Apr 12 18:52:42.844467 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Apr 12 17:19:00 -00 2024 Apr 12 18:52:42.844487 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:42.844495 kernel: BIOS-provided physical RAM map: Apr 12 18:52:42.844501 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Apr 12 18:52:42.844506 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Apr 12 18:52:42.844511 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Apr 12 18:52:42.844518 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000009cfdcfff] usable Apr 12 18:52:42.844523 kernel: BIOS-e820: [mem 0x000000009cfdd000-0x000000009cffffff] reserved Apr 12 18:52:42.844530 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Apr 12 18:52:42.844535 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Apr 12 18:52:42.844541 kernel: BIOS-e820: [mem 0x000000fd00000000-0x000000ffffffffff] reserved Apr 12 18:52:42.844546 kernel: NX (Execute Disable) protection: active Apr 12 18:52:42.844551 kernel: SMBIOS 2.8 present. Apr 12 18:52:42.844557 kernel: DMI: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014 Apr 12 18:52:42.844566 kernel: Hypervisor detected: KVM Apr 12 18:52:42.844572 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Apr 12 18:52:42.844577 kernel: kvm-clock: cpu 0, msr 86191001, primary cpu clock Apr 12 18:52:42.844583 kernel: kvm-clock: using sched offset of 2322124822 cycles Apr 12 18:52:42.844590 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Apr 12 18:52:42.844596 kernel: tsc: Detected 2794.748 MHz processor Apr 12 18:52:42.844602 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Apr 12 18:52:42.844608 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Apr 12 18:52:42.844614 kernel: last_pfn = 0x9cfdd max_arch_pfn = 0x400000000 Apr 12 18:52:42.844621 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Apr 12 18:52:42.844628 kernel: Using GB pages for direct mapping Apr 12 18:52:42.844633 kernel: ACPI: Early table checksum verification disabled Apr 12 18:52:42.844639 kernel: ACPI: RSDP 0x00000000000F59C0 000014 (v00 BOCHS ) Apr 12 18:52:42.844646 kernel: ACPI: RSDT 0x000000009CFE1BDD 000034 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844652 kernel: ACPI: FACP 0x000000009CFE1A79 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844658 kernel: ACPI: DSDT 0x000000009CFE0040 001A39 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844663 kernel: ACPI: FACS 0x000000009CFE0000 000040 Apr 12 18:52:42.844669 kernel: ACPI: APIC 0x000000009CFE1AED 000090 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844676 kernel: ACPI: HPET 0x000000009CFE1B7D 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844682 kernel: ACPI: WAET 0x000000009CFE1BB5 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:52:42.844688 kernel: ACPI: Reserving FACP table memory at [mem 0x9cfe1a79-0x9cfe1aec] Apr 12 18:52:42.844694 kernel: ACPI: Reserving DSDT table memory at [mem 0x9cfe0040-0x9cfe1a78] Apr 12 18:52:42.844700 kernel: ACPI: Reserving FACS table memory at [mem 0x9cfe0000-0x9cfe003f] Apr 12 18:52:42.844706 kernel: ACPI: Reserving APIC table memory at [mem 0x9cfe1aed-0x9cfe1b7c] Apr 12 18:52:42.844712 kernel: ACPI: Reserving HPET table memory at [mem 0x9cfe1b7d-0x9cfe1bb4] Apr 12 18:52:42.844718 kernel: ACPI: Reserving WAET table memory at [mem 0x9cfe1bb5-0x9cfe1bdc] Apr 12 18:52:42.844734 kernel: No NUMA configuration found Apr 12 18:52:42.844740 kernel: Faking a node at [mem 0x0000000000000000-0x000000009cfdcfff] Apr 12 18:52:42.844747 kernel: NODE_DATA(0) allocated [mem 0x9cfd7000-0x9cfdcfff] Apr 12 18:52:42.844753 kernel: Zone ranges: Apr 12 18:52:42.844760 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Apr 12 18:52:42.844766 kernel: DMA32 [mem 0x0000000001000000-0x000000009cfdcfff] Apr 12 18:52:42.844773 kernel: Normal empty Apr 12 18:52:42.844780 kernel: Movable zone start for each node Apr 12 18:52:42.844786 kernel: Early memory node ranges Apr 12 18:52:42.844793 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Apr 12 18:52:42.844800 kernel: node 0: [mem 0x0000000000100000-0x000000009cfdcfff] Apr 12 18:52:42.844808 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000009cfdcfff] Apr 12 18:52:42.844816 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Apr 12 18:52:42.844824 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Apr 12 18:52:42.844832 kernel: On node 0, zone DMA32: 12323 pages in unavailable ranges Apr 12 18:52:42.844841 kernel: ACPI: PM-Timer IO Port: 0x608 Apr 12 18:52:42.844849 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Apr 12 18:52:42.844857 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Apr 12 18:52:42.844865 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Apr 12 18:52:42.844874 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Apr 12 18:52:42.844883 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Apr 12 18:52:42.844889 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Apr 12 18:52:42.844933 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Apr 12 18:52:42.844941 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Apr 12 18:52:42.844953 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Apr 12 18:52:42.844961 kernel: TSC deadline timer available Apr 12 18:52:42.844967 kernel: smpboot: Allowing 4 CPUs, 0 hotplug CPUs Apr 12 18:52:42.844974 kernel: kvm-guest: KVM setup pv remote TLB flush Apr 12 18:52:42.844980 kernel: kvm-guest: setup PV sched yield Apr 12 18:52:42.844987 kernel: [mem 0x9d000000-0xfeffbfff] available for PCI devices Apr 12 18:52:42.844995 kernel: Booting paravirtualized kernel on KVM Apr 12 18:52:42.845004 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Apr 12 18:52:42.845013 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:4 nr_node_ids:1 Apr 12 18:52:42.845023 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u524288 Apr 12 18:52:42.845031 kernel: pcpu-alloc: s188696 r8192 d32488 u524288 alloc=1*2097152 Apr 12 18:52:42.845038 kernel: pcpu-alloc: [0] 0 1 2 3 Apr 12 18:52:42.845046 kernel: kvm-guest: setup async PF for cpu 0 Apr 12 18:52:42.845054 kernel: kvm-guest: stealtime: cpu 0, msr 9a41c0c0 Apr 12 18:52:42.845062 kernel: kvm-guest: PV spinlocks enabled Apr 12 18:52:42.845070 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Apr 12 18:52:42.845079 kernel: Built 1 zonelists, mobility grouping on. Total pages: 632733 Apr 12 18:52:42.845087 kernel: Policy zone: DMA32 Apr 12 18:52:42.845096 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:42.845107 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:52:42.845116 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:52:42.845124 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:52:42.845132 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:52:42.845141 kernel: Memory: 2436704K/2571756K available (12294K kernel code, 2275K rwdata, 13708K rodata, 47440K init, 4148K bss, 134792K reserved, 0K cma-reserved) Apr 12 18:52:42.845150 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:52:42.845159 kernel: ftrace: allocating 34508 entries in 135 pages Apr 12 18:52:42.845169 kernel: ftrace: allocated 135 pages with 4 groups Apr 12 18:52:42.845177 kernel: rcu: Hierarchical RCU implementation. Apr 12 18:52:42.845186 kernel: rcu: RCU event tracing is enabled. Apr 12 18:52:42.845195 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:52:42.845203 kernel: Rude variant of Tasks RCU enabled. Apr 12 18:52:42.845212 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:52:42.845221 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:52:42.845229 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:52:42.845238 kernel: NR_IRQS: 33024, nr_irqs: 456, preallocated irqs: 16 Apr 12 18:52:42.845246 kernel: random: crng init done Apr 12 18:52:42.845256 kernel: Console: colour VGA+ 80x25 Apr 12 18:52:42.845265 kernel: printk: console [ttyS0] enabled Apr 12 18:52:42.845273 kernel: ACPI: Core revision 20210730 Apr 12 18:52:42.845282 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Apr 12 18:52:42.845290 kernel: APIC: Switch to symmetric I/O mode setup Apr 12 18:52:42.845298 kernel: x2apic enabled Apr 12 18:52:42.845307 kernel: Switched APIC routing to physical x2apic. Apr 12 18:52:42.845315 kernel: kvm-guest: setup PV IPIs Apr 12 18:52:42.845324 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Apr 12 18:52:42.845334 kernel: tsc: Marking TSC unstable due to TSCs unsynchronized Apr 12 18:52:42.845342 kernel: Calibrating delay loop (skipped) preset value.. 5589.49 BogoMIPS (lpj=2794748) Apr 12 18:52:42.845351 kernel: x86/cpu: User Mode Instruction Prevention (UMIP) activated Apr 12 18:52:42.845359 kernel: Last level iTLB entries: 4KB 512, 2MB 255, 4MB 127 Apr 12 18:52:42.845368 kernel: Last level dTLB entries: 4KB 512, 2MB 255, 4MB 127, 1GB 0 Apr 12 18:52:42.845376 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Apr 12 18:52:42.845385 kernel: Spectre V2 : Mitigation: Retpolines Apr 12 18:52:42.845393 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Apr 12 18:52:42.845402 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Apr 12 18:52:42.845418 kernel: Spectre V2 : Enabling Speculation Barrier for firmware calls Apr 12 18:52:42.845428 kernel: RETBleed: Mitigation: untrained return thunk Apr 12 18:52:42.845439 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Apr 12 18:52:42.845449 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Apr 12 18:52:42.845458 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Apr 12 18:52:42.845467 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Apr 12 18:52:42.845476 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Apr 12 18:52:42.845485 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Apr 12 18:52:42.845495 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Apr 12 18:52:42.845506 kernel: Freeing SMP alternatives memory: 32K Apr 12 18:52:42.845515 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:52:42.845523 kernel: LSM: Security Framework initializing Apr 12 18:52:42.845532 kernel: SELinux: Initializing. Apr 12 18:52:42.845539 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:52:42.845546 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:52:42.845553 kernel: smpboot: CPU0: AMD EPYC 7402P 24-Core Processor (family: 0x17, model: 0x31, stepping: 0x0) Apr 12 18:52:42.845561 kernel: Performance Events: Fam17h+ core perfctr, AMD PMU driver. Apr 12 18:52:42.845567 kernel: ... version: 0 Apr 12 18:52:42.845574 kernel: ... bit width: 48 Apr 12 18:52:42.845581 kernel: ... generic registers: 6 Apr 12 18:52:42.845588 kernel: ... value mask: 0000ffffffffffff Apr 12 18:52:42.845597 kernel: ... max period: 00007fffffffffff Apr 12 18:52:42.845606 kernel: ... fixed-purpose events: 0 Apr 12 18:52:42.845615 kernel: ... event mask: 000000000000003f Apr 12 18:52:42.845624 kernel: signal: max sigframe size: 1776 Apr 12 18:52:42.845637 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:52:42.845646 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:52:42.845655 kernel: x86: Booting SMP configuration: Apr 12 18:52:42.845664 kernel: .... node #0, CPUs: #1 Apr 12 18:52:42.845673 kernel: kvm-clock: cpu 1, msr 86191041, secondary cpu clock Apr 12 18:52:42.845682 kernel: kvm-guest: setup async PF for cpu 1 Apr 12 18:52:42.845691 kernel: kvm-guest: stealtime: cpu 1, msr 9a49c0c0 Apr 12 18:52:42.845700 kernel: #2 Apr 12 18:52:42.845709 kernel: kvm-clock: cpu 2, msr 86191081, secondary cpu clock Apr 12 18:52:42.845720 kernel: kvm-guest: setup async PF for cpu 2 Apr 12 18:52:42.845737 kernel: kvm-guest: stealtime: cpu 2, msr 9a51c0c0 Apr 12 18:52:42.845746 kernel: #3 Apr 12 18:52:42.845755 kernel: kvm-clock: cpu 3, msr 861910c1, secondary cpu clock Apr 12 18:52:42.845761 kernel: kvm-guest: setup async PF for cpu 3 Apr 12 18:52:42.845768 kernel: kvm-guest: stealtime: cpu 3, msr 9a59c0c0 Apr 12 18:52:42.845775 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:52:42.845781 kernel: smpboot: Max logical packages: 1 Apr 12 18:52:42.845788 kernel: smpboot: Total of 4 processors activated (22357.98 BogoMIPS) Apr 12 18:52:42.845795 kernel: devtmpfs: initialized Apr 12 18:52:42.845803 kernel: x86/mm: Memory block size: 128MB Apr 12 18:52:42.845810 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:52:42.845817 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:52:42.845824 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:52:42.845830 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:52:42.845837 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:52:42.845844 kernel: audit: type=2000 audit(1712947962.960:1): state=initialized audit_enabled=0 res=1 Apr 12 18:52:42.845850 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:52:42.845857 kernel: thermal_sys: Registered thermal governor 'user_space' Apr 12 18:52:42.845865 kernel: cpuidle: using governor menu Apr 12 18:52:42.845872 kernel: ACPI: bus type PCI registered Apr 12 18:52:42.845879 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:52:42.845885 kernel: dca service started, version 1.12.1 Apr 12 18:52:42.845912 kernel: PCI: Using configuration type 1 for base access Apr 12 18:52:42.845919 kernel: PCI: Using configuration type 1 for extended access Apr 12 18:52:42.845926 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Apr 12 18:52:42.845933 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:52:42.845939 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:52:42.845948 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:52:42.845957 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:52:42.845964 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:52:42.845971 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:52:42.845977 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:52:42.845984 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:52:42.845991 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:52:42.845997 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:52:42.846004 kernel: ACPI: Interpreter enabled Apr 12 18:52:42.846012 kernel: ACPI: PM: (supports S0 S3 S5) Apr 12 18:52:42.846019 kernel: ACPI: Using IOAPIC for interrupt routing Apr 12 18:52:42.846026 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Apr 12 18:52:42.846032 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Apr 12 18:52:42.846040 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:52:42.846166 kernel: acpi PNP0A03:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:52:42.846178 kernel: acpiphp: Slot [3] registered Apr 12 18:52:42.846185 kernel: acpiphp: Slot [4] registered Apr 12 18:52:42.846193 kernel: acpiphp: Slot [5] registered Apr 12 18:52:42.846200 kernel: acpiphp: Slot [6] registered Apr 12 18:52:42.846207 kernel: acpiphp: Slot [7] registered Apr 12 18:52:42.846213 kernel: acpiphp: Slot [8] registered Apr 12 18:52:42.846220 kernel: acpiphp: Slot [9] registered Apr 12 18:52:42.846226 kernel: acpiphp: Slot [10] registered Apr 12 18:52:42.846233 kernel: acpiphp: Slot [11] registered Apr 12 18:52:42.846240 kernel: acpiphp: Slot [12] registered Apr 12 18:52:42.846246 kernel: acpiphp: Slot [13] registered Apr 12 18:52:42.846253 kernel: acpiphp: Slot [14] registered Apr 12 18:52:42.846261 kernel: acpiphp: Slot [15] registered Apr 12 18:52:42.846268 kernel: acpiphp: Slot [16] registered Apr 12 18:52:42.846274 kernel: acpiphp: Slot [17] registered Apr 12 18:52:42.846281 kernel: acpiphp: Slot [18] registered Apr 12 18:52:42.846287 kernel: acpiphp: Slot [19] registered Apr 12 18:52:42.846294 kernel: acpiphp: Slot [20] registered Apr 12 18:52:42.846300 kernel: acpiphp: Slot [21] registered Apr 12 18:52:42.846307 kernel: acpiphp: Slot [22] registered Apr 12 18:52:42.846314 kernel: acpiphp: Slot [23] registered Apr 12 18:52:42.846321 kernel: acpiphp: Slot [24] registered Apr 12 18:52:42.846328 kernel: acpiphp: Slot [25] registered Apr 12 18:52:42.846334 kernel: acpiphp: Slot [26] registered Apr 12 18:52:42.846341 kernel: acpiphp: Slot [27] registered Apr 12 18:52:42.846347 kernel: acpiphp: Slot [28] registered Apr 12 18:52:42.846354 kernel: acpiphp: Slot [29] registered Apr 12 18:52:42.846360 kernel: acpiphp: Slot [30] registered Apr 12 18:52:42.846367 kernel: acpiphp: Slot [31] registered Apr 12 18:52:42.846374 kernel: PCI host bridge to bus 0000:00 Apr 12 18:52:42.846446 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Apr 12 18:52:42.846510 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Apr 12 18:52:42.846569 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Apr 12 18:52:42.846629 kernel: pci_bus 0000:00: root bus resource [mem 0x9d000000-0xfebfffff window] Apr 12 18:52:42.846688 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Apr 12 18:52:42.846765 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:52:42.846846 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Apr 12 18:52:42.846943 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Apr 12 18:52:42.847021 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Apr 12 18:52:42.847089 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc0c0-0xc0cf] Apr 12 18:52:42.847158 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Apr 12 18:52:42.847232 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Apr 12 18:52:42.847315 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Apr 12 18:52:42.847397 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Apr 12 18:52:42.847501 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Apr 12 18:52:42.847598 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Apr 12 18:52:42.847694 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Apr 12 18:52:42.847822 kernel: pci 0000:00:02.0: [1234:1111] type 00 class 0x030000 Apr 12 18:52:42.848002 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfd000000-0xfdffffff pref] Apr 12 18:52:42.848190 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfebd0000-0xfebd0fff] Apr 12 18:52:42.848308 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebc0000-0xfebcffff pref] Apr 12 18:52:42.848378 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Apr 12 18:52:42.848464 kernel: pci 0000:00:03.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:52:42.848550 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc080-0xc09f] Apr 12 18:52:42.848655 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebd1000-0xfebd1fff] Apr 12 18:52:42.848752 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe000000-0xfe003fff 64bit pref] Apr 12 18:52:42.848829 kernel: pci 0000:00:04.0: [1af4:1001] type 00 class 0x010000 Apr 12 18:52:42.848966 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc000-0xc07f] Apr 12 18:52:42.849053 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebd2000-0xfebd2fff] Apr 12 18:52:42.849140 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe004000-0xfe007fff 64bit pref] Apr 12 18:52:42.849236 kernel: pci 0000:00:05.0: [1af4:1000] type 00 class 0x020000 Apr 12 18:52:42.849305 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc0a0-0xc0bf] Apr 12 18:52:42.849373 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebd3000-0xfebd3fff] Apr 12 18:52:42.849449 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe008000-0xfe00bfff 64bit pref] Apr 12 18:52:42.849537 kernel: pci 0000:00:05.0: reg 0x30: [mem 0xfeb80000-0xfebbffff pref] Apr 12 18:52:42.849550 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Apr 12 18:52:42.849560 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Apr 12 18:52:42.849569 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Apr 12 18:52:42.849578 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Apr 12 18:52:42.849586 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Apr 12 18:52:42.849593 kernel: iommu: Default domain type: Translated Apr 12 18:52:42.849600 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Apr 12 18:52:42.849694 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Apr 12 18:52:42.849794 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Apr 12 18:52:42.849881 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Apr 12 18:52:42.849907 kernel: vgaarb: loaded Apr 12 18:52:42.849916 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:52:42.849927 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:52:42.849936 kernel: PTP clock support registered Apr 12 18:52:42.849945 kernel: PCI: Using ACPI for IRQ routing Apr 12 18:52:42.849954 kernel: PCI: pci_cache_line_size set to 64 bytes Apr 12 18:52:42.849967 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Apr 12 18:52:42.849977 kernel: e820: reserve RAM buffer [mem 0x9cfdd000-0x9fffffff] Apr 12 18:52:42.849986 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Apr 12 18:52:42.849995 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Apr 12 18:52:42.850004 kernel: clocksource: Switched to clocksource kvm-clock Apr 12 18:52:42.850014 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:52:42.850023 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:52:42.850032 kernel: pnp: PnP ACPI init Apr 12 18:52:42.850121 kernel: pnp 00:02: [dma 2] Apr 12 18:52:42.850135 kernel: pnp: PnP ACPI: found 6 devices Apr 12 18:52:42.850142 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Apr 12 18:52:42.850149 kernel: NET: Registered PF_INET protocol family Apr 12 18:52:42.850155 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:52:42.850162 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:52:42.850169 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:52:42.850176 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:52:42.850183 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:52:42.850191 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:52:42.850198 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:52:42.850205 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:52:42.850211 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:52:42.850218 kernel: NET: Registered PF_XDP protocol family Apr 12 18:52:42.850281 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Apr 12 18:52:42.850342 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Apr 12 18:52:42.850402 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Apr 12 18:52:42.850499 kernel: pci_bus 0000:00: resource 7 [mem 0x9d000000-0xfebfffff window] Apr 12 18:52:42.850562 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Apr 12 18:52:42.850631 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Apr 12 18:52:42.850756 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Apr 12 18:52:42.850828 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Apr 12 18:52:42.850838 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:52:42.850845 kernel: Initialise system trusted keyrings Apr 12 18:52:42.850852 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:52:42.850862 kernel: Key type asymmetric registered Apr 12 18:52:42.850868 kernel: Asymmetric key parser 'x509' registered Apr 12 18:52:42.850875 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:52:42.850882 kernel: io scheduler mq-deadline registered Apr 12 18:52:42.850900 kernel: io scheduler kyber registered Apr 12 18:52:42.850907 kernel: io scheduler bfq registered Apr 12 18:52:42.850914 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Apr 12 18:52:42.850921 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Apr 12 18:52:42.850928 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 10 Apr 12 18:52:42.850936 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Apr 12 18:52:42.850946 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:52:42.850955 kernel: 00:04: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Apr 12 18:52:42.850964 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Apr 12 18:52:42.850973 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Apr 12 18:52:42.850981 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Apr 12 18:52:42.850990 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Apr 12 18:52:42.851082 kernel: rtc_cmos 00:05: RTC can wake from S4 Apr 12 18:52:42.851160 kernel: rtc_cmos 00:05: registered as rtc0 Apr 12 18:52:42.851226 kernel: rtc_cmos 00:05: setting system clock to 2024-04-12T18:52:42 UTC (1712947962) Apr 12 18:52:42.851287 kernel: rtc_cmos 00:05: alarms up to one day, y3k, 242 bytes nvram, hpet irqs Apr 12 18:52:42.851296 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:52:42.851303 kernel: Segment Routing with IPv6 Apr 12 18:52:42.851310 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:52:42.851317 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:52:42.851324 kernel: Key type dns_resolver registered Apr 12 18:52:42.851330 kernel: IPI shorthand broadcast: enabled Apr 12 18:52:42.851337 kernel: sched_clock: Marking stable (452508613, 100634624)->(566940999, -13797762) Apr 12 18:52:42.851346 kernel: registered taskstats version 1 Apr 12 18:52:42.851353 kernel: Loading compiled-in X.509 certificates Apr 12 18:52:42.851360 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 1fa140a38fc6bd27c8b56127e4d1eb4f665c7ec4' Apr 12 18:52:42.851367 kernel: Key type .fscrypt registered Apr 12 18:52:42.851373 kernel: Key type fscrypt-provisioning registered Apr 12 18:52:42.851380 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:52:42.851388 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:52:42.851395 kernel: ima: No architecture policies found Apr 12 18:52:42.851403 kernel: Freeing unused kernel image (initmem) memory: 47440K Apr 12 18:52:42.851410 kernel: Write protecting the kernel read-only data: 28672k Apr 12 18:52:42.851416 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Apr 12 18:52:42.851423 kernel: Freeing unused kernel image (rodata/data gap) memory: 628K Apr 12 18:52:42.851430 kernel: Run /init as init process Apr 12 18:52:42.851437 kernel: with arguments: Apr 12 18:52:42.851443 kernel: /init Apr 12 18:52:42.851450 kernel: with environment: Apr 12 18:52:42.851466 kernel: HOME=/ Apr 12 18:52:42.851475 kernel: TERM=linux Apr 12 18:52:42.851482 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:52:42.851491 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:52:42.851501 systemd[1]: Detected virtualization kvm. Apr 12 18:52:42.851509 systemd[1]: Detected architecture x86-64. Apr 12 18:52:42.851516 systemd[1]: Running in initrd. Apr 12 18:52:42.851524 systemd[1]: No hostname configured, using default hostname. Apr 12 18:52:42.851532 systemd[1]: Hostname set to . Apr 12 18:52:42.851540 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:52:42.851548 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:52:42.851555 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:52:42.851563 systemd[1]: Reached target cryptsetup.target. Apr 12 18:52:42.851570 systemd[1]: Reached target paths.target. Apr 12 18:52:42.851578 systemd[1]: Reached target slices.target. Apr 12 18:52:42.851585 systemd[1]: Reached target swap.target. Apr 12 18:52:42.851592 systemd[1]: Reached target timers.target. Apr 12 18:52:42.851602 systemd[1]: Listening on iscsid.socket. Apr 12 18:52:42.851609 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:52:42.851617 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:52:42.851625 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:52:42.851632 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:52:42.851639 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:52:42.851648 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:52:42.851660 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:52:42.851670 systemd[1]: Reached target sockets.target. Apr 12 18:52:42.851679 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:52:42.851687 systemd[1]: Finished network-cleanup.service. Apr 12 18:52:42.851695 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:52:42.851702 systemd[1]: Starting systemd-journald.service... Apr 12 18:52:42.851710 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:52:42.851719 systemd[1]: Starting systemd-resolved.service... Apr 12 18:52:42.851735 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:52:42.851743 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:52:42.851751 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:52:42.851758 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:52:42.851769 systemd-journald[197]: Journal started Apr 12 18:52:42.851821 systemd-journald[197]: Runtime Journal (/run/log/journal/91596804023d40fb8bb0362fe23d52af) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:52:42.848233 systemd-modules-load[198]: Inserted module 'overlay' Apr 12 18:52:42.886774 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:52:42.886803 systemd[1]: Started systemd-journald.service. Apr 12 18:52:42.871691 systemd-resolved[199]: Positive Trust Anchors: Apr 12 18:52:42.891118 kernel: audit: type=1130 audit(1712947962.886:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.886000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.871700 systemd-resolved[199]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:52:42.896107 kernel: audit: type=1130 audit(1712947962.890:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.871734 systemd-resolved[199]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:52:42.