" level=info msg="Forcibly stopping sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\"" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.564 [WARNING][4138] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--gxrpl-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"5cdd6bce-2467-4dd1-ba02-13a31e4457f1", ResourceVersion:"930", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7d509a4a1d1242b65dce700d134578c92f12022e7868d7a87c66f3deeacba6d5", Pod:"coredns-5dd5756b68-gxrpl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9c59a7d9075", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.565 [INFO][4138] k8s.go 585: Cleaning up netns ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.565 [INFO][4138] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" iface="eth0" netns="" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.565 [INFO][4138] k8s.go 592: Releasing IP address(es) ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.565 [INFO][4138] utils.go 188: Calico CNI releasing IP address ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.585 [INFO][4145] ipam_plugin.go 415: Releasing address using handleID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.585 [INFO][4145] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.585 [INFO][4145] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.590 [WARNING][4145] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.590 [INFO][4145] ipam_plugin.go 443: Releasing address using workloadID ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" HandleID="k8s-pod-network.55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Workload="localhost-k8s-coredns--5dd5756b68--gxrpl-eth0" Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.591 [INFO][4145] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.594211 env[1168]: 2024-04-12 18:44:17.593 [INFO][4138] k8s.go 598: Teardown processing complete. ContainerID="55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27" Apr 12 18:44:17.594733 env[1168]: time="2024-04-12T18:44:17.594293034Z" level=info msg="TearDown network for sandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" successfully" Apr 12 18:44:17.598769 env[1168]: time="2024-04-12T18:44:17.598737148Z" level=info msg="RemovePodSandbox \"55c80c9b56a629a7f66f4230b602e10bd019b9e9c37c868119b0ba6ee71cac27\" returns successfully" Apr 12 18:44:17.599333 env[1168]: time="2024-04-12T18:44:17.599306148Z" level=info msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.626 [WARNING][4168] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0", GenerateName:"calico-kube-controllers-55f8f7cd74-", Namespace:"calico-system", SelfLink:"", UID:"0940ea5e-9c1a-4cf8-b5d5-edd646ede038", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8f7cd74", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6", Pod:"calico-kube-controllers-55f8f7cd74-88bhj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali57d74336800", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.626 [INFO][4168] k8s.go 585: Cleaning up netns ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.626 [INFO][4168] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" iface="eth0" netns="" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.627 [INFO][4168] k8s.go 592: Releasing IP address(es) ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.627 [INFO][4168] utils.go 188: Calico CNI releasing IP address ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.655 [INFO][4175] ipam_plugin.go 415: Releasing address using handleID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.655 [INFO][4175] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.655 [INFO][4175] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.660 [WARNING][4175] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.660 [INFO][4175] ipam_plugin.go 443: Releasing address using workloadID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.662 [INFO][4175] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.664749 env[1168]: 2024-04-12 18:44:17.663 [INFO][4168] k8s.go 598: Teardown processing complete. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.665203 env[1168]: time="2024-04-12T18:44:17.664777312Z" level=info msg="TearDown network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" successfully" Apr 12 18:44:17.665203 env[1168]: time="2024-04-12T18:44:17.664809664Z" level=info msg="StopPodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" returns successfully" Apr 12 18:44:17.665376 env[1168]: time="2024-04-12T18:44:17.665345630Z" level=info msg="RemovePodSandbox for \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" Apr 12 18:44:17.665436 env[1168]: time="2024-04-12T18:44:17.665385897Z" level=info msg="Forcibly stopping sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\"" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.696 [WARNING][4197] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0", GenerateName:"calico-kube-controllers-55f8f7cd74-", Namespace:"calico-system", SelfLink:"", UID:"0940ea5e-9c1a-4cf8-b5d5-edd646ede038", ResourceVersion:"863", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 39, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"55f8f7cd74", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6", Pod:"calico-kube-controllers-55f8f7cd74-88bhj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali57d74336800", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.696 [INFO][4197] k8s.go 585: Cleaning up netns ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.696 [INFO][4197] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" iface="eth0" netns="" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.696 [INFO][4197] k8s.go 592: Releasing IP address(es) ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.696 [INFO][4197] utils.go 188: Calico CNI releasing IP address ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.713 [INFO][4205] ipam_plugin.go 415: Releasing address using handleID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.714 [INFO][4205] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.714 [INFO][4205] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.720 [WARNING][4205] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.720 [INFO][4205] ipam_plugin.go 443: Releasing address using workloadID ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" HandleID="k8s-pod-network.194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Workload="localhost-k8s-calico--kube--controllers--55f8f7cd74--88bhj-eth0" Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.721 [INFO][4205] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.724475 env[1168]: 2024-04-12 18:44:17.722 [INFO][4197] k8s.go 598: Teardown processing complete. ContainerID="194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67" Apr 12 18:44:17.724475 env[1168]: time="2024-04-12T18:44:17.724387631Z" level=info msg="TearDown network for sandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" successfully" Apr 12 18:44:17.728363 env[1168]: time="2024-04-12T18:44:17.728333752Z" level=info msg="RemovePodSandbox \"194afc5a779d70a3d783aeca363a57d55fd07f2b05c16286df69ba4fd7b29a67\" returns successfully" Apr 12 18:44:17.728996 env[1168]: time="2024-04-12T18:44:17.728943299Z" level=info msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" Apr 12 18:44:17.786924 kubelet[2062]: E0412 18:44:17.786830 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.769 [WARNING][4227] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hkzhm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c", Pod:"csi-node-driver-hkzhm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia0b9d7c79fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.769 [INFO][4227] k8s.go 585: Cleaning up netns ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.769 [INFO][4227] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" iface="eth0" netns="" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.769 [INFO][4227] k8s.go 592: Releasing IP address(es) ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.769 [INFO][4227] utils.go 188: Calico CNI releasing IP address ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.786 [INFO][4234] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.786 [INFO][4234] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.786 [INFO][4234] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.793 [WARNING][4234] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.793 [INFO][4234] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.794 [INFO][4234] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.797287 env[1168]: 2024-04-12 18:44:17.796 [INFO][4227] k8s.go 598: Teardown processing complete. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.797755 env[1168]: time="2024-04-12T18:44:17.797335614Z" level=info msg="TearDown network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" successfully" Apr 12 18:44:17.797755 env[1168]: time="2024-04-12T18:44:17.797366513Z" level=info msg="StopPodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" returns successfully" Apr 12 18:44:17.797969 env[1168]: time="2024-04-12T18:44:17.797945892Z" level=info msg="RemovePodSandbox for \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" Apr 12 18:44:17.798100 env[1168]: time="2024-04-12T18:44:17.798042447Z" level=info msg="Forcibly stopping sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\"" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.828 [WARNING][4259] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--hkzhm-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"48a0ac37-b3e0-4094-b5d5-7ce7f37d562c", ResourceVersion:"855", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 38, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c", Pod:"csi-node-driver-hkzhm", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia0b9d7c79fc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.829 [INFO][4259] k8s.go 585: Cleaning up netns ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.829 [INFO][4259] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" iface="eth0" netns="" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.829 [INFO][4259] k8s.go 592: Releasing IP address(es) ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.829 [INFO][4259] utils.go 188: Calico CNI releasing IP address ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.848 [INFO][4267] ipam_plugin.go 415: Releasing address using handleID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.848 [INFO][4267] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.848 [INFO][4267] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.854 [WARNING][4267] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.854 [INFO][4267] ipam_plugin.go 443: Releasing address using workloadID ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" HandleID="k8s-pod-network.8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Workload="localhost-k8s-csi--node--driver--hkzhm-eth0" Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.855 [INFO][4267] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.859287 env[1168]: 2024-04-12 18:44:17.858 [INFO][4259] k8s.go 598: Teardown processing complete. ContainerID="8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d" Apr 12 18:44:17.859868 env[1168]: time="2024-04-12T18:44:17.859309236Z" level=info msg="TearDown network for sandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" successfully" Apr 12 18:44:17.871231 env[1168]: time="2024-04-12T18:44:17.871173080Z" level=info msg="RemovePodSandbox \"8b5ada97dc291af62d36326387844d8df4ae00b7f2d613555a9b0d534342cf2d\" returns successfully" Apr 12 18:44:17.871861 env[1168]: time="2024-04-12T18:44:17.871814527Z" level=info msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.905 [WARNING][4289] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--xp5r2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06f292d4-e5f2-40ca-8722-8655edf4fd42", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c", Pod:"coredns-5dd5756b68-xp5r2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f697fd2151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.905 [INFO][4289] k8s.go 585: Cleaning up netns ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.905 [INFO][4289] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" iface="eth0" netns="" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.905 [INFO][4289] k8s.go 592: Releasing IP address(es) ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.905 [INFO][4289] utils.go 188: Calico CNI releasing IP address ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.924 [INFO][4297] ipam_plugin.go 415: Releasing address using handleID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.924 [INFO][4297] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.924 [INFO][4297] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.930 [WARNING][4297] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.930 [INFO][4297] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.932 [INFO][4297] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:17.935071 env[1168]: 2024-04-12 18:44:17.933 [INFO][4289] k8s.go 598: Teardown processing complete. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:17.935784 env[1168]: time="2024-04-12T18:44:17.935093366Z" level=info msg="TearDown network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" successfully" Apr 12 18:44:17.935784 env[1168]: time="2024-04-12T18:44:17.935127892Z" level=info msg="StopPodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" returns successfully" Apr 12 18:44:17.936089 env[1168]: time="2024-04-12T18:44:17.936037553Z" level=info msg="RemovePodSandbox for \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" Apr 12 18:44:17.936247 env[1168]: time="2024-04-12T18:44:17.936093060Z" level=info msg="Forcibly stopping sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\"" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.970 [WARNING][4320] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--xp5r2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"06f292d4-e5f2-40ca-8722-8655edf4fd42", ResourceVersion:"908", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 43, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"eaa7432d10f41a2825c617fc674b36c9face7d1090e2adc72ef4faf8b922311c", Pod:"coredns-5dd5756b68-xp5r2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8f697fd2151", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.970 [INFO][4320] k8s.go 585: Cleaning up netns ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.971 [INFO][4320] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" iface="eth0" netns="" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.971 [INFO][4320] k8s.go 592: Releasing IP address(es) ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.971 [INFO][4320] utils.go 188: Calico CNI releasing IP address ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.994 [INFO][4327] ipam_plugin.go 415: Releasing address using handleID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.994 [INFO][4327] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:17.994 [INFO][4327] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:18.002 [WARNING][4327] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:18.002 [INFO][4327] ipam_plugin.go 443: Releasing address using workloadID ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" HandleID="k8s-pod-network.764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Workload="localhost-k8s-coredns--5dd5756b68--xp5r2-eth0" Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:18.003 [INFO][4327] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:44:18.007083 env[1168]: 2024-04-12 18:44:18.005 [INFO][4320] k8s.go 598: Teardown processing complete. ContainerID="764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781" Apr 12 18:44:18.007880 env[1168]: time="2024-04-12T18:44:18.007155036Z" level=info msg="TearDown network for sandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" successfully" Apr 12 18:44:18.012992 env[1168]: time="2024-04-12T18:44:18.012952495Z" level=info msg="RemovePodSandbox \"764b5e249ada90376f407643c8de249b1d35dfaa2c45b4e781a3e98f0eab5781\" returns successfully" Apr 12 18:44:19.198279 env[1168]: time="2024-04-12T18:44:19.198193754Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:19.203289 env[1168]: time="2024-04-12T18:44:19.200564556Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:19.203289 env[1168]: time="2024-04-12T18:44:19.202852560Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:19.204578 env[1168]: time="2024-04-12T18:44:19.204549274Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:19.207996 env[1168]: time="2024-04-12T18:44:19.207922843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:44:19.208833 env[1168]: time="2024-04-12T18:44:19.208781836Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:44:19.216952 env[1168]: time="2024-04-12T18:44:19.215781097Z" level=info msg="CreateContainer within sandbox \"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:44:19.228341 env[1168]: time="2024-04-12T18:44:19.228269332Z" level=info msg="CreateContainer within sandbox \"6e53905b4df7a84095c126dd4981327a8170c27a095246df59ea15dc9b36e2f6\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"86d70f1584ca307aeef94c88ec1a903063f987ec56a02893607678b2720ce9ea\"" Apr 12 18:44:19.228823 env[1168]: time="2024-04-12T18:44:19.228799125Z" level=info msg="StartContainer for \"86d70f1584ca307aeef94c88ec1a903063f987ec56a02893607678b2720ce9ea\"" Apr 12 18:44:19.243882 systemd[1]: Started cri-containerd-86d70f1584ca307aeef94c88ec1a903063f987ec56a02893607678b2720ce9ea.scope. Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.259084 kernel: kauditd_printk_skb: 207 callbacks suppressed Apr 12 18:44:19.259382 kernel: audit: type=1400 audit(1712947459.257:1373): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.265728 kernel: audit: type=1400 audit(1712947459.257:1374): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.265795 kernel: audit: type=1400 audit(1712947459.257:1375): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.271786 kernel: audit: type=1400 audit(1712947459.257:1376): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.271858 kernel: audit: type=1400 audit(1712947459.257:1377): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.277967 kernel: audit: type=1400 audit(1712947459.257:1378): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.281193 kernel: audit: type=1400 audit(1712947459.257:1379): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.257000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.287726 kernel: audit: type=1400 audit(1712947459.257:1380): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.287800 kernel: audit: type=1400 audit(1712947459.257:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.287832 kernel: audit: type=1400 audit(1712947459.262:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit: BPF prog-id=173 op=LOAD Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3703 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643730663135383463613330376165656639346338386563316139 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=3703 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643730663135383463613330376165656639346338386563316139 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.262000 audit: BPF prog-id=174 op=LOAD Apr 12 18:44:19.262000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000024c40 items=0 ppid=3703 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.262000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643730663135383463613330376165656639346338386563316139 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.268000 audit: BPF prog-id=175 op=LOAD Apr 12 18:44:19.268000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000024c88 items=0 ppid=3703 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643730663135383463613330376165656639346338386563316139 Apr 12 18:44:19.274000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:44:19.274000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { perfmon } for pid=4346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit[4346]: AVC avc: denied { bpf } for pid=4346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:19.274000 audit: BPF prog-id=176 op=LOAD Apr 12 18:44:19.274000 audit[4346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000025098 items=0 ppid=3703 pid=4346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:19.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3836643730663135383463613330376165656639346338386563316139 Apr 12 18:44:19.317479 env[1168]: time="2024-04-12T18:44:19.317398789Z" level=info msg="StartContainer for \"86d70f1584ca307aeef94c88ec1a903063f987ec56a02893607678b2720ce9ea\" returns successfully" Apr 12 18:44:19.801976 kubelet[2062]: I0412 18:44:19.801941 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-55f8f7cd74-88bhj" podStartSLOduration=34.485736816 podCreationTimestamp="2024-04-12 18:43:39 +0000 UTC" firstStartedPulling="2024-04-12 18:44:12.892108854 +0000 UTC m=+55.493223334" lastFinishedPulling="2024-04-12 18:44:19.208271781 +0000 UTC m=+61.809386261" observedRunningTime="2024-04-12 18:44:19.800975486 +0000 UTC m=+62.402089967" watchObservedRunningTime="2024-04-12 18:44:19.801899743 +0000 UTC m=+62.403014213" Apr 12 18:44:19.984322 systemd[1]: Started sshd@15-10.0.0.33:22-10.0.0.1:34290.service. Apr 12 18:44:19.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.33:22-10.0.0.1:34290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:20.030000 audit[4410]: USER_ACCT pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.032074 sshd[4410]: Accepted publickey for core from 10.0.0.1 port 34290 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:20.031000 audit[4410]: CRED_ACQ pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.031000 audit[4410]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee39f9e90 a2=3 a3=0 items=0 ppid=1 pid=4410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:20.031000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:20.033515 sshd[4410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:20.036864 systemd-logind[1150]: New session 16 of user core. Apr 12 18:44:20.037558 systemd[1]: Started session-16.scope. Apr 12 18:44:20.040000 audit[4410]: USER_START pid=4410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.042000 audit[4412]: CRED_ACQ pid=4412 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.145441 sshd[4410]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:20.145000 audit[4410]: USER_END pid=4410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.145000 audit[4410]: CRED_DISP pid=4410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:20.148400 systemd[1]: sshd@15-10.0.0.33:22-10.0.0.1:34290.service: Deactivated successfully. Apr 12 18:44:20.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.33:22-10.0.0.1:34290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:20.149313 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:44:20.149924 systemd-logind[1150]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:44:20.150777 systemd-logind[1150]: Removed session 16. Apr 12 18:44:21.132756 env[1168]: time="2024-04-12T18:44:21.132696098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:21.134983 env[1168]: time="2024-04-12T18:44:21.134922099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:21.137084 env[1168]: time="2024-04-12T18:44:21.137052759Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:21.138606 env[1168]: time="2024-04-12T18:44:21.138575317Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:44:21.139055 env[1168]: time="2024-04-12T18:44:21.139017702Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:44:21.142104 env[1168]: time="2024-04-12T18:44:21.142052568Z" level=info msg="CreateContainer within sandbox \"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:44:21.159107 env[1168]: time="2024-04-12T18:44:21.159046967Z" level=info msg="CreateContainer within sandbox \"fe1be4f68b211614acf4e1cd9215472f39056044cd37916ec7bbc53f8df82d9c\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5460b5b2b09a59bc243c1354860ebe65a4311960c8dd96eb6c80986559af1637\"" Apr 12 18:44:21.159715 env[1168]: time="2024-04-12T18:44:21.159662472Z" level=info msg="StartContainer for \"5460b5b2b09a59bc243c1354860ebe65a4311960c8dd96eb6c80986559af1637\"" Apr 12 18:44:21.176346 systemd[1]: Started cri-containerd-5460b5b2b09a59bc243c1354860ebe65a4311960c8dd96eb6c80986559af1637.scope. Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f53302ef9f8 items=0 ppid=3632 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:21.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534363062356232623039613539626332343363313335343836306562 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit: BPF prog-id=177 op=LOAD Apr 12 18:44:21.198000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c00022ec78 items=0 ppid=3632 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:21.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534363062356232623039613539626332343363313335343836306562 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit: BPF prog-id=178 op=LOAD Apr 12 18:44:21.198000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c00022ecc8 items=0 ppid=3632 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:21.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534363062356232623039613539626332343363313335343836306562 Apr 12 18:44:21.198000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:44:21.198000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { perfmon } for pid=4430 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit[4430]: AVC avc: denied { bpf } for pid=4430 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:44:21.198000 audit: BPF prog-id=179 op=LOAD Apr 12 18:44:21.198000 audit[4430]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c00022ed58 items=0 ppid=3632 pid=4430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:21.198000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3534363062356232623039613539626332343363313335343836306562 Apr 12 18:44:21.716088 env[1168]: time="2024-04-12T18:44:21.716034531Z" level=info msg="StartContainer for \"5460b5b2b09a59bc243c1354860ebe65a4311960c8dd96eb6c80986559af1637\" returns successfully" Apr 12 18:44:21.720779 kubelet[2062]: I0412 18:44:21.720745 2062 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:44:21.723517 kubelet[2062]: I0412 18:44:21.723492 2062 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:44:21.942565 kubelet[2062]: I0412 18:44:21.942526 2062 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-hkzhm" podStartSLOduration=35.458381027 podCreationTimestamp="2024-04-12 18:43:38 +0000 UTC" firstStartedPulling="2024-04-12 18:44:12.655233687 +0000 UTC m=+55.256348157" lastFinishedPulling="2024-04-12 18:44:21.139337062 +0000 UTC m=+63.740451542" observedRunningTime="2024-04-12 18:44:21.941839691 +0000 UTC m=+64.542954171" watchObservedRunningTime="2024-04-12 18:44:21.942484412 +0000 UTC m=+64.543598892" Apr 12 18:44:25.151177 systemd[1]: Started sshd@16-10.0.0.33:22-10.0.0.1:34294.service. Apr 12 18:44:25.