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.873937 systemd-resolved[199]: Defaulting to hostname 'linux'. Apr 12 18:52:42.909925 kernel: audit: type=1130 audit(1712947962.895:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.909939 kernel: audit: type=1130 audit(1712947962.899:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.887235 systemd[1]: Started systemd-resolved.service. Apr 12 18:52:42.891655 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:52:42.896604 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:52:42.900236 systemd[1]: Reached target nss-lookup.target. Apr 12 18:52:42.910960 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:52:42.915820 systemd-modules-load[198]: Inserted module 'br_netfilter' Apr 12 18:52:42.916732 kernel: Bridge firewalling registered Apr 12 18:52:42.924390 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:52:42.928867 kernel: audit: type=1130 audit(1712947962.923:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.925427 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:52:42.933361 dracut-cmdline[214]: dracut-dracut-053 Apr 12 18:52:42.935222 dracut-cmdline[214]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected verity.usrhash=189121f7c8c0a24098d3bb1e040d34611f7c276be43815ff7fe409fce185edaf Apr 12 18:52:42.945947 kernel: SCSI subsystem initialized Apr 12 18:52:42.956945 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:52:42.957016 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:52:42.957031 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:52:42.961044 systemd-modules-load[198]: Inserted module 'dm_multipath' Apr 12 18:52:42.962764 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:52:42.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.967507 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:52:42.969030 kernel: audit: type=1130 audit(1712947962.963:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.974888 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:52:42.979262 kernel: audit: type=1130 audit(1712947962.974:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:42.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.002931 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:52:43.021931 kernel: iscsi: registered transport (tcp) Apr 12 18:52:43.043927 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:52:43.043958 kernel: QLogic iSCSI HBA Driver Apr 12 18:52:43.074866 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:52:43.079456 kernel: audit: type=1130 audit(1712947963.074:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.074000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.079489 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:52:43.125934 kernel: raid6: avx2x4 gen() 29059 MB/s Apr 12 18:52:43.142915 kernel: raid6: avx2x4 xor() 7130 MB/s Apr 12 18:52:43.159915 kernel: raid6: avx2x2 gen() 30206 MB/s Apr 12 18:52:43.176911 kernel: raid6: avx2x2 xor() 18806 MB/s Apr 12 18:52:43.193913 kernel: raid6: avx2x1 gen() 25655 MB/s Apr 12 18:52:43.210912 kernel: raid6: avx2x1 xor() 15295 MB/s Apr 12 18:52:43.227922 kernel: raid6: sse2x4 gen() 14422 MB/s Apr 12 18:52:43.244916 kernel: raid6: sse2x4 xor() 6822 MB/s Apr 12 18:52:43.261922 kernel: raid6: sse2x2 gen() 15886 MB/s Apr 12 18:52:43.278912 kernel: raid6: sse2x2 xor() 9752 MB/s Apr 12 18:52:43.295912 kernel: raid6: sse2x1 gen() 12301 MB/s Apr 12 18:52:43.313345 kernel: raid6: sse2x1 xor() 7604 MB/s Apr 12 18:52:43.313357 kernel: raid6: using algorithm avx2x2 gen() 30206 MB/s Apr 12 18:52:43.313377 kernel: raid6: .... xor() 18806 MB/s, rmw enabled Apr 12 18:52:43.314113 kernel: raid6: using avx2x2 recovery algorithm Apr 12 18:52:43.326915 kernel: xor: automatically using best checksumming function avx Apr 12 18:52:43.415942 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Apr 12 18:52:43.423271 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:52:43.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.424000 audit: BPF prog-id=7 op=LOAD Apr 12 18:52:43.427000 audit: BPF prog-id=8 op=LOAD Apr 12 18:52:43.427916 kernel: audit: type=1130 audit(1712947963.422:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.428165 systemd[1]: Starting systemd-udevd.service... Apr 12 18:52:43.440056 systemd-udevd[399]: Using default interface naming scheme 'v252'. Apr 12 18:52:43.443502 systemd[1]: Started systemd-udevd.service. Apr 12 18:52:43.442000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.444427 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:52:43.453958 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Apr 12 18:52:43.475913 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:52:43.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.477106 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:52:43.509740 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:52:43.510000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:43.556595 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:52:43.557909 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:52:43.567932 kernel: libata version 3.00 loaded. Apr 12 18:52:43.571086 kernel: ata_piix 0000:00:01.1: version 2.13 Apr 12 18:52:43.571909 kernel: AVX2 version of gcm_enc/dec engaged. Apr 12 18:52:43.571931 kernel: AES CTR mode by8 optimization enabled Apr 12 18:52:43.572920 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:52:43.572959 kernel: GPT:9289727 != 19775487 Apr 12 18:52:43.572978 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:52:43.572988 kernel: GPT:9289727 != 19775487 Apr 12 18:52:43.572996 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:52:43.573004 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:52:43.577936 kernel: scsi host0: ata_piix Apr 12 18:52:43.647411 kernel: scsi host1: ata_piix Apr 12 18:52:43.647579 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc0c0 irq 14 Apr 12 18:52:43.647591 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc0c8 irq 15 Apr 12 18:52:43.657910 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (454) Apr 12 18:52:43.660888 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:52:43.698062 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:52:43.699233 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:52:43.702537 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:52:43.709871 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:52:43.711583 systemd[1]: Starting disk-uuid.service... Apr 12 18:52:43.721457 disk-uuid[522]: Primary Header is updated. Apr 12 18:52:43.721457 disk-uuid[522]: Secondary Entries is updated. Apr 12 18:52:43.721457 disk-uuid[522]: Secondary Header is updated. Apr 12 18:52:43.725299 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:52:43.728938 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:52:43.805988 kernel: ata2.00: ATAPI: QEMU DVD-ROM, 2.5+, max UDMA/100 Apr 12 18:52:43.808018 kernel: scsi 1:0:0:0: CD-ROM QEMU QEMU DVD-ROM 2.5+ PQ: 0 ANSI: 5 Apr 12 18:52:43.840419 kernel: sr 1:0:0:0: [sr0] scsi3-mmc drive: 4x/4x cd/rw xa/form2 tray Apr 12 18:52:43.840729 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Apr 12 18:52:43.857922 kernel: sr 1:0:0:0: Attached scsi CD-ROM sr0 Apr 12 18:52:44.729870 disk-uuid[523]: The operation has completed successfully. Apr 12 18:52:44.731564 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:52:44.755543 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:52:44.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.755641 systemd[1]: Finished disk-uuid.service. Apr 12 18:52:44.761864 systemd[1]: Starting verity-setup.service... Apr 12 18:52:44.773925 kernel: device-mapper: verity: sha256 using implementation "sha256-ni" Apr 12 18:52:44.792140 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:52:44.794475 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:52:44.797816 systemd[1]: Finished verity-setup.service. Apr 12 18:52:44.796000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.860852 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:52:44.862457 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:52:44.862545 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:52:44.864745 systemd[1]: Starting ignition-setup.service... Apr 12 18:52:44.867079 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:52:44.881161 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:44.881218 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:52:44.881231 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:52:44.890151 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:52:44.898135 systemd[1]: Finished ignition-setup.service. Apr 12 18:52:44.899879 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:52:44.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.953000 audit: BPF prog-id=9 op=LOAD Apr 12 18:52:44.950001 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:52:44.954716 systemd[1]: Starting systemd-networkd.service... Apr 12 18:52:44.964515 ignition[643]: Ignition 2.14.0 Apr 12 18:52:44.964523 ignition[643]: Stage: fetch-offline Apr 12 18:52:44.964622 ignition[643]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:44.964631 ignition[643]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:44.964749 ignition[643]: parsed url from cmdline: "" Apr 12 18:52:44.964753 ignition[643]: no config URL provided Apr 12 18:52:44.964757 ignition[643]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:52:44.964763 ignition[643]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:52:44.964779 ignition[643]: op(1): [started] loading QEMU firmware config module Apr 12 18:52:44.964786 ignition[643]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:52:44.968439 ignition[643]: op(1): [finished] loading QEMU firmware config module Apr 12 18:52:44.988223 systemd-networkd[715]: lo: Link UP Apr 12 18:52:44.988235 systemd-networkd[715]: lo: Gained carrier Apr 12 18:52:44.988745 systemd-networkd[715]: Enumeration completed Apr 12 18:52:44.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:44.989011 systemd-networkd[715]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:52:44.989099 systemd[1]: Started systemd-networkd.service. Apr 12 18:52:44.990558 systemd[1]: Reached target network.target. Apr 12 18:52:44.990915 systemd-networkd[715]: eth0: Link UP Apr 12 18:52:44.990919 systemd-networkd[715]: eth0: Gained carrier Apr 12 18:52:44.993459 systemd[1]: Starting iscsiuio.service... Apr 12 18:52:45.025779 systemd[1]: Started iscsiuio.service. Apr 12 18:52:45.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.029416 systemd[1]: Starting iscsid.service... Apr 12 18:52:45.033778 iscsid[722]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:45.033778 iscsid[722]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:52:45.033778 iscsid[722]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:52:45.033778 iscsid[722]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:52:45.033778 iscsid[722]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:52:45.033778 iscsid[722]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:52:45.048102 systemd[1]: Started iscsid.service. Apr 12 18:52:45.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.050715 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:52:45.063123 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:52:45.062000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.063788 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:52:45.064265 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:52:45.064466 systemd[1]: Reached target remote-fs.target. Apr 12 18:52:45.065467 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:52:45.074528 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:52:45.075000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.092320 ignition[643]: parsing config with SHA512: b75b66941c6d6fe693ed4a52b1ee6b847b3b111011dafe24ad9642668305403275b5a29549dbd8b260752ba8ba0a18be0cfa29a9decac80c6d643e3a4c20f8ce Apr 12 18:52:45.101954 systemd-networkd[715]: eth0: DHCPv4 address 10.0.0.104/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:52:45.129097 unknown[643]: fetched base config from "system" Apr 12 18:52:45.129108 unknown[643]: fetched user config from "qemu" Apr 12 18:52:45.131158 ignition[643]: fetch-offline: fetch-offline passed Apr 12 18:52:45.132009 ignition[643]: Ignition finished successfully Apr 12 18:52:45.133764 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:52:45.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.134362 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:52:45.136759 systemd[1]: Starting ignition-kargs.service... Apr 12 18:52:45.145160 ignition[736]: Ignition 2.14.0 Apr 12 18:52:45.145168 ignition[736]: Stage: kargs Apr 12 18:52:45.145259 ignition[736]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:45.145269 ignition[736]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:45.146249 ignition[736]: kargs: kargs passed Apr 12 18:52:45.146281 ignition[736]: Ignition finished successfully Apr 12 18:52:45.150546 systemd[1]: Finished ignition-kargs.service. Apr 12 18:52:45.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.151886 systemd[1]: Starting ignition-disks.service... Apr 12 18:52:45.161075 ignition[742]: Ignition 2.14.0 Apr 12 18:52:45.161083 ignition[742]: Stage: disks Apr 12 18:52:45.161186 ignition[742]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:45.161195 ignition[742]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:45.162598 ignition[742]: disks: disks passed Apr 12 18:52:45.162631 ignition[742]: Ignition finished successfully Apr 12 18:52:45.166013 systemd[1]: Finished ignition-disks.service. Apr 12 18:52:45.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.166489 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:52:45.167912 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:52:45.169540 systemd[1]: Reached target local-fs.target. Apr 12 18:52:45.171205 systemd[1]: Reached target sysinit.target. Apr 12 18:52:45.172415 systemd[1]: Reached target basic.target. Apr 12 18:52:45.174679 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:52:45.184107 systemd-fsck[750]: ROOT: clean, 612/553520 files, 56019/553472 blocks Apr 12 18:52:45.189562 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:52:45.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.190980 systemd[1]: Mounting sysroot.mount... Apr 12 18:52:45.196924 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:52:45.196904 systemd[1]: Mounted sysroot.mount. Apr 12 18:52:45.197326 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:52:45.198437 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:52:45.201189 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:52:45.201225 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:52:45.201242 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:52:45.204130 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:52:45.206623 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:52:45.212471 initrd-setup-root[760]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:52:45.215946 initrd-setup-root[768]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:52:45.218442 initrd-setup-root[776]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:52:45.222097 initrd-setup-root[784]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:52:45.252434 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:52:45.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.253956 systemd[1]: Starting ignition-mount.service... Apr 12 18:52:45.255277 systemd[1]: Starting sysroot-boot.service... Apr 12 18:52:45.259221 bash[801]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:52:45.270951 systemd[1]: Finished sysroot-boot.service. Apr 12 18:52:45.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.272745 ignition[803]: INFO : Ignition 2.14.0 Apr 12 18:52:45.272745 ignition[803]: INFO : Stage: mount Apr 12 18:52:45.272745 ignition[803]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:45.272745 ignition[803]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:45.276975 ignition[803]: INFO : mount: mount passed Apr 12 18:52:45.277768 ignition[803]: INFO : Ignition finished successfully Apr 12 18:52:45.279220 systemd[1]: Finished ignition-mount.service. Apr 12 18:52:45.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:45.803446 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:52:45.808919 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (811) Apr 12 18:52:45.808976 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Apr 12 18:52:45.811633 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:52:45.811667 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:52:45.814583 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:52:45.815462 systemd[1]: Starting ignition-files.service... Apr 12 18:52:45.832932 ignition[831]: INFO : Ignition 2.14.0 Apr 12 18:52:45.832932 ignition[831]: INFO : Stage: files Apr 12 18:52:45.834532 ignition[831]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:45.834532 ignition[831]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:45.837654 ignition[831]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:52:45.839062 ignition[831]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:52:45.839062 ignition[831]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:52:45.842795 ignition[831]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:52:45.844166 ignition[831]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:52:45.844166 ignition[831]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:52:45.843284 unknown[831]: wrote ssh authorized keys file for user: core Apr 12 18:52:45.849318 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:45.851188 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Apr 12 18:52:46.229461 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:52:46.348011 systemd-networkd[715]: eth0: Gained IPv6LL Apr 12 18:52:46.576574 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Apr 12 18:52:46.576574 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Apr 12 18:52:46.581536 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:46.581536 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Apr 12 18:52:46.885040 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:52:46.963032 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Apr 12 18:52:46.966768 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Apr 12 18:52:46.966768 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:52:46.966768 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Apr 12 18:52:46.993172 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:52:47.078739 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Apr 12 18:52:47.081338 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:47.081338 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubeadm: attempt #1 Apr 12 18:52:47.159038 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:52:47.365374 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 4261cb0319688a0557b3052cce8df9d754abc38d5fc8e0eeeb63a85a2194895fdca5bad464f8516459ed7b1764d7bbb2304f5f434d42bb35f38764b4b00ce663 Apr 12 18:52:47.368406 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:52:47.368406 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:47.368406 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubelet: attempt #1 Apr 12 18:52:47.434933 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:52:48.107815 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: d3fef1d4b99415179ecb94d4de953bddb74c0fb0f798265829b899bb031e2ab8c2b60037b79a66405a9b102d3db0d90e9257595f4b11660356de0e2e63744cd7 Apr 12 18:52:48.111621 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:52:48.111621 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:48.111621 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/amd64/kubectl: attempt #1 Apr 12 18:52:48.163673 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:52:48.386029 ignition[831]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: a2de71807eb4c41f4d70e5c47fac72ecf3c74984be6c08be0597fc58621baeeddc1b5cc6431ab007eee9bd0a98f8628dd21512b06daaeccfac5837e9792a98a7 Apr 12 18:52:48.386029 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:48.391437 ignition[831]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:52:48.391437 ignition[831]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:52:48.391437 ignition[831]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:48.391437 ignition[831]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:52:48.391437 ignition[831]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:52:48.391437 ignition[831]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:52:48.426229 ignition[831]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:52:48.471626 ignition[831]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:52:48.473319 ignition[831]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:52:48.473319 ignition[831]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:48.473319 ignition[831]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:52:48.473319 ignition[831]: INFO : files: files passed Apr 12 18:52:48.473319 ignition[831]: INFO : Ignition finished successfully Apr 12 18:52:48.491783 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:52:48.491804 kernel: audit: type=1130 audit(1712947968.475:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.491815 kernel: audit: type=1130 audit(1712947968.485:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.491826 kernel: audit: type=1130 audit(1712947968.490:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.475000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.485000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.473357 systemd[1]: Finished ignition-files.service. Apr 12 18:52:48.500559 kernel: audit: type=1131 audit(1712947968.490:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.490000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.476997 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:52:48.482254 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:52:48.503680 initrd-setup-root-after-ignition[854]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:52:48.483094 systemd[1]: Starting ignition-quench.service... Apr 12 18:52:48.506166 initrd-setup-root-after-ignition[856]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:52:48.484833 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:52:48.486529 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:52:48.486597 systemd[1]: Finished ignition-quench.service. Apr 12 18:52:48.491872 systemd[1]: Reached target ignition-complete.target. Apr 12 18:52:48.499777 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:52:48.511977 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:52:48.522818 kernel: audit: type=1130 audit(1712947968.512:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.522839 kernel: audit: type=1131 audit(1712947968.512:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.512000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.512000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.512052 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:52:48.513349 systemd[1]: Reached target initrd-fs.target. Apr 12 18:52:48.522830 systemd[1]: Reached target initrd.target. Apr 12 18:52:48.523622 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:52:48.524218 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:52:48.534046 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:52:48.540233 kernel: audit: type=1130 audit(1712947968.534:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.535479 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:52:48.544554 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:52:48.545479 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:52:48.547147 systemd[1]: Stopped target timers.target. Apr 12 18:52:48.548823 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:52:48.555735 kernel: audit: type=1131 audit(1712947968.550:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.548917 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:52:48.550387 systemd[1]: Stopped target initrd.target. Apr 12 18:52:48.555886 systemd[1]: Stopped target basic.target. Apr 12 18:52:48.557318 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:52:48.558877 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:52:48.560412 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:52:48.562133 systemd[1]: Stopped target remote-fs.target. Apr 12 18:52:48.563840 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:52:48.565491 systemd[1]: Stopped target sysinit.target. Apr 12 18:52:48.566986 systemd[1]: Stopped target local-fs.target. Apr 12 18:52:48.568485 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:52:48.570004 systemd[1]: Stopped target swap.target. Apr 12 18:52:48.577213 kernel: audit: type=1131 audit(1712947968.572:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.572000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.571401 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:52:48.571504 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:52:48.583431 kernel: audit: type=1131 audit(1712947968.578:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.578000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.573078 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:52:48.582000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.577250 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:52:48.577338 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:52:48.579082 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:52:48.579196 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:52:48.583557 systemd[1]: Stopped target paths.target. Apr 12 18:52:48.584970 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:52:48.588938 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:52:48.590229 systemd[1]: Stopped target slices.target. Apr 12 18:52:48.591995 systemd[1]: Stopped target sockets.target. Apr 12 18:52:48.593549 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:52:48.596000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.593622 systemd[1]: Closed iscsid.socket. Apr 12 18:52:48.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.594936 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:52:48.595026 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:52:48.596649 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:52:48.596740 systemd[1]: Stopped ignition-files.service. Apr 12 18:52:48.599248 systemd[1]: Stopping ignition-mount.service... Apr 12 18:52:48.601075 systemd[1]: Stopping iscsiuio.service... Apr 12 18:52:48.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.608496 ignition[871]: INFO : Ignition 2.14.0 Apr 12 18:52:48.608496 ignition[871]: INFO : Stage: umount Apr 12 18:52:48.608496 ignition[871]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:52:48.608496 ignition[871]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:52:48.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.611000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.603922 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:52:48.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.614988 ignition[871]: INFO : umount: umount passed Apr 12 18:52:48.614988 ignition[871]: INFO : Ignition finished successfully Apr 12 18:52:48.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.605107 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:52:48.621000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.605283 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:52:48.606960 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:52:48.622000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.607079 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:52:48.610532 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:52:48.610618 systemd[1]: Stopped iscsiuio.service. Apr 12 18:52:48.612408 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:52:48.612477 systemd[1]: Stopped ignition-mount.service. Apr 12 18:52:48.630000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.615057 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:52:48.615122 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:52:48.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.617342 systemd[1]: Stopped target network.target. Apr 12 18:52:48.618413 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:52:48.618442 systemd[1]: Closed iscsiuio.socket. Apr 12 18:52:48.636000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.619216 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:52:48.619247 systemd[1]: Stopped ignition-disks.service. Apr 12 18:52:48.621293 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:52:48.621322 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:52:48.643000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:52:48.645000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.622968 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:52:48.647000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.622996 systemd[1]: Stopped ignition-setup.service. Apr 12 18:52:48.648000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.624747 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:52:48.626365 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:52:48.628968 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:52:48.629364 systemd-networkd[715]: eth0: DHCPv6 lease lost Apr 12 18:52:48.651000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:52:48.629485 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:52:48.629583 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:52:48.656000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.630683 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:52:48.630719 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:52:48.632320 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:52:48.632390 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:52:48.660000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.636166 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:52:48.636237 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:52:48.639842 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:52:48.639873 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:52:48.665000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.642264 systemd[1]: Stopping network-cleanup.service... Apr 12 18:52:48.669000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.643362 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:52:48.643401 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:52:48.645198 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:52:48.673000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.645230 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:52:48.675000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.647160 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:52:48.647191 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:52:48.649089 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:52:48.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.679000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:48.651692 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:52:48.654949 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:52:48.655022 systemd[1]: Stopped network-cleanup.service. Apr 12 18:52:48.658462 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:52:48.658560 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:52:48.662062 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:52:48.662093 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:52:48.662996 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:52:48.663020 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:52:48.664544 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:52:48.664590 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:52:48.666451 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:52:48.666506 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:52:48.667980 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:52:48.668014 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:52:48.670424 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:52:48.671609 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Apr 12 18:52:48.671661 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Apr 12 18:52:48.674400 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:52:48.674449 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:52:48.675477 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:52:48.675520 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:52:48.677854 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Apr 12 18:52:48.678253 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:52:48.678323 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:52:48.680068 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:52:48.682182 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:52:48.698776 systemd[1]: Switching root. Apr 12 18:52:48.717593 iscsid[722]: iscsid shutting down. Apr 12 18:52:48.718394 systemd-journald[197]: Received SIGTERM from PID 1 (systemd). Apr 12 18:52:48.718435 systemd-journald[197]: Journal stopped Apr 12 18:52:52.589737 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:52:52.589773 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:52:52.589784 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:52:52.589793 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:52:52.589804 kernel: SELinux: policy capability open_perms=1 Apr 12 18:52:52.589816 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:52:52.589830 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:52:52.589839 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:52:52.589851 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:52:52.589859 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:52:52.589869 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:52:52.589879 systemd[1]: Successfully loaded SELinux policy in 40.264ms. Apr 12 18:52:52.589906 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.645ms. Apr 12 18:52:52.589918 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:52:52.589928 systemd[1]: Detected virtualization kvm. Apr 12 18:52:52.589946 systemd[1]: Detected architecture x86-64. Apr 12 18:52:52.589956 systemd[1]: Detected first boot. Apr 12 18:52:52.589966 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:52:52.589976 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:52:52.589985 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:52:52.589995 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:52:52.590010 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:52:52.590023 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:52:52.590033 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:52:52.590043 systemd[1]: Stopped iscsid.service. Apr 12 18:52:52.590053 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:52:52.590062 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:52:52.590072 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:52:52.590082 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:52:52.590095 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:52:52.590105 systemd[1]: Created slice system-getty.slice. Apr 12 18:52:52.590116 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:52:52.590126 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:52:52.590136 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:52:52.590146 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:52:52.590155 systemd[1]: Created slice user.slice. Apr 12 18:52:52.590171 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:52:52.590181 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:52:52.590191 systemd[1]: Set up automount boot.automount. Apr 12 18:52:52.590200 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:52:52.590212 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:52:52.590222 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:52:52.590232 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:52:52.590242 systemd[1]: Reached target integritysetup.target. Apr 12 18:52:52.590252 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:52:52.590261 systemd[1]: Reached target remote-fs.target. Apr 12 18:52:52.590271 systemd[1]: Reached target slices.target. Apr 12 18:52:52.590282 systemd[1]: Reached target swap.target. Apr 12 18:52:52.590293 systemd[1]: Reached target torcx.target. Apr 12 18:52:52.590304 systemd[1]: Reached target veritysetup.target. Apr 12 18:52:52.590316 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:52:52.590328 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:52:52.590340 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:52:52.590352 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:52:52.590365 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:52:52.590377 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:52:52.590389 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:52:52.590410 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:52:52.590422 systemd[1]: Mounting media.mount... Apr 12 18:52:52.590435 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:52:52.590447 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:52:52.590459 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:52:52.590478 systemd[1]: Mounting tmp.mount... Apr 12 18:52:52.590490 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:52:52.590502 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:52:52.590515 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:52:52.590528 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:52:52.590538 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:52:52.590547 systemd[1]: Starting modprobe@drm.service... Apr 12 18:52:52.590557 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:52:52.590567 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:52:52.590577 systemd[1]: Starting modprobe@loop.service... Apr 12 18:52:52.590588 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:52:52.590598 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:52:52.590608 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:52:52.590619 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:52:52.590629 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:52:52.590639 systemd[1]: Stopped systemd-journald.service. Apr 12 18:52:52.590654 kernel: fuse: init (API version 7.34) Apr 12 18:52:52.590663 kernel: loop: module loaded Apr 12 18:52:52.590673 systemd[1]: Starting systemd-journald.service... Apr 12 18:52:52.590683 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:52:52.590693 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:52:52.590703 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:52:52.590714 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:52:52.590724 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:52:52.590733 systemd[1]: Stopped verity-setup.service. Apr 12 18:52:52.590743 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Apr 12 18:52:52.590755 systemd-journald[981]: Journal started Apr 12 18:52:52.590791 systemd-journald[981]: Runtime Journal (/run/log/journal/91596804023d40fb8bb0362fe23d52af) is 6.0M, max 48.5M, 42.5M free. Apr 12 18:52:48.776000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:52:49.330000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:52:49.331000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:52:49.331000 audit: BPF prog-id=10 op=LOAD Apr 12 18:52:49.331000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:52:49.331000 audit: BPF prog-id=11 op=LOAD Apr 12 18:52:49.331000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:52:49.361000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:52:49.361000 audit[904]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c0001d58b2 a1=c0000d8de0 a2=c0000e10c0 a3=32 items=0 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:49.361000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:52:49.363000 audit[904]: AVC avc: denied { associate } for pid=904 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:52:49.363000 audit[904]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0001d5989 a2=1ed a3=0 items=2 ppid=887 pid=904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:49.363000 audit: CWD cwd="/" Apr 12 18:52:49.363000 audit: PATH item=0 name=(null) inode=2 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:49.363000 audit: PATH item=1 name=(null) inode=3 dev=00:1b mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:49.363000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:52:52.422000 audit: BPF prog-id=12 op=LOAD Apr 12 18:52:52.422000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:52:52.422000 audit: BPF prog-id=13 op=LOAD Apr 12 18:52:52.422000 audit: BPF prog-id=14 op=LOAD Apr 12 18:52:52.422000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:52:52.422000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:52:52.423000 audit: BPF prog-id=15 op=LOAD Apr 12 18:52:52.423000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:52:52.423000 audit: BPF prog-id=16 op=LOAD Apr 12 18:52:52.423000 audit: BPF prog-id=17 op=LOAD Apr 12 18:52:52.423000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:52:52.423000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:52:52.423000 audit: BPF prog-id=18 op=LOAD Apr 12 18:52:52.423000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:52:52.424000 audit: BPF prog-id=19 op=LOAD Apr 12 18:52:52.424000 audit: BPF prog-id=20 op=LOAD Apr 12 18:52:52.424000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:52:52.424000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:52:52.424000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.427000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.434000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:52:52.565000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.567000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.570000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.570000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.571000 audit: BPF prog-id=21 op=LOAD Apr 12 18:52:52.571000 audit: BPF prog-id=22 op=LOAD Apr 12 18:52:52.571000 audit: BPF prog-id=23 op=LOAD Apr 12 18:52:52.571000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:52:52.571000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:52:52.587000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:52:52.587000 audit[981]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=3 a1=7ffdfe09aa60 a2=4000 a3=7ffdfe09aafc items=0 ppid=1 pid=981 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:52.587000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:52:52.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:49.360781 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:52:52.421150 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:52:49.360997 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:52:52.421160 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:52:49.361013 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:52:52.425353 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:52:49.361036 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:52:49.361046 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:52:49.361071 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:52:49.361082 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:52:49.361256 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:52:49.361289 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:52:49.361301 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:52:49.361888 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:52:49.361931 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:52:49.361946 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:52:49.361959 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:52:49.361972 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:52:49.361984 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:49Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:52:52.163355 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:52.163634 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:52.163730 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:52.163915 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:52:52.163986 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:52:52.164054 /usr/lib/systemd/system-generators/torcx-generator[904]: time="2024-04-12T18:52:52Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:52:52.593914 systemd[1]: Started systemd-journald.service. Apr 12 18:52:52.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.595155 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:52:52.596388 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:52:52.597168 systemd[1]: Mounted media.mount. Apr 12 18:52:52.597972 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:52:52.598812 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:52:52.599669 systemd[1]: Mounted tmp.mount. Apr 12 18:52:52.600481 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:52:52.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.601451 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:52:52.601000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.602444 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:52:52.602578 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:52:52.602000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.603577 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:52:52.603691 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:52:52.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.604726 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:52:52.604829 systemd[1]: Finished modprobe@drm.service. Apr 12 18:52:52.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.605000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.605771 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:52:52.605873 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:52:52.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.606919 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:52:52.607040 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:52:52.606000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.608011 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:52:52.608116 systemd[1]: Finished modprobe@loop.service. Apr 12 18:52:52.608000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.608000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.609272 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:52:52.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.610392 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:52:52.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.611635 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:52:52.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.613003 systemd[1]: Reached target network-pre.target. Apr 12 18:52:52.615108 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:52:52.617070 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:52:52.617908 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:52:52.619371 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:52:52.621265 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:52:52.622522 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:52:52.623620 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:52:52.624669 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:52:52.625865 systemd-journald[981]: Time spent on flushing to /var/log/journal/91596804023d40fb8bb0362fe23d52af is 20.584ms for 1132 entries. Apr 12 18:52:52.625865 systemd-journald[981]: System Journal (/var/log/journal/91596804023d40fb8bb0362fe23d52af) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:52:52.796764 systemd-journald[981]: Received client request to flush runtime journal. Apr 12 18:52:52.