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.33:22-10.0.0.1:34294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:25.156606 kernel: kauditd_printk_skb: 101 callbacks suppressed Apr 12 18:44:25.156815 kernel: audit: type=1130 audit(1712947465.150:1406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.33:22-10.0.0.1:34294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:25.186000 audit[4472]: USER_ACCT pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.187852 sshd[4472]: Accepted publickey for core from 10.0.0.1 port 34294 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:25.190341 sshd[4472]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:25.188000 audit[4472]: CRED_ACQ pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.195584 kernel: audit: type=1101 audit(1712947465.186:1407): pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.195719 kernel: audit: type=1103 audit(1712947465.188:1408): pid=4472 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.195741 kernel: audit: type=1006 audit(1712947465.188:1409): pid=4472 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Apr 12 18:44:25.194541 systemd-logind[1150]: New session 17 of user core. Apr 12 18:44:25.195316 systemd[1]: Started session-17.scope. Apr 12 18:44:25.188000 audit[4472]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee212e8b0 a2=3 a3=0 items=0 ppid=1 pid=4472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.201824 kernel: audit: type=1300 audit(1712947465.188:1409): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee212e8b0 a2=3 a3=0 items=0 ppid=1 pid=4472 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:25.188000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:25.203367 kernel: audit: type=1327 audit(1712947465.188:1409): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:25.203435 kernel: audit: type=1105 audit(1712947465.200:1410): pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.200000 audit[4472]: USER_START pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.207559 kernel: audit: type=1103 audit(1712947465.201:1411): pid=4474 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.201000 audit[4474]: CRED_ACQ pid=4474 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.310416 sshd[4472]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:25.310000 audit[4472]: USER_END pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.313511 systemd[1]: sshd@16-10.0.0.33:22-10.0.0.1:34294.service: Deactivated successfully. Apr 12 18:44:25.314267 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:44:25.310000 audit[4472]: CRED_DISP pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.318095 systemd-logind[1150]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:44:25.318898 systemd-logind[1150]: Removed session 17. Apr 12 18:44:25.318987 kernel: audit: type=1106 audit(1712947465.310:1412): pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.319028 kernel: audit: type=1104 audit(1712947465.310:1413): pid=4472 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:25.312000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.33:22-10.0.0.1:34294 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:26.393000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.393000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00261f100 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:26.393000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:26.394000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.394000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012f4840 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:26.394000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:26.405000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.406000 audit[1961]: AVC avc: denied { watch } for pid=1961 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:44:26.405000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=c a1=c000cdd1e0 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:26.405000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:26.406000 audit[1961]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=d a1=c0022e6e80 a2=fc6 a3=0 items=0 ppid=1809 pid=1961 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c186,c988 key=(null) Apr 12 18:44:26.406000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:44:27.484502 kubelet[2062]: E0412 18:44:27.484450 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:30.315169 systemd[1]: Started sshd@17-10.0.0.33:22-10.0.0.1:56228.service. Apr 12 18:44:30.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.33:22-10.0.0.1:56228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:30.316605 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:44:30.316661 kernel: audit: type=1130 audit(1712947470.314:1419): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.33:22-10.0.0.1:56228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:30.349000 audit[4543]: USER_ACCT pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.350756 sshd[4543]: Accepted publickey for core from 10.0.0.1 port 56228 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:30.352862 sshd[4543]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:30.351000 audit[4543]: CRED_ACQ pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.356597 systemd-logind[1150]: New session 18 of user core. Apr 12 18:44:30.357485 systemd[1]: Started session-18.scope. Apr 12 18:44:30.358131 kernel: audit: type=1101 audit(1712947470.349:1420): pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.358235 kernel: audit: type=1103 audit(1712947470.351:1421): pid=4543 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.358277 kernel: audit: type=1006 audit(1712947470.351:1422): pid=4543 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 18:44:30.351000 audit[4543]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74d8a6d0 a2=3 a3=0 items=0 ppid=1 pid=4543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.364525 kernel: audit: type=1300 audit(1712947470.351:1422): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff74d8a6d0 a2=3 a3=0 items=0 ppid=1 pid=4543 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:30.364582 kernel: audit: type=1327 audit(1712947470.351:1422): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:30.351000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:30.360000 audit[4543]: USER_START pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.370610 kernel: audit: type=1105 audit(1712947470.360:1423): pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.370656 kernel: audit: type=1103 audit(1712947470.361:1424): pid=4545 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.361000 audit[4545]: CRED_ACQ pid=4545 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.466121 sshd[4543]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:30.465000 audit[4543]: USER_END pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.468284 systemd[1]: sshd@17-10.0.0.33:22-10.0.0.1:56228.service: Deactivated successfully. Apr 12 18:44:30.469146 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:44:30.469695 systemd-logind[1150]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:44:30.470488 systemd-logind[1150]: Removed session 18. Apr 12 18:44:30.465000 audit[4543]: CRED_DISP pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.486281 kernel: audit: type=1106 audit(1712947470.465:1425): pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.486343 kernel: audit: type=1104 audit(1712947470.465:1426): pid=4543 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:30.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.33:22-10.0.0.1:56228 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:35.471678 systemd[1]: Started sshd@18-10.0.0.33:22-10.0.0.1:56244.service. Apr 12 18:44:35.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.33:22-10.0.0.1:56244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:35.473372 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:35.473452 kernel: audit: type=1130 audit(1712947475.470:1428): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.33:22-10.0.0.1:56244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:35.502000 audit[4558]: USER_ACCT pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.503912 sshd[4558]: Accepted publickey for core from 10.0.0.1 port 56244 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:35.505944 sshd[4558]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:35.504000 audit[4558]: CRED_ACQ pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.510270 systemd-logind[1150]: New session 19 of user core. Apr 12 18:44:35.511498 systemd[1]: Started session-19.scope. Apr 12 18:44:35.513517 kernel: audit: type=1101 audit(1712947475.502:1429): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.513571 kernel: audit: type=1103 audit(1712947475.504:1430): pid=4558 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.513593 kernel: audit: type=1006 audit(1712947475.504:1431): pid=4558 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 18:44:35.504000 audit[4558]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0154730 a2=3 a3=0 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.521485 kernel: audit: type=1300 audit(1712947475.504:1431): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffee0154730 a2=3 a3=0 items=0 ppid=1 pid=4558 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:35.521545 kernel: audit: type=1327 audit(1712947475.504:1431): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:35.504000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:35.515000 audit[4558]: USER_START pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.527593 kernel: audit: type=1105 audit(1712947475.515:1432): pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.527640 kernel: audit: type=1103 audit(1712947475.517:1433): pid=4560 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.517000 audit[4560]: CRED_ACQ pid=4560 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.622785 sshd[4558]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:35.622000 audit[4558]: USER_END pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.625134 systemd[1]: sshd@18-10.0.0.33:22-10.0.0.1:56244.service: Deactivated successfully. Apr 12 18:44:35.626097 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:44:35.626789 systemd-logind[1150]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:44:35.627680 systemd-logind[1150]: Removed session 19. Apr 12 18:44:35.622000 audit[4558]: CRED_DISP pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.633067 kernel: audit: type=1106 audit(1712947475.622:1434): pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.633120 kernel: audit: type=1104 audit(1712947475.622:1435): pid=4558 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:35.