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.693000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.627532 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:52:52.630287 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:52:52.688727 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:52:52.689983 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:52:52.692333 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:52:52.797731 udevadm[1011]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:52:52.797000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:52.693569 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:52:52.694619 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:52:52.704303 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:52:52.706726 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:52:52.709488 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:52:52.711933 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:52:52.782807 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:52:52.797782 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:52:53.287517 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:52:53.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.288000 audit: BPF prog-id=24 op=LOAD Apr 12 18:52:53.288000 audit: BPF prog-id=25 op=LOAD Apr 12 18:52:53.288000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:52:53.288000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:52:53.289853 systemd[1]: Starting systemd-udevd.service... Apr 12 18:52:53.304295 systemd-udevd[1013]: Using default interface naming scheme 'v252'. Apr 12 18:52:53.316688 systemd[1]: Started systemd-udevd.service. Apr 12 18:52:53.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.317000 audit: BPF prog-id=26 op=LOAD Apr 12 18:52:53.319028 systemd[1]: Starting systemd-networkd.service... Apr 12 18:52:53.323000 audit: BPF prog-id=27 op=LOAD Apr 12 18:52:53.323000 audit: BPF prog-id=28 op=LOAD Apr 12 18:52:53.323000 audit: BPF prog-id=29 op=LOAD Apr 12 18:52:53.325287 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:52:53.356159 systemd[1]: Started systemd-userdbd.service. Apr 12 18:52:53.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.367941 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Apr 12 18:52:53.370597 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Apr 12 18:52:53.374050 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:52:53.376958 kernel: ACPI: button: Power Button [PWRF] Apr 12 18:52:53.397699 systemd-networkd[1023]: lo: Link UP Apr 12 18:52:53.397710 systemd-networkd[1023]: lo: Gained carrier Apr 12 18:52:53.398106 systemd-networkd[1023]: Enumeration completed Apr 12 18:52:53.398185 systemd[1]: Started systemd-networkd.service. Apr 12 18:52:53.398739 systemd-networkd[1023]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:52:53.398000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.399855 systemd-networkd[1023]: eth0: Link UP Apr 12 18:52:53.399949 systemd-networkd[1023]: eth0: Gained carrier Apr 12 18:52:53.398000 audit[1033]: AVC avc: denied { confidentiality } for pid=1033 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Apr 12 18:52:53.398000 audit[1033]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5604c5e90f50 a1=32194 a2=7f619f197bc5 a3=5 items=108 ppid=1013 pid=1033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:53.398000 audit: CWD cwd="/" Apr 12 18:52:53.398000 audit: PATH item=0 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=1 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=2 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=3 name=(null) inode=16414 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=4 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=5 name=(null) inode=16415 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=6 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=7 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=8 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=9 name=(null) inode=16417 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=10 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=11 name=(null) inode=16418 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=12 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=13 name=(null) inode=16419 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=14 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=15 name=(null) inode=16420 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=16 name=(null) inode=16416 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=17 name=(null) inode=16421 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=18 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=19 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=20 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=21 name=(null) inode=16423 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=22 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=23 name=(null) inode=16424 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=24 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=25 name=(null) inode=16425 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=26 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=27 name=(null) inode=16426 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=28 name=(null) inode=16422 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=29 name=(null) inode=16427 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=30 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=31 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=32 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=33 name=(null) inode=16429 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=34 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=35 name=(null) inode=16430 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=36 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=37 name=(null) inode=16431 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=38 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=39 name=(null) inode=16432 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=40 name=(null) inode=16428 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=41 name=(null) inode=16433 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=42 name=(null) inode=16413 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=43 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=44 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=45 name=(null) inode=16435 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=46 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=47 name=(null) inode=16436 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=48 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=49 name=(null) inode=16437 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=50 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=51 name=(null) inode=16438 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=52 name=(null) inode=16434 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=53 name=(null) inode=16439 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=54 name=(null) inode=1041 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=55 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=56 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=57 name=(null) inode=16441 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=58 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=59 name=(null) inode=16442 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=60 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=61 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=62 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=63 name=(null) inode=16444 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=64 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=65 name=(null) inode=16445 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=66 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=67 name=(null) inode=16446 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=68 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=69 name=(null) inode=16447 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=70 name=(null) inode=16443 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=71 name=(null) inode=16448 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=72 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=73 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=74 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=75 name=(null) inode=16450 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=76 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=77 name=(null) inode=16451 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=78 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=79 name=(null) inode=16452 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=80 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=81 name=(null) inode=16453 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=82 name=(null) inode=16449 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=83 name=(null) inode=16454 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=84 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=85 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=86 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=87 name=(null) inode=16456 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=88 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=89 name=(null) inode=16457 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=90 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=91 name=(null) inode=16458 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=92 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=93 name=(null) inode=16459 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=94 name=(null) inode=16455 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=95 name=(null) inode=16460 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=96 name=(null) inode=16440 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=97 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=98 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=99 name=(null) inode=16462 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=100 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=101 name=(null) inode=16463 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=102 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=103 name=(null) inode=16464 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=104 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=105 name=(null) inode=16465 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=106 name=(null) inode=16461 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PATH item=107 name=(null) inode=16466 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:52:53.398000 audit: PROCTITLE proctitle="(udev-worker)" Apr 12 18:52:53.413919 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Apr 12 18:52:53.414110 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Apr 12 18:52:53.416927 kernel: mousedev: PS/2 mouse device common for all mice Apr 12 18:52:53.417090 systemd-networkd[1023]: eth0: DHCPv4 address 10.0.0.104/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:52:53.477122 kernel: kvm: Nested Virtualization enabled Apr 12 18:52:53.477228 kernel: SVM: kvm: Nested Paging enabled Apr 12 18:52:53.477246 kernel: SVM: Virtual VMLOAD VMSAVE supported Apr 12 18:52:53.478378 kernel: SVM: Virtual GIF supported Apr 12 18:52:53.491914 kernel: EDAC MC: Ver: 3.0.0 Apr 12 18:52:53.511182 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:52:53.511000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.513044 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:52:53.516500 kernel: kauditd_printk_skb: 231 callbacks suppressed Apr 12 18:52:53.516537 kernel: audit: type=1130 audit(1712947973.511:155): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.520406 lvm[1050]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:52:53.551680 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:52:53.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.552713 systemd[1]: Reached target cryptsetup.target. Apr 12 18:52:53.555905 kernel: audit: type=1130 audit(1712947973.551:156): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.557846 systemd[1]: Starting lvm2-activation.service... Apr 12 18:52:53.561743 lvm[1051]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:52:53.584465 systemd[1]: Finished lvm2-activation.service. Apr 12 18:52:53.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.585406 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:52:53.589374 kernel: audit: type=1130 audit(1712947973.585:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.589398 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:52:53.589419 systemd[1]: Reached target local-fs.target. Apr 12 18:52:53.590253 systemd[1]: Reached target machines.target. Apr 12 18:52:53.591917 systemd[1]: Starting ldconfig.service... Apr 12 18:52:53.592889 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:52:53.592993 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:53.593823 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:52:53.595403 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:52:53.597797 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:52:53.599041 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:52:53.599073 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:52:53.599760 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:52:53.601987 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1053 (bootctl) Apr 12 18:52:53.602818 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:52:53.609815 systemd-tmpfiles[1056]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:52:53.609999 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:52:53.610328 systemd-tmpfiles[1056]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:52:53.611561 systemd-tmpfiles[1056]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:52:53.611000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.615948 kernel: audit: type=1130 audit(1712947973.611:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.638343 systemd-fsck[1061]: fsck.fat 4.2 (2021-01-31) Apr 12 18:52:53.638343 systemd-fsck[1061]: /dev/vda1: 789 files, 119240/258078 clusters Apr 12 18:52:53.641000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.639669 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:52:53.642574 systemd[1]: Mounting boot.mount... Apr 12 18:52:53.645918 kernel: audit: type=1130 audit(1712947973.641:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.654213 systemd[1]: Mounted boot.mount. Apr 12 18:52:53.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.667524 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:52:53.672922 kernel: audit: type=1130 audit(1712947973.668:160): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:53.705475 ldconfig[1052]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:52:54.304062 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:52:54.304000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.307570 systemd[1]: Starting audit-rules.service... Apr 12 18:52:54.309927 kernel: audit: type=1130 audit(1712947974.304:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.311252 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:52:54.313412 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:52:54.317139 kernel: audit: type=1334 audit(1712947974.314:162): prog-id=30 op=LOAD Apr 12 18:52:54.314000 audit: BPF prog-id=30 op=LOAD Apr 12 18:52:54.316105 systemd[1]: Starting systemd-resolved.service... Apr 12 18:52:54.318000 audit: BPF prog-id=31 op=LOAD Apr 12 18:52:54.319622 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:52:54.322932 kernel: audit: type=1334 audit(1712947974.318:163): prog-id=31 op=LOAD Apr 12 18:52:54.322306 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:52:54.323708 systemd[1]: Finished ldconfig.service. Apr 12 18:52:54.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.328239 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:52:54.327000 audit[1075]: SYSTEM_BOOT pid=1075 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.328917 kernel: audit: type=1130 audit(1712947974.323:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.330215 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:52:54.332303 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:52:54.334284 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:52:54.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.335575 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:52:54.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.343176 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:52:54.346000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:52:54.348116 systemd[1]: Starting systemd-update-done.service... Apr 12 18:52:54.348000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:52:54.348000 audit[1085]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe44bcf7f0 a2=420 a3=0 items=0 ppid=1064 pid=1085 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:52:54.348000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:52:54.349969 systemd[1]: Finished audit-rules.service. Apr 12 18:52:54.352144 augenrules[1085]: No rules Apr 12 18:52:54.353826 systemd[1]: Finished systemd-update-done.service. Apr 12 18:52:54.374582 systemd-resolved[1067]: Positive Trust Anchors: Apr 12 18:52:54.374593 systemd-resolved[1067]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:52:54.374620 systemd-resolved[1067]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:52:54.378526 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:52:54.379573 systemd[1]: Reached target time-set.target. Apr 12 18:52:55.300469 systemd-timesyncd[1069]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:52:55.300810 systemd-timesyncd[1069]: Initial clock synchronization to Fri 2024-04-12 18:52:55.300407 UTC. Apr 12 18:52:55.301243 systemd-resolved[1067]: Defaulting to hostname 'linux'. Apr 12 18:52:55.302656 systemd[1]: Started systemd-resolved.service. Apr 12 18:52:55.303556 systemd[1]: Reached target network.target. Apr 12 18:52:55.304364 systemd[1]: Reached target nss-lookup.target. Apr 12 18:52:55.305198 systemd[1]: Reached target sysinit.target. Apr 12 18:52:55.306057 systemd[1]: Started motdgen.path. Apr 12 18:52:55.306787 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:52:55.308015 systemd[1]: Started logrotate.timer. Apr 12 18:52:55.308796 systemd[1]: Started mdadm.timer. Apr 12 18:52:55.309478 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:52:55.310339 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:52:55.310359 systemd[1]: Reached target paths.target. Apr 12 18:52:55.311103 systemd[1]: Reached target timers.target. Apr 12 18:52:55.312161 systemd[1]: Listening on dbus.socket. Apr 12 18:52:55.313860 systemd[1]: Starting docker.socket... Apr 12 18:52:55.316498 systemd[1]: Listening on sshd.socket. Apr 12 18:52:55.317321 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:55.317651 systemd[1]: Listening on docker.socket. Apr 12 18:52:55.318481 systemd[1]: Reached target sockets.target. Apr 12 18:52:55.319317 systemd[1]: Reached target basic.target. Apr 12 18:52:55.320118 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:52:55.320134 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:52:55.320931 systemd[1]: Starting containerd.service... Apr 12 18:52:55.322468 systemd[1]: Starting dbus.service... Apr 12 18:52:55.323919 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:52:55.325593 systemd[1]: Starting extend-filesystems.service... Apr 12 18:52:55.326514 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:52:55.327550 systemd[1]: Starting motdgen.service... Apr 12 18:52:55.329749 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:52:55.331514 systemd[1]: Starting prepare-critools.service... Apr 12 18:52:55.333076 systemd[1]: Starting prepare-helm.service... Apr 12 18:52:55.334671 jq[1096]: false Apr 12 18:52:55.336071 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:52:55.336184 dbus-daemon[1095]: [system] SELinux support is enabled Apr 12 18:52:55.338496 systemd[1]: Starting sshd-keygen.service... Apr 12 18:52:55.340941 extend-filesystems[1097]: Found sr0 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda1 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda2 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda3 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found usr Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda4 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda6 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda7 Apr 12 18:52:55.340941 extend-filesystems[1097]: Found vda9 Apr 12 18:52:55.340941 extend-filesystems[1097]: Checking size of /dev/vda9 Apr 12 18:52:55.341243 systemd[1]: Starting systemd-logind.service... Apr 12 18:52:55.342465 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:52:55.342503 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:52:55.342793 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:52:55.373879 jq[1113]: true Apr 12 18:52:55.343373 systemd[1]: Starting update-engine.service... Apr 12 18:52:55.374119 tar[1120]: ./ Apr 12 18:52:55.374119 tar[1120]: ./loopback Apr 12 18:52:55.345183 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:52:55.374520 tar[1121]: crictl Apr 12 18:52:55.346689 systemd[1]: Started dbus.service. Apr 12 18:52:55.374818 tar[1122]: linux-amd64/helm Apr 12 18:52:55.352567 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:52:55.352711 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:52:55.354566 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:52:55.375490 jq[1125]: true Apr 12 18:52:55.354701 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:52:55.356086 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:52:55.356110 systemd[1]: Reached target system-config.target. Apr 12 18:52:55.356420 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:52:55.356436 systemd[1]: Reached target user-config.target. Apr 12 18:52:55.382426 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:52:55.382573 systemd[1]: Finished motdgen.service. Apr 12 18:52:55.394595 extend-filesystems[1097]: Resized partition /dev/vda9 Apr 12 18:52:55.399053 extend-filesystems[1148]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:52:55.394723 systemd-logind[1110]: Watching system buttons on /dev/input/event1 (Power Button) Apr 12 18:52:55.394738 systemd-logind[1110]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Apr 12 18:52:55.395630 systemd-networkd[1023]: eth0: Gained IPv6LL Apr 12 18:52:55.404708 update_engine[1111]: I0412 18:52:55.404055 1111 main.cc:92] Flatcar Update Engine starting Apr 12 18:52:55.404679 systemd-logind[1110]: New seat seat0. Apr 12 18:52:55.406305 systemd[1]: Started update-engine.service. Apr 12 18:52:55.406447 update_engine[1111]: I0412 18:52:55.406314 1111 update_check_scheduler.cc:74] Next update check in 10m4s Apr 12 18:52:55.410773 systemd[1]: Started locksmithd.service. Apr 12 18:52:55.414000 systemd[1]: Started systemd-logind.service. Apr 12 18:52:55.420392 env[1127]: time="2024-04-12T18:52:55.420351604Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:52:55.429231 tar[1120]: ./bandwidth Apr 12 18:52:55.439438 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:52:55.472116 tar[1120]: ./ptp Apr 12 18:52:55.474431 env[1127]: time="2024-04-12T18:52:55.474135458Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:52:55.474431 env[1127]: time="2024-04-12T18:52:55.474248460Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475317916Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475356398Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475574597Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475589164Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475602299Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475610815Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475672531Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475865262Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475976361Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:52:55.476188 env[1127]: time="2024-04-12T18:52:55.475989996Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:52:55.476477 env[1127]: time="2024-04-12T18:52:55.476033157Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:52:55.476477 env[1127]: time="2024-04-12T18:52:55.476043006Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:52:55.509053 tar[1120]: ./vlan Apr 12 18:52:55.543717 tar[1120]: ./host-device Apr 12 18:52:55.575681 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:52:55.589955 locksmithd[1153]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603139603Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603180088Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603192011Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603289654Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603311585Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603325651Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603338776Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603351520Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603363713Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603377028Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603388349Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.603452 env[1127]: time="2024-04-12T18:52:55.603408417Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:52:55.606130 env[1127]: time="2024-04-12T18:52:55.606069648Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:52:55.604316 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:52:55.606301 extend-filesystems[1148]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:52:55.606301 extend-filesystems[1148]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:52:55.606301 extend-filesystems[1148]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606232975Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606559086Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606596948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606615803Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606674533Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606691866Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606709138Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606724146Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606739385Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606756948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606773709Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606788898Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606806090Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606951563Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.615449 env[1127]: time="2024-04-12T18:52:55.606970208Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.604517 systemd[1]: Finished extend-filesystems.service. Apr 12 18:52:55.615797 bash[1152]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:52:55.615875 extend-filesystems[1097]: Resized filesystem in /dev/vda9 Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.606984885Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.606999613Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.607017757Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.607037774Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.607067881Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:52:55.617460 env[1127]: time="2024-04-12T18:52:55.607112294Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:52:55.608246 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:52:55.611082 systemd[1]: Started containerd.service. Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.607314744Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.607384294Z" level=info msg="Connect containerd service" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.607443796Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.609708053Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.610964921Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.611005126Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.611360683Z" level=info msg="containerd successfully booted in 0.191843s" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612675639Z" level=info msg="Start subscribing containerd event" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612724952Z" level=info msg="Start recovering state" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612781789Z" level=info msg="Start event monitor" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612801846Z" level=info msg="Start snapshots syncer" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612811184Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:52:55.617709 env[1127]: time="2024-04-12T18:52:55.612823447Z" level=info msg="Start streaming server" Apr 12 18:52:55.625362 tar[1120]: ./tuning Apr 12 18:52:55.654803 tar[1120]: ./vrf Apr 12 18:52:55.686828 tar[1120]: ./sbr Apr 12 18:52:55.718722 tar[1120]: ./tap Apr 12 18:52:55.753647 tar[1120]: ./dhcp Apr 12 18:52:55.820808 tar[1122]: linux-amd64/LICENSE Apr 12 18:52:55.821070 tar[1122]: linux-amd64/README.md Apr 12 18:52:55.825642 systemd[1]: Finished prepare-helm.service. Apr 12 18:52:55.841616 tar[1120]: ./static Apr 12 18:52:55.866532 tar[1120]: ./firewall Apr 12 18:52:55.891661 systemd[1]: Finished prepare-critools.service. Apr 12 18:52:55.902503 tar[1120]: ./macvlan Apr 12 18:52:55.931620 tar[1120]: ./dummy Apr 12 18:52:55.960259 tar[1120]: ./bridge Apr 12 18:52:55.992073 tar[1120]: ./ipvlan Apr 12 18:52:56.023807 tar[1120]: ./portmap Apr 12 18:52:56.051442 tar[1120]: ./host-local Apr 12 18:52:56.084180 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:52:56.777120 sshd_keygen[1132]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:52:56.794693 systemd[1]: Finished sshd-keygen.service. Apr 12 18:52:56.797002 systemd[1]: Starting issuegen.service... Apr 12 18:52:56.801459 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:52:56.801572 systemd[1]: Finished issuegen.service. Apr 12 18:52:56.803449 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:52:56.808125 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:52:56.810178 systemd[1]: Started getty@tty1.service. Apr 12 18:52:56.811877 systemd[1]: Started serial-getty@ttyS0.service. Apr 12 18:52:56.812915 systemd[1]: Reached target getty.target. Apr 12 18:52:56.813834 systemd[1]: Reached target multi-user.target. Apr 12 18:52:56.815546 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:52:56.821688 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:52:56.821801 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:52:56.822915 systemd[1]: Startup finished in 651ms (kernel) + 6.029s (initrd) + 7.167s (userspace) = 13.848s. Apr 12 18:53:04.600843 systemd[1]: Created slice system-sshd.slice. Apr 12 18:53:04.601732 systemd[1]: Started sshd@0-10.0.0.104:22-10.0.0.1:45340.service. Apr 12 18:53:04.638885 sshd[1183]: Accepted publickey for core from 10.0.0.1 port 45340 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:04.640266 sshd[1183]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:04.647452 systemd[1]: Created slice user-500.slice. Apr 12 18:53:04.648464 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:53:04.649813 systemd-logind[1110]: New session 1 of user core. Apr 12 18:53:04.655860 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:53:04.656987 systemd[1]: Starting user@500.service... Apr 12 18:53:04.659365 (systemd)[1186]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:04.730180 systemd[1186]: Queued start job for default target default.target. Apr 12 18:53:04.730858 systemd[1186]: Reached target paths.target. Apr 12 18:53:04.730934 systemd[1186]: Reached target sockets.target. Apr 12 18:53:04.730998 systemd[1186]: Reached target timers.target. Apr 12 18:53:04.731023 systemd[1186]: Reached target basic.target. Apr 12 18:53:04.731071 systemd[1186]: Reached target default.target. Apr 12 18:53:04.731100 systemd[1186]: Startup finished in 66ms. Apr 12 18:53:04.731145 systemd[1]: Started user@500.service. Apr 12 18:53:04.732272 systemd[1]: Started session-1.scope. Apr 12 18:53:04.784537 systemd[1]: Started sshd@1-10.0.0.104:22-10.0.0.1:45346.service. Apr 12 18:53:04.821107 sshd[1195]: Accepted publickey for core from 10.0.0.1 port 45346 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:04.822548 sshd[1195]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:04.826387 systemd-logind[1110]: New session 2 of user core. Apr 12 18:53:04.827122 systemd[1]: Started session-2.scope. Apr 12 18:53:04.881437 sshd[1195]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:04.883794 systemd[1]: sshd@1-10.0.0.104:22-10.0.0.1:45346.service: Deactivated successfully. Apr 12 18:53:04.884268 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:53:04.884804 systemd-logind[1110]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:53:04.885774 systemd[1]: Started sshd@2-10.0.0.104:22-10.0.0.1:45354.service. Apr 12 18:53:04.886454 systemd-logind[1110]: Removed session 2. Apr 12 18:53:04.919334 sshd[1201]: Accepted publickey for core from 10.0.0.1 port 45354 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:04.920460 sshd[1201]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:04.923866 systemd-logind[1110]: New session 3 of user core. Apr 12 18:53:04.924669 systemd[1]: Started session-3.scope. Apr 12 18:53:04.973226 sshd[1201]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:04.976467 systemd[1]: sshd@2-10.0.0.104:22-10.0.0.1:45354.service: Deactivated successfully. Apr 12 18:53:04.977165 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:53:04.977804 systemd-logind[1110]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:53:04.979122 systemd[1]: Started sshd@3-10.0.0.104:22-10.0.0.1:45358.service. Apr 12 18:53:04.979879 systemd-logind[1110]: Removed session 3. Apr 12 18:53:05.012623 sshd[1207]: Accepted publickey for core from 10.0.0.1 port 45358 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:05.013812 sshd[1207]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:05.017515 systemd-logind[1110]: New session 4 of user core. Apr 12 18:53:05.018684 systemd[1]: Started session-4.scope. Apr 12 18:53:05.070490 sshd[1207]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:05.073171 systemd[1]: sshd@3-10.0.0.104:22-10.0.0.1:45358.service: Deactivated successfully. Apr 12 18:53:05.073677 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:53:05.074128 systemd-logind[1110]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:53:05.075098 systemd[1]: Started sshd@4-10.0.0.104:22-10.0.0.1:45366.service. Apr 12 18:53:05.075713 systemd-logind[1110]: Removed session 4. Apr 12 18:53:05.108191 sshd[1213]: Accepted publickey for core from 10.0.0.1 port 45366 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:05.109138 sshd[1213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:05.112168 systemd-logind[1110]: New session 5 of user core. Apr 12 18:53:05.112984 systemd[1]: Started session-5.scope. Apr 12 18:53:05.165710 sudo[1216]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:53:05.165896 sudo[1216]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:05.175621 dbus-daemon[1095]: \xd0\xfd\xd8Q\U: received setenforce notice (enforcing=2064532688) Apr 12 18:53:05.177520 sudo[1216]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:05.179216 sshd[1213]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:05.183590 systemd[1]: sshd@4-10.0.0.104:22-10.0.0.1:45366.service: Deactivated successfully. Apr 12 18:53:05.184322 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:53:05.184938 systemd-logind[1110]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:53:05.186168 systemd[1]: Started sshd@5-10.0.0.104:22-10.0.0.1:45376.service. Apr 12 18:53:05.186928 systemd-logind[1110]: Removed session 5. Apr 12 18:53:05.219548 sshd[1220]: Accepted publickey for core from 10.0.0.1 port 45376 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:05.220538 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:05.224128 systemd-logind[1110]: New session 6 of user core. Apr 12 18:53:05.224854 systemd[1]: Started session-6.scope. Apr 12 18:53:05.278431 sudo[1224]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:53:05.278647 sudo[1224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:05.281546 sudo[1224]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:05.285684 sudo[1223]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:53:05.285849 sudo[1223]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:05.293789 systemd[1]: Stopping audit-rules.service... Apr 12 18:53:05.293000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:05.295061 auditctl[1227]: No rules Apr 12 18:53:05.295810 kernel: kauditd_printk_skb: 8 callbacks suppressed Apr 12 18:53:05.295854 kernel: audit: type=1305 audit(1712947985.293:171): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:53:05.296598 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:53:05.296741 systemd[1]: Stopped audit-rules.service. Apr 12 18:53:05.293000 audit[1227]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce7901cf0 a2=420 a3=0 items=0 ppid=1 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:05.298226 systemd[1]: Starting audit-rules.service... Apr 12 18:53:05.305129 kernel: audit: type=1300 audit(1712947985.293:171): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffce7901cf0 a2=420 a3=0 items=0 ppid=1 pid=1227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:05.305239 kernel: audit: type=1327 audit(1712947985.293:171): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:05.305258 kernel: audit: type=1131 audit(1712947985.295:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.293000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:53:05.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.312298 augenrules[1244]: No rules Apr 12 18:53:05.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.313698 sudo[1223]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:05.312899 systemd[1]: Finished audit-rules.service. Apr 12 18:53:05.311000 audit[1223]: USER_END pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.316750 sshd[1220]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:05.318761 systemd[1]: sshd@5-10.0.0.104:22-10.0.0.1:45376.service: Deactivated successfully. Apr 12 18:53:05.319379 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:53:05.319825 systemd-logind[1110]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:53:05.320159 kernel: audit: type=1130 audit(1712947985.311:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.320241 kernel: audit: type=1106 audit(1712947985.311:174): pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.320261 kernel: audit: type=1104 audit(1712947985.311:175): pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.311000 audit[1223]: CRED_DISP pid=1223 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.323526 kernel: audit: type=1106 audit(1712947985.315:176): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.315000 audit[1220]: USER_END pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.323741 systemd[1]: Started sshd@6-10.0.0.104:22-10.0.0.1:45382.service. Apr 12 18:53:05.324147 systemd-logind[1110]: Removed session 6. Apr 12 18:53:05.327761 kernel: audit: type=1104 audit(1712947985.315:177): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.315000 audit[1220]: CRED_DISP pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.315000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.104:22-10.0.0.1:45376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.334848 kernel: audit: type=1131 audit(1712947985.315:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.104:22-10.0.0.1:45376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.104:22-10.0.0.1:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.359000 audit[1250]: USER_ACCT pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.360837 sshd[1250]: Accepted publickey for core from 10.0.0.1 port 45382 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:53:05.360000 audit[1250]: CRED_ACQ pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.360000 audit[1250]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc4e18e110 a2=3 a3=0 items=0 ppid=1 pid=1250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:05.360000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:53:05.361747 sshd[1250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:53:05.364977 systemd-logind[1110]: New session 7 of user core. Apr 12 18:53:05.365864 systemd[1]: Started session-7.scope. Apr 12 18:53:05.369000 audit[1250]: USER_START pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.370000 audit[1252]: CRED_ACQ pid=1252 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:05.417000 audit[1253]: USER_ACCT pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.417000 audit[1253]: CRED_REFR pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.418727 sudo[1253]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:53:05.418891 sudo[1253]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:53:05.419000 audit[1253]: USER_START pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.948871 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:53:05.953486 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:53:05.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:05.953749 systemd[1]: Reached target network-online.target. Apr 12 18:53:05.954673 systemd[1]: Starting docker.service... Apr 12 18:53:05.987296 env[1270]: time="2024-04-12T18:53:05.987239626Z" level=info msg="Starting up" Apr 12 18:53:05.988663 env[1270]: time="2024-04-12T18:53:05.988620897Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:53:05.988663 env[1270]: time="2024-04-12T18:53:05.988654540Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:53:05.988747 env[1270]: time="2024-04-12T18:53:05.988683404Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:53:05.988747 env[1270]: time="2024-04-12T18:53:05.988701388Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:53:05.990185 env[1270]: time="2024-04-12T18:53:05.990151738Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:53:05.990185 env[1270]: time="2024-04-12T18:53:05.990177006Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:53:05.990269 env[1270]: time="2024-04-12T18:53:05.990193607Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:53:05.990269 env[1270]: time="2024-04-12T18:53:05.990203726Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:53:06.124545 env[1270]: time="2024-04-12T18:53:06.124495268Z" level=info msg="Loading containers: start." Apr 12 18:53:06.169000 audit[1304]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.169000 audit[1304]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7fff4322a150 a2=0 a3=7fff4322a13c items=0 ppid=1270 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.169000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:53:06.171000 audit[1306]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.171000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc266036e0 a2=0 a3=7ffc266036cc items=0 ppid=1270 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.171000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:53:06.172000 audit[1308]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.172000 audit[1308]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffddbd77ed0 a2=0 a3=7ffddbd77ebc items=0 ppid=1270 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.172000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:53:06.173000 audit[1310]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.173000 audit[1310]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffff6d5fd60 a2=0 a3=7ffff6d5fd4c items=0 ppid=1270 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.173000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:53:06.175000 audit[1312]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1312 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.175000 audit[1312]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffedbaa3b60 a2=0 a3=7ffedbaa3b4c items=0 ppid=1270 pid=1312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.175000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:53:06.188000 audit[1317]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.188000 audit[1317]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffed84fbf20 a2=0 a3=7ffed84fbf0c items=0 ppid=1270 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.188000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:53:06.196000 audit[1319]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.196000 audit[1319]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff279e0000 a2=0 a3=7fff279dffec items=0 ppid=1270 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:53:06.197000 audit[1321]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.197000 audit[1321]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffeea5e01a0 a2=0 a3=7ffeea5e018c items=0 ppid=1270 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.197000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:53:06.199000 audit[1323]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.199000 audit[1323]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffd3d7b71c0 a2=0 a3=7ffd3d7b71ac items=0 ppid=1270 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.199000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:06.206000 audit[1327]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.206000 audit[1327]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffbd97b410 a2=0 a3=7fffbd97b3fc items=0 ppid=1270 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.206000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:06.207000 audit[1328]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.207000 audit[1328]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffcb4196840 a2=0 a3=7ffcb419682c items=0 ppid=1270 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:06.216414 kernel: Initializing XFRM netlink socket Apr 12 18:53:06.242240 env[1270]: time="2024-04-12T18:53:06.242198496Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:53:06.255000 audit[1336]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.255000 audit[1336]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffe470cc380 a2=0 a3=7ffe470cc36c items=0 ppid=1270 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.255000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:53:06.265000 audit[1339]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1339 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.265000 audit[1339]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffc47306f20 a2=0 a3=7ffc47306f0c items=0 ppid=1270 pid=1339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.265000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:53:06.267000 audit[1342]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.267000 audit[1342]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffea9fedf20 a2=0 a3=7ffea9fedf0c items=0 ppid=1270 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.267000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:53:06.268000 audit[1344]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.268000 audit[1344]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffef27e7500 a2=0 a3=7ffef27e74ec items=0 ppid=1270 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.268000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:53:06.270000 audit[1346]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.270000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffb5017ef0 a2=0 a3=7fffb5017edc items=0 ppid=1270 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.270000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:53:06.272000 audit[1348]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.272000 audit[1348]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffd90ec6d20 a2=0 a3=7ffd90ec6d0c items=0 ppid=1270 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.272000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:53:06.273000 audit[1350]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1350 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.273000 audit[1350]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffd14f080f0 a2=0 a3=7ffd14f080dc items=0 ppid=1270 pid=1350 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.273000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:53:06.279000 audit[1353]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.279000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffeb1876220 a2=0 a3=7ffeb187620c items=0 ppid=1270 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.279000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:53:06.280000 audit[1355]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.280000 audit[1355]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7fff5d836690 a2=0 a3=7fff5d83667c items=0 ppid=1270 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.280000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:53:06.282000 audit[1357]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.282000 audit[1357]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffeba0dd7d0 a2=0 a3=7ffeba0dd7bc items=0 ppid=1270 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.282000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:53:06.284000 audit[1359]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1359 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.284000 audit[1359]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffc43b8f7d0 a2=0 a3=7ffc43b8f7bc items=0 ppid=1270 pid=1359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.284000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:53:06.285737 systemd-networkd[1023]: docker0: Link UP Apr 12 18:53:06.292000 audit[1363]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.292000 audit[1363]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe14e3e370 a2=0 a3=7ffe14e3e35c items=0 ppid=1270 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:06.293000 audit[1364]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1364 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:06.293000 audit[1364]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc1e097e70 a2=0 a3=7ffc1e097e5c items=0 ppid=1270 pid=1364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:06.293000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:53:06.295126 env[1270]: time="2024-04-12T18:53:06.295093051Z" level=info msg="Loading containers: done." Apr 12 18:53:06.302287 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2467438998-merged.mount: Deactivated successfully. Apr 12 18:53:06.310575 env[1270]: time="2024-04-12T18:53:06.310524446Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:53:06.310725 env[1270]: time="2024-04-12T18:53:06.310705726Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:53:06.310830 env[1270]: time="2024-04-12T18:53:06.310807697Z" level=info msg="Daemon has completed initialization" Apr 12 18:53:06.325842 systemd[1]: Started docker.service. Apr 12 18:53:06.324000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:06.333343 env[1270]: time="2024-04-12T18:53:06.333290298Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:53:06.349033 systemd[1]: Reloading. Apr 12 18:53:06.412739 /usr/lib/systemd/system-generators/torcx-generator[1413]: time="2024-04-12T18:53:06Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:06.412762 /usr/lib/systemd/system-generators/torcx-generator[1413]: time="2024-04-12T18:53:06Z" level=info msg="torcx already run" Apr 12 18:53:06.469936 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:06.469953 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:06.488580 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit: BPF prog-id=37 op=LOAD Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.539000 audit: BPF prog-id=38 op=LOAD Apr 12 18:53:06.539000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:53:06.539000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit: BPF prog-id=39 op=LOAD Apr 12 18:53:06.540000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit: BPF prog-id=40 op=LOAD Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.540000 audit: BPF prog-id=41 op=LOAD Apr 12 18:53:06.540000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:53:06.540000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.541000 audit: BPF prog-id=42 op=LOAD Apr 12 18:53:06.541000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.542000 audit: BPF prog-id=43 op=LOAD Apr 12 18:53:06.542000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit: BPF prog-id=44 op=LOAD Apr 12 18:53:06.543000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit: BPF prog-id=45 op=LOAD Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit: BPF prog-id=46 op=LOAD Apr 12 18:53:06.543000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:53:06.543000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.543000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.544000 audit: BPF prog-id=47 op=LOAD Apr 12 18:53:06.544000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.545000 audit: BPF prog-id=48 op=LOAD Apr 12 18:53:06.545000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit: BPF prog-id=49 op=LOAD Apr 12 18:53:06.547000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit: BPF prog-id=50 op=LOAD Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:06.547000 audit: BPF prog-id=51 op=LOAD Apr 12 18:53:06.547000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:53:06.547000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:53:06.554799 systemd[1]: Started kubelet.service. Apr 12 18:53:06.554000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:06.597792 kubelet[1454]: E0412 18:53:06.597639 1454 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:06.