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.33:22-10.0.0.1:56244 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.626167 systemd[1]: Started sshd@19-10.0.0.33:22-10.0.0.1:58222.service. Apr 12 18:44:40.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.33:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.631019 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:40.631093 kernel: audit: type=1130 audit(1712947480.625:1437): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.33:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.657000 audit[4578]: USER_ACCT pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.659476 sshd[4578]: Accepted publickey for core from 10.0.0.1 port 58222 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:40.662000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.663882 sshd[4578]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:40.668009 kernel: audit: type=1101 audit(1712947480.657:1438): pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.668075 kernel: audit: type=1103 audit(1712947480.662:1439): pid=4578 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.668110 kernel: audit: type=1006 audit(1712947480.662:1440): pid=4578 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Apr 12 18:44:40.667325 systemd-logind[1150]: New session 20 of user core. Apr 12 18:44:40.668449 systemd[1]: Started session-20.scope. Apr 12 18:44:40.673677 kernel: audit: type=1300 audit(1712947480.662:1440): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd20e421e0 a2=3 a3=0 items=0 ppid=1 pid=4578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:40.662000 audit[4578]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd20e421e0 a2=3 a3=0 items=0 ppid=1 pid=4578 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:40.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:40.675306 kernel: audit: type=1327 audit(1712947480.662:1440): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:40.675348 kernel: audit: type=1105 audit(1712947480.668:1441): pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.668000 audit[4578]: USER_START pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.679536 kernel: audit: type=1103 audit(1712947480.672:1442): pid=4580 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.672000 audit[4580]: CRED_ACQ pid=4580 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.769222 sshd[4578]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:40.768000 audit[4578]: USER_END pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.772228 systemd[1]: sshd@19-10.0.0.33:22-10.0.0.1:58222.service: Deactivated successfully. Apr 12 18:44:40.772980 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:44:40.773613 systemd-logind[1150]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:44:40.769000 audit[4578]: CRED_DISP pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.775072 systemd[1]: Started sshd@20-10.0.0.33:22-10.0.0.1:58226.service. Apr 12 18:44:40.775992 systemd-logind[1150]: Removed session 20. Apr 12 18:44:40.778491 kernel: audit: type=1106 audit(1712947480.768:1443): pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.778544 kernel: audit: type=1104 audit(1712947480.769:1444): pid=4578 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.33:22-10.0.0.1:58222 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.773000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.33:22-10.0.0.1:58226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:40.806000 audit[4591]: USER_ACCT pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.808373 sshd[4591]: Accepted publickey for core from 10.0.0.1 port 58226 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:40.808000 audit[4591]: CRED_ACQ pid=4591 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.808000 audit[4591]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc43edd3a0 a2=3 a3=0 items=0 ppid=1 pid=4591 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:40.808000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:40.809577 sshd[4591]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:40.812646 systemd-logind[1150]: New session 21 of user core. Apr 12 18:44:40.813528 systemd[1]: Started session-21.scope. Apr 12 18:44:40.817000 audit[4591]: USER_START pid=4591 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:40.818000 audit[4593]: CRED_ACQ pid=4593 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.136538 sshd[4591]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:41.136000 audit[4591]: USER_END pid=4591 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.136000 audit[4591]: CRED_DISP pid=4591 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.139989 systemd[1]: Started sshd@21-10.0.0.33:22-10.0.0.1:58238.service. Apr 12 18:44:41.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.33:22-10.0.0.1:58238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.142748 systemd[1]: sshd@20-10.0.0.33:22-10.0.0.1:58226.service: Deactivated successfully. Apr 12 18:44:41.143308 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:44:41.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.33:22-10.0.0.1:58226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:41.143854 systemd-logind[1150]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:44:41.144521 systemd-logind[1150]: Removed session 21. Apr 12 18:44:41.171000 audit[4602]: USER_ACCT pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.173371 sshd[4602]: Accepted publickey for core from 10.0.0.1 port 58238 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:41.173000 audit[4602]: CRED_ACQ pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.173000 audit[4602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe2747d800 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:41.173000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:41.174663 sshd[4602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:41.178541 systemd-logind[1150]: New session 22 of user core. Apr 12 18:44:41.179504 systemd[1]: Started session-22.scope. Apr 12 18:44:41.183000 audit[4602]: USER_START pid=4602 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:41.184000 audit[4605]: CRED_ACQ pid=4605 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.081000 audit[4619]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.081000 audit[4619]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffcb8228b60 a2=0 a3=7ffcb8228b4c items=0 ppid=2249 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.081000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.082000 audit[4619]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4619 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.082000 audit[4619]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffcb8228b60 a2=0 a3=0 items=0 ppid=2249 pid=4619 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.082000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.092000 audit[4621]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.092000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffe57364fe0 a2=0 a3=7ffe57364fcc items=0 ppid=2249 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.092000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.093000 audit[4621]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4621 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:42.093000 audit[4621]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffe57364fe0 a2=0 a3=0 items=0 ppid=2249 pid=4621 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.093000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:42.130539 sshd[4602]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:42.130000 audit[4602]: USER_END pid=4602 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.130000 audit[4602]: CRED_DISP pid=4602 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.133853 systemd[1]: sshd@21-10.0.0.33:22-10.0.0.1:58238.service: Deactivated successfully. Apr 12 18:44:42.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.33:22-10.0.0.1:58238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.134530 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:44:42.135140 systemd-logind[1150]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:44:42.136474 systemd[1]: Started sshd@22-10.0.0.33:22-10.0.0.1:58246.service. Apr 12 18:44:42.135000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.33:22-10.0.0.1:58246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.137911 systemd-logind[1150]: Removed session 22. Apr 12 18:44:42.167000 audit[4624]: USER_ACCT pid=4624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.169284 sshd[4624]: Accepted publickey for core from 10.0.0.1 port 58246 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:42.168000 audit[4624]: CRED_ACQ pid=4624 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.168000 audit[4624]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc44ccb4c0 a2=3 a3=0 items=0 ppid=1 pid=4624 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.168000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:42.173800 systemd-logind[1150]: New session 23 of user core. Apr 12 18:44:42.170435 sshd[4624]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:42.174692 systemd[1]: Started session-23.scope. Apr 12 18:44:42.177000 audit[4624]: USER_START pid=4624 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.178000 audit[4626]: CRED_ACQ pid=4626 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.641523 sshd[4624]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:42.641000 audit[4624]: USER_END pid=4624 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.641000 audit[4624]: CRED_DISP pid=4624 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.644500 systemd[1]: sshd@22-10.0.0.33:22-10.0.0.1:58246.service: Deactivated successfully. Apr 12 18:44:42.643000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.33:22-10.0.0.1:58246 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.645182 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:44:42.645783 systemd-logind[1150]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:44:42.647026 systemd[1]: Started sshd@23-10.0.0.33:22-10.0.0.1:58252.service. Apr 12 18:44:42.