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:06.599356 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:06.599472 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:06.773857 env[1127]: time="2024-04-12T18:53:06.773734746Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:53:07.383542 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount41443820.mount: Deactivated successfully. Apr 12 18:53:09.079144 env[1127]: time="2024-04-12T18:53:09.079076729Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:09.081088 env[1127]: time="2024-04-12T18:53:09.081044219Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:09.082686 env[1127]: time="2024-04-12T18:53:09.082664478Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:09.084310 env[1127]: time="2024-04-12T18:53:09.084281081Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:09.084904 env[1127]: time="2024-04-12T18:53:09.084838867Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:39f995c9f199675725a38b0d9f19f99652f978861e631729f2ec4fd8efaab533\"" Apr 12 18:53:09.093298 env[1127]: time="2024-04-12T18:53:09.093264731Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:53:11.276149 env[1127]: time="2024-04-12T18:53:11.276092412Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.277852 env[1127]: time="2024-04-12T18:53:11.277821505Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.279290 env[1127]: time="2024-04-12T18:53:11.279253542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.280840 env[1127]: time="2024-04-12T18:53:11.280818838Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:11.281390 env[1127]: time="2024-04-12T18:53:11.281357959Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:6052a25da3f97387a8a5a9711fbff373801dcea4b0487add79dc3903c4bf14b3\"" Apr 12 18:53:11.290793 env[1127]: time="2024-04-12T18:53:11.290749835Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:53:13.068234 env[1127]: time="2024-04-12T18:53:13.068143408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:13.069980 env[1127]: time="2024-04-12T18:53:13.069931592Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:13.071487 env[1127]: time="2024-04-12T18:53:13.071431766Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:13.073268 env[1127]: time="2024-04-12T18:53:13.073235689Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:13.074030 env[1127]: time="2024-04-12T18:53:13.073994883Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:8c390d98f50c0b8f564e172a80565384dc9eeb7e16b5a6794c616706206dee3b\"" Apr 12 18:53:13.089058 env[1127]: time="2024-04-12T18:53:13.089030285Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:53:14.248173 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount116950507.mount: Deactivated successfully. Apr 12 18:53:14.907495 env[1127]: time="2024-04-12T18:53:14.907435003Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:14.909470 env[1127]: time="2024-04-12T18:53:14.909430786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:14.910918 env[1127]: time="2024-04-12T18:53:14.910872731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:14.912185 env[1127]: time="2024-04-12T18:53:14.912164043Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:14.912563 env[1127]: time="2024-04-12T18:53:14.912533376Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:a1d263b5dc5b0acea099d5e91a3a041b6704392ad95e5ea3b5bbe4f71784e392\"" Apr 12 18:53:14.924313 env[1127]: time="2024-04-12T18:53:14.924276703Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:53:15.396369 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2635785836.mount: Deactivated successfully. Apr 12 18:53:16.850225 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:53:16.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.850438 systemd[1]: Stopped kubelet.service. Apr 12 18:53:16.852089 systemd[1]: Started kubelet.service. Apr 12 18:53:16.854336 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:53:16.854414 kernel: audit: type=1130 audit(1712947996.849:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.854437 kernel: audit: type=1131 audit(1712947996.849:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.849000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.857373 kernel: audit: type=1130 audit(1712947996.850:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:16.950520 env[1127]: time="2024-04-12T18:53:16.950458601Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:16.952771 env[1127]: time="2024-04-12T18:53:16.952301608Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:16.953292 kubelet[1506]: E0412 18:53:16.953242 1506 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:53:16.954100 env[1127]: time="2024-04-12T18:53:16.954043606Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:16.955889 env[1127]: time="2024-04-12T18:53:16.955863670Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:16.956468 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:53:16.956618 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:53:16.956736 env[1127]: time="2024-04-12T18:53:16.956705078Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Apr 12 18:53:16.955000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:16.960428 kernel: audit: type=1131 audit(1712947996.955:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:53:16.966862 env[1127]: time="2024-04-12T18:53:16.966829568Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:53:17.523971 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4154982277.mount: Deactivated successfully. Apr 12 18:53:17.529263 env[1127]: time="2024-04-12T18:53:17.529231183Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:17.530935 env[1127]: time="2024-04-12T18:53:17.530887099Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:17.532263 env[1127]: time="2024-04-12T18:53:17.532229838Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:17.533682 env[1127]: time="2024-04-12T18:53:17.533650823Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:17.534091 env[1127]: time="2024-04-12T18:53:17.534060732Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Apr 12 18:53:17.590254 env[1127]: time="2024-04-12T18:53:17.590220782Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:53:18.019942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount823772152.mount: Deactivated successfully. Apr 12 18:53:21.906887 env[1127]: time="2024-04-12T18:53:21.906828244Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:21.908872 env[1127]: time="2024-04-12T18:53:21.908846750Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:21.910658 env[1127]: time="2024-04-12T18:53:21.910609486Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:21.912294 env[1127]: time="2024-04-12T18:53:21.912267276Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:21.913085 env[1127]: time="2024-04-12T18:53:21.913052218Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Apr 12 18:53:24.151964 systemd[1]: Stopped kubelet.service. Apr 12 18:53:24.150000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:24.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:24.159225 kernel: audit: type=1130 audit(1712948004.150:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:24.159363 kernel: audit: type=1131 audit(1712948004.150:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:24.167229 systemd[1]: Reloading. Apr 12 18:53:24.234523 /usr/lib/systemd/system-generators/torcx-generator[1625]: time="2024-04-12T18:53:24Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:24.234551 /usr/lib/systemd/system-generators/torcx-generator[1625]: time="2024-04-12T18:53:24Z" level=info msg="torcx already run" Apr 12 18:53:24.289675 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:24.289692 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:24.308653 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.367870 kernel: audit: type=1400 audit(1712948004.360:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.367908 kernel: audit: type=1400 audit(1712948004.360:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.367935 kernel: audit: type=1400 audit(1712948004.360:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.374431 kernel: audit: type=1400 audit(1712948004.360:397): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.374472 kernel: audit: type=1400 audit(1712948004.360:398): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.381113 kernel: audit: type=1400 audit(1712948004.360:399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.381147 kernel: audit: type=1400 audit(1712948004.360:400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387881 kernel: audit: type=1400 audit(1712948004.360:401): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit: BPF prog-id=52 op=LOAD Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.369000 audit: BPF prog-id=53 op=LOAD Apr 12 18:53:24.369000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:53:24.369000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit: BPF prog-id=54 op=LOAD Apr 12 18:53:24.373000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit: BPF prog-id=55 op=LOAD Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.379000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.379000 audit: BPF prog-id=56 op=LOAD Apr 12 18:53:24.379000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:53:24.379000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit: BPF prog-id=57 op=LOAD Apr 12 18:53:24.383000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.383000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit: BPF prog-id=58 op=LOAD Apr 12 18:53:24.386000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.386000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit: BPF prog-id=59 op=LOAD Apr 12 18:53:24.387000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit: BPF prog-id=60 op=LOAD Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit: BPF prog-id=61 op=LOAD Apr 12 18:53:24.387000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:53:24.387000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.387000 audit: BPF prog-id=62 op=LOAD Apr 12 18:53:24.387000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.389000 audit: BPF prog-id=63 op=LOAD Apr 12 18:53:24.389000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.390000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit: BPF prog-id=64 op=LOAD Apr 12 18:53:24.391000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit: BPF prog-id=65 op=LOAD Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.391000 audit: BPF prog-id=66 op=LOAD Apr 12 18:53:24.391000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:53:24.391000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:53:24.402653 systemd[1]: Started kubelet.service. Apr 12 18:53:24.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:24.452244 kubelet[1667]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:24.452244 kubelet[1667]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:24.452244 kubelet[1667]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:24.452630 kubelet[1667]: I0412 18:53:24.452278 1667 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:24.749533 kubelet[1667]: I0412 18:53:24.749439 1667 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:24.749533 kubelet[1667]: I0412 18:53:24.749466 1667 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:24.749691 kubelet[1667]: I0412 18:53:24.749681 1667 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:24.753046 kubelet[1667]: E0412 18:53:24.752996 1667 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.104:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.753223 kubelet[1667]: I0412 18:53:24.753177 1667 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:24.759692 kubelet[1667]: I0412 18:53:24.759666 1667 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:24.759892 kubelet[1667]: I0412 18:53:24.759878 1667 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:24.760056 kubelet[1667]: I0412 18:53:24.760043 1667 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:24.760146 kubelet[1667]: I0412 18:53:24.760066 1667 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:24.760146 kubelet[1667]: I0412 18:53:24.760075 1667 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:24.760232 kubelet[1667]: I0412 18:53:24.760178 1667 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:24.760268 kubelet[1667]: I0412 18:53:24.760257 1667 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:24.760294 kubelet[1667]: I0412 18:53:24.760272 1667 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:24.760294 kubelet[1667]: I0412 18:53:24.760294 1667 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:24.760336 kubelet[1667]: I0412 18:53:24.760307 1667 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:24.762571 kubelet[1667]: I0412 18:53:24.762544 1667 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:24.762727 kubelet[1667]: W0412 18:53:24.762634 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.762727 kubelet[1667]: E0412 18:53:24.762695 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.762727 kubelet[1667]: W0412 18:53:24.762715 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.762801 kubelet[1667]: E0412 18:53:24.762737 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.762801 kubelet[1667]: I0412 18:53:24.762784 1667 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:24.762843 kubelet[1667]: W0412 18:53:24.762835 1667 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:53:24.763485 kubelet[1667]: I0412 18:53:24.763465 1667 server.go:1256] "Started kubelet" Apr 12 18:53:24.763762 kubelet[1667]: I0412 18:53:24.763748 1667 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:24.764003 kubelet[1667]: E0412 18:53:24.763980 1667 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.104:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.104:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17c59d227ea38c4e default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-04-12 18:53:24.763438158 +0000 UTC m=+0.357901843,LastTimestamp:2024-04-12 18:53:24.763438158 +0000 UTC m=+0.357901843,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Apr 12 18:53:24.764101 kubelet[1667]: I0412 18:53:24.764021 1667 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:24.764152 kubelet[1667]: I0412 18:53:24.763992 1667 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:24.762000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.762000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:24.762000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008bfa40 a1=c000b64e28 a2=c0008bfa10 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.762000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:24.762000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.762000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:24.762000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000a0cba0 a1=c000b64e40 a2=c0008bfad0 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.762000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:24.764713 kubelet[1667]: I0412 18:53:24.764377 1667 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:24.764713 kubelet[1667]: I0412 18:53:24.764425 1667 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:24.764713 kubelet[1667]: I0412 18:53:24.764470 1667 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:24.764790 kubelet[1667]: I0412 18:53:24.764753 1667 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:24.765727 kubelet[1667]: E0412 18:53:24.765562 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:24.765727 kubelet[1667]: I0412 18:53:24.765592 1667 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:24.765727 kubelet[1667]: I0412 18:53:24.765649 1667 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:24.765727 kubelet[1667]: I0412 18:53:24.765689 1667 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:24.766109 kubelet[1667]: W0412 18:53:24.765881 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.766109 kubelet[1667]: E0412 18:53:24.765913 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.766109 kubelet[1667]: E0412 18:53:24.766039 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.104:6443: connect: connection refused" interval="200ms" Apr 12 18:53:24.766256 kubelet[1667]: I0412 18:53:24.766234 1667 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:24.766441 kubelet[1667]: E0412 18:53:24.766425 1667 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:24.765000 audit[1679]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.765000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd8f9c5330 a2=0 a3=7ffd8f9c531c items=0 ppid=1667 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.765000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:24.766000 audit[1680]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.766000 audit[1680]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffcfcfcb20 a2=0 a3=7fffcfcfcb0c items=0 ppid=1667 pid=1680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.766000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:24.767000 audit[1682]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1682 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.767000 audit[1682]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffef88d1da0 a2=0 a3=7ffef88d1d8c items=0 ppid=1667 pid=1682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.767000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:24.770084 kubelet[1667]: I0412 18:53:24.770065 1667 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:24.770084 kubelet[1667]: I0412 18:53:24.770079 1667 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:24.770000 audit[1684]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1684 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.770000 audit[1684]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd4a3611a0 a2=0 a3=7ffd4a36118c items=0 ppid=1667 pid=1684 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.770000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:24.776000 audit[1687]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.776000 audit[1687]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7fffb6c17250 a2=0 a3=7fffb6c1723c items=0 ppid=1667 pid=1687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.776000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:53:24.778150 kubelet[1667]: I0412 18:53:24.778115 1667 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:24.777000 audit[1688]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1688 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:24.777000 audit[1688]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffeaee4e000 a2=0 a3=7ffeaee4dfec items=0 ppid=1667 pid=1688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.777000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:53:24.779012 kubelet[1667]: I0412 18:53:24.778983 1667 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:24.779058 kubelet[1667]: I0412 18:53:24.779021 1667 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:24.779058 kubelet[1667]: I0412 18:53:24.779042 1667 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:24.779100 kubelet[1667]: E0412 18:53:24.779091 1667 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:24.778000 audit[1691]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.778000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffb0d70930 a2=0 a3=7fffb0d7091c items=0 ppid=1667 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.778000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:24.779000 audit[1693]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.779000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcd3eb4670 a2=0 a3=7ffcd3eb465c items=0 ppid=1667 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.779000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:24.780000 audit[1694]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:24.780000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc99024f90 a2=0 a3=7ffc99024f7c items=0 ppid=1667 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.780000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:24.782108 kubelet[1667]: W0412 18:53:24.782060 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.782188 kubelet[1667]: E0412 18:53:24.782116 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:24.780000 audit[1695]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:24.780000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc61f68ee0 a2=0 a3=7ffc61f68ecc items=0 ppid=1667 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:53:24.782955 kubelet[1667]: I0412 18:53:24.782936 1667 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:24.782955 kubelet[1667]: I0412 18:53:24.782950 1667 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:24.781000 audit[1696]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:24.781000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffd8dc7d160 a2=0 a3=7ffd8dc7d14c items=0 ppid=1667 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:53:24.783163 kubelet[1667]: I0412 18:53:24.782964 1667 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:24.782000 audit[1698]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:24.782000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff776def80 a2=0 a3=7fff776def6c items=0 ppid=1667 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.782000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:53:24.786494 kubelet[1667]: I0412 18:53:24.786475 1667 policy_none.go:49] "None policy: Start" Apr 12 18:53:24.786925 kubelet[1667]: I0412 18:53:24.786889 1667 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:24.786925 kubelet[1667]: I0412 18:53:24.786911 1667 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:24.791881 systemd[1]: Created slice kubepods.slice. Apr 12 18:53:24.795887 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:53:24.798029 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:53:24.804071 kubelet[1667]: I0412 18:53:24.804039 1667 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:24.804071 kubelet[1667]: I0412 18:53:24.804099 1667 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:24.802000 audit[1667]: AVC avc: denied { mac_admin } for pid=1667 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:24.802000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:24.802000 audit[1667]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000c48d20 a1=c000b65920 a2=c000c48cf0 a3=25 items=0 ppid=1 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:24.802000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:24.804418 kubelet[1667]: I0412 18:53:24.804249 1667 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:24.805415 kubelet[1667]: E0412 18:53:24.805386 1667 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:53:24.867442 kubelet[1667]: I0412 18:53:24.867419 1667 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:24.867704 kubelet[1667]: E0412 18:53:24.867690 1667 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.104:6443/api/v1/nodes\": dial tcp 10.0.0.104:6443: connect: connection refused" node="localhost" Apr 12 18:53:24.879976 kubelet[1667]: I0412 18:53:24.879939 1667 topology_manager.go:215] "Topology Admit Handler" podUID="88624889ca8fabd20d18f623b5eb4f39" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:53:24.880573 kubelet[1667]: I0412 18:53:24.880547 1667 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:53:24.881148 kubelet[1667]: I0412 18:53:24.881113 1667 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:53:24.885747 systemd[1]: Created slice kubepods-burstable-pod88624889ca8fabd20d18f623b5eb4f39.slice. Apr 12 18:53:24.897690 systemd[1]: Created slice kubepods-burstable-podf4e8212a5db7e0401319814fa9ad65c9.slice. Apr 12 18:53:24.909969 systemd[1]: Created slice kubepods-burstable-pod5d5c5aff921df216fcba2c51c322ceb1.slice. Apr 12 18:53:24.966379 kubelet[1667]: E0412 18:53:24.966357 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.104:6443: connect: connection refused" interval="400ms" Apr 12 18:53:24.967433 kubelet[1667]: I0412 18:53:24.967411 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:24.967488 kubelet[1667]: I0412 18:53:24.967445 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:24.967488 kubelet[1667]: I0412 18:53:24.967462 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:24.967488 kubelet[1667]: I0412 18:53:24.967479 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:24.967551 kubelet[1667]: I0412 18:53:24.967513 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:24.967551 kubelet[1667]: I0412 18:53:24.967533 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:24.967551 kubelet[1667]: I0412 18:53:24.967550 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:24.967613 kubelet[1667]: I0412 18:53:24.967568 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:24.967613 kubelet[1667]: I0412 18:53:24.967604 1667 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:53:25.069434 kubelet[1667]: I0412 18:53:25.069348 1667 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:25.069686 kubelet[1667]: E0412 18:53:25.069669 1667 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.104:6443/api/v1/nodes\": dial tcp 10.0.0.104:6443: connect: connection refused" node="localhost" Apr 12 18:53:25.196277 kubelet[1667]: E0412 18:53:25.196235 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.196779 env[1127]: time="2024-04-12T18:53:25.196728376Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:88624889ca8fabd20d18f623b5eb4f39,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:25.208891 kubelet[1667]: E0412 18:53:25.208873 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.209286 env[1127]: time="2024-04-12T18:53:25.209246386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:25.211455 kubelet[1667]: E0412 18:53:25.211428 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.211872 env[1127]: time="2024-04-12T18:53:25.211805617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:25.367024 kubelet[1667]: E0412 18:53:25.366901 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.104:6443: connect: connection refused" interval="800ms" Apr 12 18:53:25.471360 kubelet[1667]: I0412 18:53:25.471316 1667 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:25.471708 kubelet[1667]: E0412 18:53:25.471688 1667 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.104:6443/api/v1/nodes\": dial tcp 10.0.0.104:6443: connect: connection refused" node="localhost" Apr 12 18:53:25.735282 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1025123693.mount: Deactivated successfully. Apr 12 18:53:25.740300 env[1127]: time="2024-04-12T18:53:25.740263122Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.742860 env[1127]: time="2024-04-12T18:53:25.742818004Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.743813 env[1127]: time="2024-04-12T18:53:25.743780409Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.745427 env[1127]: time="2024-04-12T18:53:25.745380721Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.747062 env[1127]: time="2024-04-12T18:53:25.747034523Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.748361 env[1127]: time="2024-04-12T18:53:25.748333420Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.749526 env[1127]: time="2024-04-12T18:53:25.749492724Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.750696 env[1127]: time="2024-04-12T18:53:25.750665784Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.752733 env[1127]: time="2024-04-12T18:53:25.752712333Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.754664 env[1127]: time="2024-04-12T18:53:25.754633767Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.755876 env[1127]: time="2024-04-12T18:53:25.755848195Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.756590 env[1127]: time="2024-04-12T18:53:25.756556113Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:25.785645 env[1127]: time="2024-04-12T18:53:25.785533797Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:25.785645 env[1127]: time="2024-04-12T18:53:25.785586035Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:25.785645 env[1127]: time="2024-04-12T18:53:25.785595713Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:25.787290 env[1127]: time="2024-04-12T18:53:25.786030028Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/74957227ab98e6eeff37a31c499edc093d3391721e9af42f45e4d129799d6f24 pid=1711 runtime=io.containerd.runc.v2 Apr 12 18:53:25.788316 env[1127]: time="2024-04-12T18:53:25.787618277Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:25.788316 env[1127]: time="2024-04-12T18:53:25.787648423Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:25.788316 env[1127]: time="2024-04-12T18:53:25.787658743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:25.788316 env[1127]: time="2024-04-12T18:53:25.787794648Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1bbf4e44dd9bd740fd0090d41a0247615a72257df945c710c97ee4d8ab5a12bd pid=1730 runtime=io.containerd.runc.v2 Apr 12 18:53:25.788949 env[1127]: time="2024-04-12T18:53:25.788902766Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:25.788996 env[1127]: time="2024-04-12T18:53:25.788955846Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:25.788996 env[1127]: time="2024-04-12T18:53:25.788977055Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:25.789139 env[1127]: time="2024-04-12T18:53:25.789073446Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ddce5127fbe84dffd1a3eec361a4b6722e8754688dc1c9df23ef5bf00a62232c pid=1729 runtime=io.containerd.runc.v2 Apr 12 18:53:25.804701 systemd[1]: Started cri-containerd-ddce5127fbe84dffd1a3eec361a4b6722e8754688dc1c9df23ef5bf00a62232c.scope. Apr 12 18:53:25.848056 systemd[1]: Started cri-containerd-74957227ab98e6eeff37a31c499edc093d3391721e9af42f45e4d129799d6f24.scope. Apr 12 18:53:25.852969 systemd[1]: Started cri-containerd-1bbf4e44dd9bd740fd0090d41a0247615a72257df945c710c97ee4d8ab5a12bd.scope. Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.870000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit: BPF prog-id=67 op=LOAD Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1729 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636535313237666265383464666664316133656563333631613462 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1729 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636535313237666265383464666664316133656563333631613462 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit: BPF prog-id=68 op=LOAD Apr 12 18:53:25.871000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000333ed0 items=0 ppid=1729 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636535313237666265383464666664316133656563333631613462 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit: BPF prog-id=69 op=LOAD Apr 12 18:53:25.871000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000333f18 items=0 ppid=1729 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636535313237666265383464666664316133656563333631613462 Apr 12 18:53:25.871000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:53:25.871000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { perfmon } for pid=1750 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit[1750]: AVC avc: denied { bpf } for pid=1750 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.871000 audit: BPF prog-id=70 op=LOAD Apr 12 18:53:25.871000 audit[1750]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003b2328 items=0 ppid=1729 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6464636535313237666265383464666664316133656563333631613462 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.875000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit: BPF prog-id=71 op=LOAD Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=1711 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734393537323237616239386536656566663337613331633439396564 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=1711 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734393537323237616239386536656566663337613331633439396564 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit: BPF prog-id=72 op=LOAD Apr 12 18:53:25.876000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002d3fc0 items=0 ppid=1711 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734393537323237616239386536656566663337613331633439396564 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit: BPF prog-id=73 op=LOAD Apr 12 18:53:25.876000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000352008 items=0 ppid=1711 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734393537323237616239386536656566663337613331633439396564 Apr 12 18:53:25.876000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:53:25.876000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { perfmon } for pid=1748 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit[1748]: AVC avc: denied { bpf } for pid=1748 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.876000 audit: BPF prog-id=74 op=LOAD Apr 12 18:53:25.876000 audit[1748]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000352418 items=0 ppid=1711 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.876000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734393537323237616239386536656566663337613331633439396564 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.893000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.933000 audit: BPF prog-id=75 op=LOAD Apr 12 18:53:25.933000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.933000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.933000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162626634653434646439626437343066643030393064343161303234 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162626634653434646439626437343066643030393064343161303234 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.934000 audit: BPF prog-id=76 op=LOAD Apr 12 18:53:25.934000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00037c1f0 items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162626634653434646439626437343066643030393064343161303234 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.935000 audit: BPF prog-id=77 op=LOAD Apr 12 18:53:25.935000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00037c238 items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.935000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162626634653434646439626437343066643030393064343161303234 Apr 12 18:53:25.936000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:53:25.936000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { perfmon } for pid=1762 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit[1762]: AVC avc: denied { bpf } for pid=1762 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:25.936000 audit: BPF prog-id=78 op=LOAD Apr 12 18:53:25.936000 audit[1762]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00037c648 items=0 ppid=1730 pid=1762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:25.936000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3162626634653434646439626437343066643030393064343161303234 Apr 12 18:53:25.957042 env[1127]: time="2024-04-12T18:53:25.956971976Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,} returns sandbox id \"ddce5127fbe84dffd1a3eec361a4b6722e8754688dc1c9df23ef5bf00a62232c\"" Apr 12 18:53:25.957924 kubelet[1667]: E0412 18:53:25.957874 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.962420 env[1127]: time="2024-04-12T18:53:25.962371734Z" level=info msg="CreateContainer within sandbox \"ddce5127fbe84dffd1a3eec361a4b6722e8754688dc1c9df23ef5bf00a62232c\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:53:25.969712 env[1127]: time="2024-04-12T18:53:25.969633676Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"74957227ab98e6eeff37a31c499edc093d3391721e9af42f45e4d129799d6f24\"" Apr 12 18:53:25.970483 kubelet[1667]: E0412 18:53:25.970335 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.972308 env[1127]: time="2024-04-12T18:53:25.972271343Z" level=info msg="CreateContainer within sandbox \"74957227ab98e6eeff37a31c499edc093d3391721e9af42f45e4d129799d6f24\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:53:25.978748 env[1127]: time="2024-04-12T18:53:25.978710651Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:88624889ca8fabd20d18f623b5eb4f39,Namespace:kube-system,Attempt:0,} returns sandbox id \"1bbf4e44dd9bd740fd0090d41a0247615a72257df945c710c97ee4d8ab5a12bd\"" Apr 12 18:53:25.979272 kubelet[1667]: E0412 18:53:25.979166 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:25.980788 env[1127]: time="2024-04-12T18:53:25.980759254Z" level=info msg="CreateContainer within sandbox \"1bbf4e44dd9bd740fd0090d41a0247615a72257df945c710c97ee4d8ab5a12bd\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:53:25.984940 env[1127]: time="2024-04-12T18:53:25.984905611Z" level=info msg="CreateContainer within sandbox \"ddce5127fbe84dffd1a3eec361a4b6722e8754688dc1c9df23ef5bf00a62232c\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"87379cb75527067d8a1ffa2a9c62c38fa0f939b894b8d307866492e38cafcaae\"" Apr 12 18:53:25.985648 env[1127]: time="2024-04-12T18:53:25.985581830Z" level=info msg="StartContainer for \"87379cb75527067d8a1ffa2a9c62c38fa0f939b894b8d307866492e38cafcaae\"" Apr 12 18:53:25.997833 env[1127]: time="2024-04-12T18:53:25.997771294Z" level=info msg="CreateContainer within sandbox \"74957227ab98e6eeff37a31c499edc093d3391721e9af42f45e4d129799d6f24\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"0246abbc194905c4c1283bc72ca6ba11924f70a22b6341c946da32902fcfc36d\"" Apr 12 18:53:25.998456 env[1127]: time="2024-04-12T18:53:25.998423287Z" level=info msg="StartContainer for \"0246abbc194905c4c1283bc72ca6ba11924f70a22b6341c946da32902fcfc36d\"" Apr 12 18:53:26.004043 kubelet[1667]: W0412 18:53:26.003990 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.004165 kubelet[1667]: E0412 18:53:26.004049 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.104:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.005151 systemd[1]: Started cri-containerd-87379cb75527067d8a1ffa2a9c62c38fa0f939b894b8d307866492e38cafcaae.scope. Apr 12 18:53:26.015517 systemd[1]: Started cri-containerd-0246abbc194905c4c1283bc72ca6ba11924f70a22b6341c946da32902fcfc36d.scope. Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit: BPF prog-id=79 op=LOAD Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1729 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837333739636237353532373036376438613166666132613963363263 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1729 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837333739636237353532373036376438613166666132613963363263 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit: BPF prog-id=80 op=LOAD Apr 12 18:53:26.018000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00024fc00 items=0 ppid=1729 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837333739636237353532373036376438613166666132613963363263 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.018000 audit: BPF prog-id=81 op=LOAD Apr 12 18:53:26.018000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00024fc48 items=0 ppid=1729 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.018000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837333739636237353532373036376438613166666132613963363263 Apr 12 18:53:26.019000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:53:26.019000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { perfmon } for pid=1833 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit[1833]: AVC avc: denied { bpf } for pid=1833 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.019000 audit: BPF prog-id=82 op=LOAD Apr 12 18:53:26.019000 audit[1833]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c00032e058 items=0 ppid=1729 pid=1833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837333739636237353532373036376438613166666132613963363263 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit: BPF prog-id=83 op=LOAD Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032343661626263313934393035633463313238336263373263613662 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032343661626263313934393035633463313238336263373263613662 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.029000 audit: BPF prog-id=84 op=LOAD Apr 12 18:53:26.029000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000229390 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032343661626263313934393035633463313238336263373263613662 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit: BPF prog-id=85 op=LOAD Apr 12 18:53:26.030000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002293d8 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032343661626263313934393035633463313238336263373263613662 Apr 12 18:53:26.030000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:53:26.030000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { perfmon } for pid=1848 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit[1848]: AVC avc: denied { bpf } for pid=1848 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.030000 audit: BPF prog-id=86 op=LOAD Apr 12 18:53:26.030000 audit[1848]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002297e8 items=0 ppid=1711 pid=1848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.030000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032343661626263313934393035633463313238336263373263613662 Apr 12 18:53:26.167816 kubelet[1667]: E0412 18:53:26.167770 1667 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.104:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.104:6443: connect: connection refused" interval="1.6s" Apr 12 18:53:26.200371 env[1127]: time="2024-04-12T18:53:26.200320568Z" level=info msg="StartContainer for \"87379cb75527067d8a1ffa2a9c62c38fa0f939b894b8d307866492e38cafcaae\" returns successfully" Apr 12 18:53:26.274005 kubelet[1667]: W0412 18:53:26.273622 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.274005 kubelet[1667]: E0412 18:53:26.273685 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.104:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.274005 kubelet[1667]: I0412 18:53:26.273704 1667 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:26.274005 kubelet[1667]: E0412 18:53:26.273911 1667 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.104:6443/api/v1/nodes\": dial tcp 10.0.0.104:6443: connect: connection refused" node="localhost" Apr 12 18:53:26.295933 kubelet[1667]: W0412 18:53:26.295868 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.296097 kubelet[1667]: E0412 18:53:26.295951 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.104:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.322673 env[1127]: time="2024-04-12T18:53:26.322625057Z" level=info msg="StartContainer for \"0246abbc194905c4c1283bc72ca6ba11924f70a22b6341c946da32902fcfc36d\" returns successfully" Apr 12 18:53:26.347863 kubelet[1667]: W0412 18:53:26.347793 1667 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.347863 kubelet[1667]: E0412 18:53:26.347867 1667 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.104:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.104:6443: connect: connection refused Apr 12 18:53:26.455230 env[1127]: time="2024-04-12T18:53:26.455174632Z" level=info msg="CreateContainer within sandbox \"1bbf4e44dd9bd740fd0090d41a0247615a72257df945c710c97ee4d8ab5a12bd\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6eedfadede5aa449e4e54ef5581549575fccc20405dd1ff6c5b02c068a0baaad\"" Apr 12 18:53:26.455836 env[1127]: time="2024-04-12T18:53:26.455799584Z" level=info msg="StartContainer for \"6eedfadede5aa449e4e54ef5581549575fccc20405dd1ff6c5b02c068a0baaad\"" Apr 12 18:53:26.472559 systemd[1]: Started cri-containerd-6eedfadede5aa449e4e54ef5581549575fccc20405dd1ff6c5b02c068a0baaad.scope. Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.484000 audit: BPF prog-id=87 op=LOAD Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1730 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656466616465646535616134343965346535346566353538313534 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1730 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656466616465646535616134343965346535346566353538313534 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit: BPF prog-id=88 op=LOAD Apr 12 18:53:26.485000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002d7ed0 items=0 ppid=1730 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656466616465646535616134343965346535346566353538313534 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit: BPF prog-id=89 op=LOAD Apr 12 18:53:26.485000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002d7f18 items=0 ppid=1730 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656466616465646535616134343965346535346566353538313534 Apr 12 18:53:26.485000 audit: BPF prog-id=89 op=UNLOAD Apr 12 18:53:26.485000 audit: BPF prog-id=88 op=UNLOAD Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { perfmon } for pid=1903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit[1903]: AVC avc: denied { bpf } for pid=1903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:26.485000 audit: BPF prog-id=90 op=LOAD Apr 12 18:53:26.485000 audit[1903]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035c328 items=0 ppid=1730 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:26.