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.33:22-10.0.0.1:58252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.647985 systemd-logind[1150]: Removed session 23. Apr 12 18:44:42.678000 audit[4636]: USER_ACCT pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.680425 sshd[4636]: Accepted publickey for core from 10.0.0.1 port 58252 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:42.680000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.680000 audit[4636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9b7cc4f0 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:42.680000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:42.681789 sshd[4636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:42.689034 systemd[1]: Started session-24.scope. Apr 12 18:44:42.689451 systemd-logind[1150]: New session 24 of user core. Apr 12 18:44:42.696000 audit[4636]: USER_START pid=4636 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.698000 audit[4638]: CRED_ACQ pid=4638 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.829793 sshd[4636]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:42.829000 audit[4636]: USER_END pid=4636 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.829000 audit[4636]: CRED_DISP pid=4636 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:42.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.33:22-10.0.0.1:58252 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:42.832490 systemd[1]: sshd@23-10.0.0.33:22-10.0.0.1:58252.service: Deactivated successfully. Apr 12 18:44:42.833348 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:44:42.834004 systemd-logind[1150]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:44:42.834909 systemd-logind[1150]: Removed session 24. Apr 12 18:44:44.484707 kubelet[2062]: E0412 18:44:44.484639 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:47.834821 systemd[1]: Started sshd@24-10.0.0.33:22-10.0.0.1:58256.service. Apr 12 18:44:47.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.33:22-10.0.0.1:58256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.835932 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:44:47.836067 kernel: audit: type=1130 audit(1712947487.833:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.33:22-10.0.0.1:58256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:47.865000 audit[4669]: USER_ACCT pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.866891 sshd[4669]: Accepted publickey for core from 10.0.0.1 port 58256 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:47.869205 sshd[4669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:47.867000 audit[4669]: CRED_ACQ pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.873267 systemd-logind[1150]: New session 25 of user core. Apr 12 18:44:47.874068 systemd[1]: Started session-25.scope. Apr 12 18:44:47.874234 kernel: audit: type=1101 audit(1712947487.865:1487): pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.874301 kernel: audit: type=1103 audit(1712947487.867:1488): pid=4669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.874323 kernel: audit: type=1006 audit(1712947487.867:1489): pid=4669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:44:47.876469 kernel: audit: type=1300 audit(1712947487.867:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe074f90b0 a2=3 a3=0 items=0 ppid=1 pid=4669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:47.867000 audit[4669]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe074f90b0 a2=3 a3=0 items=0 ppid=1 pid=4669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:47.880447 kernel: audit: type=1327 audit(1712947487.867:1489): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:47.867000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:47.881768 kernel: audit: type=1105 audit(1712947487.877:1490): pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.877000 audit[4669]: USER_START pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.878000 audit[4671]: CRED_ACQ pid=4671 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.889428 kernel: audit: type=1103 audit(1712947487.878:1491): pid=4671 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.980108 sshd[4669]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:47.979000 audit[4669]: USER_END pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.982709 systemd[1]: sshd@24-10.0.0.33:22-10.0.0.1:58256.service: Deactivated successfully. Apr 12 18:44:47.983486 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:44:47.984219 systemd-logind[1150]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:44:47.985041 systemd-logind[1150]: Removed session 25. Apr 12 18:44:47.979000 audit[4669]: CRED_DISP pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.989633 kernel: audit: type=1106 audit(1712947487.979:1492): pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.989691 kernel: audit: type=1104 audit(1712947487.979:1493): pid=4669 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:47.979000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.33:22-10.0.0.1:58256 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:49.196000 audit[4682]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:49.196000 audit[4682]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc1dae1430 a2=0 a3=7ffc1dae141c items=0 ppid=2249 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:49.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:49.198000 audit[4682]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4682 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:44:49.198000 audit[4682]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffc1dae1430 a2=0 a3=7ffc1dae141c items=0 ppid=2249 pid=4682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:49.198000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:44:51.484734 kubelet[2062]: E0412 18:44:51.484690 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:52.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.33:22-10.0.0.1:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:52.984766 systemd[1]: Started sshd@25-10.0.0.33:22-10.0.0.1:52754.service. Apr 12 18:44:52.996231 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:44:52.996324 kernel: audit: type=1130 audit(1712947492.984:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.33:22-10.0.0.1:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:53.025000 audit[4696]: USER_ACCT pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.025995 sshd[4696]: Accepted publickey for core from 10.0.0.1 port 52754 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:53.027764 sshd[4696]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:53.027000 audit[4696]: CRED_ACQ pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.031523 systemd-logind[1150]: New session 26 of user core. Apr 12 18:44:53.032325 systemd[1]: Started session-26.scope. Apr 12 18:44:53.033283 kernel: audit: type=1101 audit(1712947493.025:1498): pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.033338 kernel: audit: type=1103 audit(1712947493.027:1499): pid=4696 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.033374 kernel: audit: type=1006 audit(1712947493.027:1500): pid=4696 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:44:53.027000 audit[4696]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5cae3ca0 a2=3 a3=0 items=0 ppid=1 pid=4696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.039541 kernel: audit: type=1300 audit(1712947493.027:1500): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff5cae3ca0 a2=3 a3=0 items=0 ppid=1 pid=4696 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:53.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:53.041172 kernel: audit: type=1327 audit(1712947493.027:1500): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:53.041241 kernel: audit: type=1105 audit(1712947493.037:1501): pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.037000 audit[4696]: USER_START pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.045363 kernel: audit: type=1103 audit(1712947493.038:1502): pid=4698 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.038000 audit[4698]: CRED_ACQ pid=4698 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.137788 sshd[4696]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:53.138000 audit[4696]: USER_END pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.140462 systemd[1]: sshd@25-10.0.0.33:22-10.0.0.1:52754.service: Deactivated successfully. Apr 12 18:44:53.141421 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:44:53.138000 audit[4696]: CRED_DISP pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.146521 kernel: audit: type=1106 audit(1712947493.138:1503): pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.146593 kernel: audit: type=1104 audit(1712947493.138:1504): pid=4696 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:53.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.33:22-10.0.0.1:52754 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:53.147014 systemd-logind[1150]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:44:53.147769 systemd-logind[1150]: Removed session 26. Apr 12 18:44:55.484579 kubelet[2062]: E0412 18:44:55.484544 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:57.484880 kubelet[2062]: E0412 18:44:57.484832 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:57.609496 kubelet[2062]: E0412 18:44:57.609464 2062 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:44:58.142136 systemd[1]: Started sshd@26-10.0.0.33:22-10.0.0.1:52762.service. Apr 12 18:44:58.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.33:22-10.0.0.1:52762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.146415 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:44:58.146498 kernel: audit: type=1130 audit(1712947498.142:1506): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.33:22-10.0.0.1:52762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:44:58.173000 audit[4753]: USER_ACCT pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.173653 sshd[4753]: Accepted publickey for core from 10.0.0.1 port 52762 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:44:58.176846 sshd[4753]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:44:58.176000 audit[4753]: CRED_ACQ pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.180351 systemd-logind[1150]: New session 27 of user core. Apr 12 18:44:58.181082 kernel: audit: type=1101 audit(1712947498.173:1507): pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.181127 kernel: audit: type=1103 audit(1712947498.176:1508): pid=4753 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.181494 systemd[1]: Started session-27.scope. Apr 12 18:44:58.183405 kernel: audit: type=1006 audit(1712947498.176:1509): pid=4753 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Apr 12 18:44:58.183449 kernel: audit: type=1300 audit(1712947498.176:1509): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6945c30 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:58.176000 audit[4753]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda6945c30 a2=3 a3=0 items=0 ppid=1 pid=4753 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:44:58.187383 kernel: audit: type=1327 audit(1712947498.176:1509): proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:58.176000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:44:58.188694 kernel: audit: type=1105 audit(1712947498.185:1510): pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.185000 audit[4753]: USER_START pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.192899 kernel: audit: type=1103 audit(1712947498.186:1511): pid=4755 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.186000 audit[4755]: CRED_ACQ pid=4755 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.280265 sshd[4753]: pam_unix(sshd:session): session closed for user core Apr 12 18:44:58.281000 audit[4753]: USER_END pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.282615 systemd[1]: sshd@26-10.0.0.33:22-10.0.0.1:52762.service: Deactivated successfully. Apr 12 18:44:58.283429 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:44:58.284055 systemd-logind[1150]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:44:58.284894 systemd-logind[1150]: Removed session 27. Apr 12 18:44:58.281000 audit[4753]: CRED_DISP pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.289149 kernel: audit: type=1106 audit(1712947498.281:1512): pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.289192 kernel: audit: type=1104 audit(1712947498.281:1513): pid=4753 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:44:58.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.33:22-10.0.0.1:52762 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:01.997000 audit[4773]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:01.997000 audit[4773]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc968edaf0 a2=0 a3=7ffc968edadc items=0 ppid=2249 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:01.997000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.000000 audit[4773]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4773 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:02.000000 audit[4773]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc968edaf0 a2=0 a3=7ffc968edadc items=0 ppid=2249 pid=4773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:02.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.014000 audit[4775]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:02.014000 audit[4775]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffda3061160 a2=0 a3=7ffda306114c items=0 ppid=2249 pid=4775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:02.014000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.019198 kubelet[2062]: I0412 18:45:02.019152 2062 topology_manager.go:215] "Topology Admit Handler" podUID="44886c94-7b8e-4625-9f76-643dd1a68594" podNamespace="calico-apiserver" podName="calico-apiserver-565b87c9b4-rhtkk" Apr 12 18:45:02.015000 audit[4775]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4775 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:45:02.015000 audit[4775]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffda3061160 a2=0 a3=7ffda306114c items=0 ppid=2249 pid=4775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:02.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:45:02.038991 systemd[1]: Created slice kubepods-besteffort-pod44886c94_7b8e_4625_9f76_643dd1a68594.slice. Apr 12 18:45:02.140843 kubelet[2062]: I0412 18:45:02.140783 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/44886c94-7b8e-4625-9f76-643dd1a68594-calico-apiserver-certs\") pod \"calico-apiserver-565b87c9b4-rhtkk\" (UID: \"44886c94-7b8e-4625-9f76-643dd1a68594\") " pod="calico-apiserver/calico-apiserver-565b87c9b4-rhtkk" Apr 12 18:45:02.140843 kubelet[2062]: I0412 18:45:02.140838 2062 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mmx4l\" (UniqueName: \"kubernetes.io/projected/44886c94-7b8e-4625-9f76-643dd1a68594-kube-api-access-mmx4l\") pod \"calico-apiserver-565b87c9b4-rhtkk\" (UID: \"44886c94-7b8e-4625-9f76-643dd1a68594\") " pod="calico-apiserver/calico-apiserver-565b87c9b4-rhtkk" Apr 12 18:45:02.242895 kubelet[2062]: E0412 18:45:02.242614 2062 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:45:02.244271 kubelet[2062]: E0412 18:45:02.244237 2062 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/44886c94-7b8e-4625-9f76-643dd1a68594-calico-apiserver-certs podName:44886c94-7b8e-4625-9f76-643dd1a68594 nodeName:}" failed. No retries permitted until 2024-04-12 18:45:02.742939693 +0000 UTC m=+105.344054203 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/44886c94-7b8e-4625-9f76-643dd1a68594-calico-apiserver-certs") pod "calico-apiserver-565b87c9b4-rhtkk" (UID: "44886c94-7b8e-4625-9f76-643dd1a68594") : secret "calico-apiserver-certs" not found Apr 12 18:45:02.946581 env[1168]: time="2024-04-12T18:45:02.946495842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-565b87c9b4-rhtkk,Uid:44886c94-7b8e-4625-9f76-643dd1a68594,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:45:03.057392 systemd-networkd[1070]: cali2322afce177: Link UP Apr 12 18:45:03.059470 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:45:03.059519 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2322afce177: link becomes ready Apr 12 18:45:03.059561 systemd-networkd[1070]: cali2322afce177: Gained carrier Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:02.996 [INFO][4778] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0 calico-apiserver-565b87c9b4- calico-apiserver 44886c94-7b8e-4625-9f76-643dd1a68594 1208 0 2024-04-12 18:45:02 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:565b87c9b4 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-565b87c9b4-rhtkk eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali2322afce177 [] []}} ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:02.996 [INFO][4778] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.021 [INFO][4791] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" HandleID="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Workload="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.032 [INFO][4791] ipam_plugin.go 268: Auto assigning IP ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" HandleID="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Workload="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051200), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-565b87c9b4-rhtkk", "timestamp":"2024-04-12 18:45:03.021075256 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.032 [INFO][4791] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.032 [INFO][4791] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.032 [INFO][4791] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.034 [INFO][4791] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.037 [INFO][4791] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.040 [INFO][4791] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.041 [INFO][4791] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.044 [INFO][4791] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.044 [INFO][4791] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.045 [INFO][4791] ipam.go 1682: Creating new handle: k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021 Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.048 [INFO][4791] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.053 [INFO][4791] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.053 [INFO][4791] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" host="localhost" Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.053 [INFO][4791] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:45:03.074031 env[1168]: 2024-04-12 18:45:03.053 [INFO][4791] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" HandleID="k8s-pod-network.94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Workload="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.054 [INFO][4778] k8s.go 385: Populated endpoint ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0", GenerateName:"calico-apiserver-565b87c9b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"44886c94-7b8e-4625-9f76-643dd1a68594", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"565b87c9b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-565b87c9b4-rhtkk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2322afce177", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.055 [INFO][4778] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.055 [INFO][4778] dataplane_linux.go 68: Setting the host side veth name to cali2322afce177 ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.060 [INFO][4778] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.060 [INFO][4778] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0", GenerateName:"calico-apiserver-565b87c9b4-", Namespace:"calico-apiserver", SelfLink:"", UID:"44886c94-7b8e-4625-9f76-643dd1a68594", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 45, 2, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"565b87c9b4", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021", Pod:"calico-apiserver-565b87c9b4-rhtkk", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali2322afce177", MAC:"4a:fb:7f:e4:26:8b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:45:03.076666 env[1168]: 2024-04-12 18:45:03.072 [INFO][4778] k8s.go 498: Wrote updated endpoint to datastore ContainerID="94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021" Namespace="calico-apiserver" Pod="calico-apiserver-565b87c9b4-rhtkk" WorkloadEndpoint="localhost-k8s-calico--apiserver--565b87c9b4--rhtkk-eth0" Apr 12 18:45:03.093851 env[1168]: time="2024-04-12T18:45:03.093758456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:45:03.093851 env[1168]: time="2024-04-12T18:45:03.093854919Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:45:03.094098 env[1168]: time="2024-04-12T18:45:03.093881980Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:45:03.094174 env[1168]: time="2024-04-12T18:45:03.094124428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021 pid=4827 runtime=io.containerd.runc.v2 Apr 12 18:45:03.094000 audit[4822]: NETFILTER_CFG table=filter:123 family=2 entries=59 op=nft_register_chain pid=4822 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:45:03.094000 audit[4822]: SYSCALL arch=c000003e syscall=46 success=yes exit=30140 a0=3 a1=7ffdb9a4cf30 a2=0 a3=7ffdb9a4cf1c items=0 ppid=3303 pid=4822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.094000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:45:03.109759 systemd[1]: Started cri-containerd-94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021.scope. Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.122000 audit: BPF prog-id=180 op=LOAD Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=4827 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653232353837366564633135623239623466653538316231343536 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=4827 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653232353837366564633135623239623466653538316231343536 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit: BPF prog-id=181 op=LOAD Apr 12 18:45:03.123000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00030c930 items=0 ppid=4827 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653232353837366564633135623239623466653538316231343536 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit: BPF prog-id=182 op=LOAD Apr 12 18:45:03.123000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00030c978 items=0 ppid=4827 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653232353837366564633135623239623466653538316231343536 Apr 12 18:45:03.123000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:45:03.123000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { perfmon } for pid=4837 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit[4837]: AVC avc: denied { bpf } for pid=4837 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:45:03.123000 audit: BPF prog-id=183 op=LOAD Apr 12 18:45:03.123000 audit[4837]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00030cd88 items=0 ppid=4827 pid=4837 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934653232353837366564633135623239623466653538316231343536 Apr 12 18:45:03.125370 systemd-resolved[1106]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:45:03.150012 env[1168]: time="2024-04-12T18:45:03.149950468Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-565b87c9b4-rhtkk,Uid:44886c94-7b8e-4625-9f76-643dd1a68594,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"94e225876edc15b29b4fe581b1456f19d85ffb78a32e0dacd28243e91ea41021\"" Apr 12 18:45:03.152033 env[1168]: time="2024-04-12T18:45:03.151968500Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:45:03.284620 systemd[1]: Started sshd@27-10.0.0.33:22-10.0.0.1:56124.service. Apr 12 18:45:03.284000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.33:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.290455 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:45:03.290541 kernel: audit: type=1130 audit(1712947503.284:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.33:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:03.317000 audit[4861]: USER_ACCT pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.318233 sshd[4861]: Accepted publickey for core from 10.0.0.1 port 56124 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:45:03.321000 audit[4861]: CRED_ACQ pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.322337 kernel: audit: type=1101 audit(1712947503.317:1539): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.322366 kernel: audit: type=1103 audit(1712947503.321:1540): pid=4861 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.322669 sshd[4861]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:45:03.331357 kernel: audit: type=1006 audit(1712947503.322:1541): pid=4861 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Apr 12 18:45:03.331442 kernel: audit: type=1300 audit(1712947503.322:1541): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29fbfc60 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.322000 audit[4861]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc29fbfc60 a2=3 a3=0 items=0 ppid=1 pid=4861 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:45:03.326845 systemd[1]: Started session-28.scope. Apr 12 18:45:03.327173 systemd-logind[1150]: New session 28 of user core. Apr 12 18:45:03.322000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:03.333819 kernel: audit: type=1327 audit(1712947503.322:1541): proctitle=737368643A20636F7265205B707269765D Apr 12 18:45:03.333863 kernel: audit: type=1105 audit(1712947503.331:1542): pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.331000 audit[4861]: USER_START pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.337998 kernel: audit: type=1103 audit(1712947503.332:1543): pid=4863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.332000 audit[4863]: CRED_ACQ pid=4863 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.434220 sshd[4861]: pam_unix(sshd:session): session closed for user core Apr 12 18:45:03.435000 audit[4861]: USER_END pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.436866 systemd[1]: sshd@27-10.0.0.33:22-10.0.0.1:56124.service: Deactivated successfully. Apr 12 18:45:03.437887 systemd[1]: session-28.scope: Deactivated successfully. Apr 12 18:45:03.439047 systemd-logind[1150]: Session 28 logged out. Waiting for processes to exit. Apr 12 18:45:03.439834 systemd-logind[1150]: Removed session 28. Apr 12 18:45:03.444343 kernel: audit: type=1106 audit(1712947503.435:1544): pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.444410 kernel: audit: type=1104 audit(1712947503.435:1545): pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.435000 audit[4861]: CRED_DISP pid=4861 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:45:03.435000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.33:22-10.0.0.1:56124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:45:04.542713 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount503015941.mount: Deactivated successfully. Apr 12 18:45:04.750486 systemd-networkd[1070]: cali2322afce177: Gained IPv6LL