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665656466616465646535616134343965346535346566353538313534 Apr 12 18:53:26.619765 env[1127]: time="2024-04-12T18:53:26.619663416Z" level=info msg="StartContainer for \"6eedfadede5aa449e4e54ef5581549575fccc20405dd1ff6c5b02c068a0baaad\" returns successfully" Apr 12 18:53:26.787306 kubelet[1667]: E0412 18:53:26.787258 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:26.789215 kubelet[1667]: E0412 18:53:26.789192 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:26.797261 kubelet[1667]: E0412 18:53:26.797236 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:27.079000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.079000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00091c180 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:27.079000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:27.079000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.079000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000f02020 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:27.079000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:27.470000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.470000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007f25060 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.470000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.470000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c00467e000 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.470000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.471000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.471000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c004c921b0 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.472000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.472000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c004c924e0 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.472000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.473000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.473000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c007f25180 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.473000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:27.473000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=47 a1=c004c927b0 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:53:27.473000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:53:27.772091 kubelet[1667]: E0412 18:53:27.771962 1667 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:53:27.799035 kubelet[1667]: E0412 18:53:27.799002 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:27.822263 kubelet[1667]: E0412 18:53:27.822227 1667 csi_plugin.go:300] Failed to initialize CSINode: error updating CSINode annotation: timed out waiting for the condition; caused by: nodes "localhost" not found Apr 12 18:53:27.875040 kubelet[1667]: I0412 18:53:27.875012 1667 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:27.878257 kubelet[1667]: I0412 18:53:27.878226 1667 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:53:27.884218 kubelet[1667]: E0412 18:53:27.884199 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:27.984846 kubelet[1667]: E0412 18:53:27.984792 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.085004 kubelet[1667]: E0412 18:53:28.084892 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.185573 kubelet[1667]: E0412 18:53:28.185545 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.286652 kubelet[1667]: E0412 18:53:28.286622 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.387597 kubelet[1667]: E0412 18:53:28.387516 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.488338 kubelet[1667]: E0412 18:53:28.488282 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.588866 kubelet[1667]: E0412 18:53:28.588821 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.689489 kubelet[1667]: E0412 18:53:28.689349 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.789526 kubelet[1667]: E0412 18:53:28.789479 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.890498 kubelet[1667]: E0412 18:53:28.890455 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:28.991147 kubelet[1667]: E0412 18:53:28.990995 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:29.091756 kubelet[1667]: E0412 18:53:29.091692 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:29.192542 kubelet[1667]: E0412 18:53:29.192479 1667 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:29.763957 kubelet[1667]: I0412 18:53:29.763886 1667 apiserver.go:52] "Watching apiserver" Apr 12 18:53:29.766238 kubelet[1667]: I0412 18:53:29.766212 1667 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:29.767150 kubelet[1667]: E0412 18:53:29.767115 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:29.801586 kubelet[1667]: E0412 18:53:29.801541 1667 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:29.987777 systemd[1]: Reloading. Apr 12 18:53:30.126079 /usr/lib/systemd/system-generators/torcx-generator[1954]: time="2024-04-12T18:53:30Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:53:30.126480 /usr/lib/systemd/system-generators/torcx-generator[1954]: time="2024-04-12T18:53:30Z" level=info msg="torcx already run" Apr 12 18:53:30.299380 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:53:30.299413 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:53:30.319022 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:53:30.390078 kernel: kauditd_printk_skb: 587 callbacks suppressed Apr 12 18:53:30.390168 kernel: audit: type=1400 audit(1712948010.380:694): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.390207 kernel: audit: type=1400 audit(1712948010.380:695): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.397587 kernel: audit: type=1400 audit(1712948010.380:696): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.397709 kernel: audit: type=1400 audit(1712948010.380:697): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.397734 kernel: audit: type=1400 audit(1712948010.380:698): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.404245 kernel: audit: type=1400 audit(1712948010.380:699): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.404292 kernel: audit: type=1400 audit(1712948010.380:700): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.410816 kernel: audit: type=1400 audit(1712948010.380:701): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.410861 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:53:30.410882 kernel: audit: type=1400 audit(1712948010.385:702): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit: BPF prog-id=91 op=LOAD Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.385000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.388000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.388000 audit: BPF prog-id=92 op=LOAD Apr 12 18:53:30.388000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:53:30.388000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.389000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit: BPF prog-id=93 op=LOAD Apr 12 18:53:30.392000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit: BPF prog-id=94 op=LOAD Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.396000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.399000 audit: BPF prog-id=95 op=LOAD Apr 12 18:53:30.399000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:53:30.399000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit: BPF prog-id=96 op=LOAD Apr 12 18:53:30.406000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.406000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.411000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit: BPF prog-id=97 op=LOAD Apr 12 18:53:30.413000 audit: BPF prog-id=87 op=UNLOAD Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.413000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit: BPF prog-id=98 op=LOAD Apr 12 18:53:30.414000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit: BPF prog-id=99 op=LOAD Apr 12 18:53:30.414000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit: BPF prog-id=100 op=LOAD Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit: BPF prog-id=101 op=LOAD Apr 12 18:53:30.415000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:53:30.415000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.415000 audit: BPF prog-id=102 op=LOAD Apr 12 18:53:30.416000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.416000 audit: BPF prog-id=103 op=LOAD Apr 12 18:53:30.416000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit: BPF prog-id=104 op=LOAD Apr 12 18:53:30.417000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.417000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.418000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.418000 audit: BPF prog-id=105 op=LOAD Apr 12 18:53:30.418000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.419000 audit: BPF prog-id=106 op=LOAD Apr 12 18:53:30.419000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit: BPF prog-id=107 op=LOAD Apr 12 18:53:30.421000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit: BPF prog-id=108 op=LOAD Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.421000 audit: BPF prog-id=109 op=LOAD Apr 12 18:53:30.421000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:53:30.421000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit: BPF prog-id=110 op=LOAD Apr 12 18:53:30.422000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.423000 audit: BPF prog-id=111 op=LOAD Apr 12 18:53:30.423000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:53:30.434683 kubelet[1667]: I0412 18:53:30.434578 1667 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:30.434702 systemd[1]: Stopping kubelet.service... Apr 12 18:53:30.457670 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:53:30.457829 systemd[1]: Stopped kubelet.service. Apr 12 18:53:30.456000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:30.459474 systemd[1]: Started kubelet.service. Apr 12 18:53:30.458000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:30.513679 kubelet[1995]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:30.513679 kubelet[1995]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:53:30.513679 kubelet[1995]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:53:30.513679 kubelet[1995]: I0412 18:53:30.510024 1995 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:53:30.515011 kubelet[1995]: I0412 18:53:30.514974 1995 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:53:30.515011 kubelet[1995]: I0412 18:53:30.514996 1995 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:53:30.515246 kubelet[1995]: I0412 18:53:30.515220 1995 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:53:30.516538 kubelet[1995]: I0412 18:53:30.516517 1995 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:53:30.518217 kubelet[1995]: I0412 18:53:30.518164 1995 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:53:30.526897 kubelet[1995]: I0412 18:53:30.526862 1995 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:53:30.527103 kubelet[1995]: I0412 18:53:30.527082 1995 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:53:30.527431 kubelet[1995]: I0412 18:53:30.527385 1995 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:53:30.527577 kubelet[1995]: I0412 18:53:30.527439 1995 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:53:30.527577 kubelet[1995]: I0412 18:53:30.527449 1995 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:53:30.527577 kubelet[1995]: I0412 18:53:30.527475 1995 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:30.527577 kubelet[1995]: I0412 18:53:30.527565 1995 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:53:30.527577 kubelet[1995]: I0412 18:53:30.527578 1995 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:53:30.527748 kubelet[1995]: I0412 18:53:30.527598 1995 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:53:30.527748 kubelet[1995]: I0412 18:53:30.527625 1995 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:53:30.533096 kubelet[1995]: I0412 18:53:30.533028 1995 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:53:30.533556 kubelet[1995]: I0412 18:53:30.533539 1995 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:53:30.534264 kubelet[1995]: I0412 18:53:30.534248 1995 server.go:1256] "Started kubelet" Apr 12 18:53:30.538615 kubelet[1995]: I0412 18:53:30.538584 1995 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:53:30.537000 audit[1995]: AVC avc: denied { mac_admin } for pid=1995 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:30.537000 audit[1995]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d9a4e0 a1=c000dd6ab0 a2=c000d9a4b0 a3=25 items=0 ppid=1 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:30.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:30.537000 audit[1995]: AVC avc: denied { mac_admin } for pid=1995 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.537000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:30.537000 audit[1995]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d95620 a1=c000dd6ac8 a2=c000d9a570 a3=25 items=0 ppid=1 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:30.537000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:30.539334 kubelet[1995]: I0412 18:53:30.538868 1995 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:53:30.539334 kubelet[1995]: I0412 18:53:30.538906 1995 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:53:30.539334 kubelet[1995]: I0412 18:53:30.538923 1995 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:53:30.539334 kubelet[1995]: I0412 18:53:30.538943 1995 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:53:30.539334 kubelet[1995]: I0412 18:53:30.539213 1995 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:53:30.540229 kubelet[1995]: I0412 18:53:30.540205 1995 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:53:30.546192 kubelet[1995]: E0412 18:53:30.546155 1995 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:53:30.546192 kubelet[1995]: I0412 18:53:30.546199 1995 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:53:30.546389 kubelet[1995]: I0412 18:53:30.546359 1995 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:53:30.546561 kubelet[1995]: I0412 18:53:30.546539 1995 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:53:30.548981 kubelet[1995]: E0412 18:53:30.548954 1995 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:53:30.549349 kubelet[1995]: I0412 18:53:30.549328 1995 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:53:30.549466 kubelet[1995]: I0412 18:53:30.549440 1995 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:53:30.552478 kubelet[1995]: I0412 18:53:30.551457 1995 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:53:30.570469 kubelet[1995]: I0412 18:53:30.570385 1995 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:53:30.571315 kubelet[1995]: I0412 18:53:30.571292 1995 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:53:30.571315 kubelet[1995]: I0412 18:53:30.571315 1995 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:53:30.571477 kubelet[1995]: I0412 18:53:30.571456 1995 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:53:30.571616 kubelet[1995]: E0412 18:53:30.571593 1995 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:53:30.594850 kubelet[1995]: I0412 18:53:30.594811 1995 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:53:30.594850 kubelet[1995]: I0412 18:53:30.594834 1995 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:53:30.594850 kubelet[1995]: I0412 18:53:30.594849 1995 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:53:30.595095 kubelet[1995]: I0412 18:53:30.595010 1995 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:53:30.595095 kubelet[1995]: I0412 18:53:30.595030 1995 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:53:30.595095 kubelet[1995]: I0412 18:53:30.595036 1995 policy_none.go:49] "None policy: Start" Apr 12 18:53:30.595968 kubelet[1995]: I0412 18:53:30.595947 1995 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:53:30.596079 kubelet[1995]: I0412 18:53:30.596064 1995 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:53:30.596553 kubelet[1995]: I0412 18:53:30.596537 1995 state_mem.go:75] "Updated machine memory state" Apr 12 18:53:30.600963 kubelet[1995]: I0412 18:53:30.600941 1995 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:53:30.599000 audit[1995]: AVC avc: denied { mac_admin } for pid=1995 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:30.599000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:53:30.599000 audit[1995]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c001218ea0 a1=c0012691b8 a2=c001218e70 a3=25 items=0 ppid=1 pid=1995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:30.599000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:53:30.602492 kubelet[1995]: I0412 18:53:30.602474 1995 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:53:30.603500 kubelet[1995]: I0412 18:53:30.603381 1995 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:53:30.650175 kubelet[1995]: I0412 18:53:30.650049 1995 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:53:30.656903 kubelet[1995]: I0412 18:53:30.656581 1995 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Apr 12 18:53:30.656903 kubelet[1995]: I0412 18:53:30.656671 1995 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:53:30.672315 kubelet[1995]: I0412 18:53:30.672256 1995 topology_manager.go:215] "Topology Admit Handler" podUID="88624889ca8fabd20d18f623b5eb4f39" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:53:30.672546 kubelet[1995]: I0412 18:53:30.672334 1995 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:53:30.672546 kubelet[1995]: I0412 18:53:30.672365 1995 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:53:30.677856 kubelet[1995]: E0412 18:53:30.677814 1995 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:30.847226 kubelet[1995]: I0412 18:53:30.847176 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:30.847226 kubelet[1995]: I0412 18:53:30.847233 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:53:30.847442 kubelet[1995]: I0412 18:53:30.847254 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:30.847442 kubelet[1995]: I0412 18:53:30.847339 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:30.847442 kubelet[1995]: I0412 18:53:30.847384 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:30.847442 kubelet[1995]: I0412 18:53:30.847424 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:30.847442 kubelet[1995]: I0412 18:53:30.847442 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:30.847683 kubelet[1995]: I0412 18:53:30.847461 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:53:30.847683 kubelet[1995]: I0412 18:53:30.847481 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/88624889ca8fabd20d18f623b5eb4f39-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"88624889ca8fabd20d18f623b5eb4f39\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:30.976588 kubelet[1995]: E0412 18:53:30.976473 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:30.976722 kubelet[1995]: E0412 18:53:30.976692 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:30.978344 kubelet[1995]: E0412 18:53:30.978317 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:31.533077 kubelet[1995]: I0412 18:53:31.533018 1995 apiserver.go:52] "Watching apiserver" Apr 12 18:53:31.546996 kubelet[1995]: I0412 18:53:31.546977 1995 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:53:31.591063 kubelet[1995]: E0412 18:53:31.591038 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:31.591063 kubelet[1995]: E0412 18:53:31.591083 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:31.989754 kubelet[1995]: E0412 18:53:31.989636 1995 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:53:31.990124 kubelet[1995]: E0412 18:53:31.990102 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:32.270596 kubelet[1995]: I0412 18:53:32.270537 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.270457166 podStartE2EDuration="2.270457166s" podCreationTimestamp="2024-04-12 18:53:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:31.992186889 +0000 UTC m=+1.527539926" watchObservedRunningTime="2024-04-12 18:53:32.270457166 +0000 UTC m=+1.805810654" Apr 12 18:53:32.519549 kubelet[1995]: I0412 18:53:32.519505 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.519463864 podStartE2EDuration="2.519463864s" podCreationTimestamp="2024-04-12 18:53:30 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:32.271591129 +0000 UTC m=+1.806944176" watchObservedRunningTime="2024-04-12 18:53:32.519463864 +0000 UTC m=+2.054816891" Apr 12 18:53:32.539853 kubelet[1995]: I0412 18:53:32.539730 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.539670406 podStartE2EDuration="3.539670406s" podCreationTimestamp="2024-04-12 18:53:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:32.520827848 +0000 UTC m=+2.056180885" watchObservedRunningTime="2024-04-12 18:53:32.539670406 +0000 UTC m=+2.075023443" Apr 12 18:53:32.593579 kubelet[1995]: E0412 18:53:32.593541 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:36.263104 sudo[1253]: pam_unix(sudo:session): session closed for user root Apr 12 18:53:36.261000 audit[1253]: USER_END pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.264497 kernel: kauditd_printk_skb: 254 callbacks suppressed Apr 12 18:53:36.264626 kernel: audit: type=1106 audit(1712948016.261:940): pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.264463 sshd[1250]: pam_unix(sshd:session): session closed for user core Apr 12 18:53:36.261000 audit[1253]: CRED_DISP pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.270563 systemd-logind[1110]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:53:36.270820 systemd[1]: sshd@6-10.0.0.104:22-10.0.0.1:45382.service: Deactivated successfully. Apr 12 18:53:36.271453 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:53:36.271574 systemd[1]: session-7.scope: Consumed 3.894s CPU time. Apr 12 18:53:36.272047 systemd-logind[1110]: Removed session 7. Apr 12 18:53:36.274174 kernel: audit: type=1104 audit(1712948016.261:941): pid=1253 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.274242 kernel: audit: type=1106 audit(1712948016.263:942): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:36.263000 audit[1250]: USER_END pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:36.264000 audit[1250]: CRED_DISP pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:36.284971 kernel: audit: type=1104 audit(1712948016.264:943): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:53:36.285012 kernel: audit: type=1131 audit(1712948016.269:944): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.104:22-10.0.0.1:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.104:22-10.0.0.1:45382 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:53:36.490032 kubelet[1995]: E0412 18:53:36.490002 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:36.598552 kubelet[1995]: E0412 18:53:36.598516 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:36.973894 kubelet[1995]: E0412 18:53:36.973774 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:37.599637 kubelet[1995]: E0412 18:53:37.599600 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:38.066871 kubelet[1995]: E0412 18:53:38.066828 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:38.601414 kubelet[1995]: E0412 18:53:38.601366 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:40.975177 update_engine[1111]: I0412 18:53:40.975112 1111 update_attempter.cc:509] Updating boot flags... Apr 12 18:53:41.059000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:53:41.059000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001104380 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.073898 kernel: audit: type=1400 audit(1712948021.059:945): avc: denied { watch } for pid=1866 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521015 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:53:41.074040 kernel: audit: type=1300 audit(1712948021.059:945): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c001104380 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.059000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.081434 kernel: audit: type=1327 audit(1712948021.059:945): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.862000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.862000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6ac0 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.882293 kernel: audit: type=1400 audit(1712948021.862:946): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.882521 kernel: audit: type=1300 audit(1712948021.862:946): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6ac0 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.882577 kernel: audit: type=1327 audit(1712948021.862:946): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.873000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.873000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000686380 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.905283 kernel: audit: type=1400 audit(1712948021.873:947): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.905487 kernel: audit: type=1300 audit(1712948021.873:947): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000686380 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.909467 kernel: audit: type=1327 audit(1712948021.873:947): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.873000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.919570 kernel: audit: type=1400 audit(1712948021.875:948): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.875000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.875000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6c80 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.931892 kernel: audit: type=1300 audit(1712948021.875:948): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6c80 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.932077 kernel: audit: type=1327 audit(1712948021.875:948): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:41.875000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.942665 kernel: audit: type=1400 audit(1712948021.875:949): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:53:41.875000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000cb6ca0 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:53:41.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:53:44.043154 kubelet[1995]: I0412 18:53:44.043108 1995 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:53:44.043737 env[1127]: time="2024-04-12T18:53:44.043684649Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:53:44.043926 kubelet[1995]: I0412 18:53:44.043906 1995 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:53:45.040842 kubelet[1995]: I0412 18:53:45.040772 1995 topology_manager.go:215] "Topology Admit Handler" podUID="53ad7c17-7be6-4a8f-8d28-749b14df20c9" podNamespace="kube-system" podName="kube-proxy-2r547" Apr 12 18:53:45.056873 systemd[1]: Created slice kubepods-besteffort-pod53ad7c17_7be6_4a8f_8d28_749b14df20c9.slice. Apr 12 18:53:45.082440 kubelet[1995]: I0412 18:53:45.082358 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/53ad7c17-7be6-4a8f-8d28-749b14df20c9-kube-proxy\") pod \"kube-proxy-2r547\" (UID: \"53ad7c17-7be6-4a8f-8d28-749b14df20c9\") " pod="kube-system/kube-proxy-2r547" Apr 12 18:53:45.083530 kubelet[1995]: I0412 18:53:45.083511 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/53ad7c17-7be6-4a8f-8d28-749b14df20c9-xtables-lock\") pod \"kube-proxy-2r547\" (UID: \"53ad7c17-7be6-4a8f-8d28-749b14df20c9\") " pod="kube-system/kube-proxy-2r547" Apr 12 18:53:45.083666 kubelet[1995]: I0412 18:53:45.083651 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/53ad7c17-7be6-4a8f-8d28-749b14df20c9-lib-modules\") pod \"kube-proxy-2r547\" (UID: \"53ad7c17-7be6-4a8f-8d28-749b14df20c9\") " pod="kube-system/kube-proxy-2r547" Apr 12 18:53:45.083849 kubelet[1995]: I0412 18:53:45.083797 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6mbf8\" (UniqueName: \"kubernetes.io/projected/53ad7c17-7be6-4a8f-8d28-749b14df20c9-kube-api-access-6mbf8\") pod \"kube-proxy-2r547\" (UID: \"53ad7c17-7be6-4a8f-8d28-749b14df20c9\") " pod="kube-system/kube-proxy-2r547" Apr 12 18:53:45.409797 kubelet[1995]: I0412 18:53:45.409664 1995 topology_manager.go:215] "Topology Admit Handler" podUID="d89951b6-731f-46c9-aae4-5053d25950f6" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-5bdrr" Apr 12 18:53:45.428324 systemd[1]: Created slice kubepods-besteffort-podd89951b6_731f_46c9_aae4_5053d25950f6.slice. Apr 12 18:53:45.486912 kubelet[1995]: I0412 18:53:45.486843 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kbcq6\" (UniqueName: \"kubernetes.io/projected/d89951b6-731f-46c9-aae4-5053d25950f6-kube-api-access-kbcq6\") pod \"tigera-operator-6bfc79cb9c-5bdrr\" (UID: \"d89951b6-731f-46c9-aae4-5053d25950f6\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-5bdrr" Apr 12 18:53:45.486912 kubelet[1995]: I0412 18:53:45.486907 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/d89951b6-731f-46c9-aae4-5053d25950f6-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-5bdrr\" (UID: \"d89951b6-731f-46c9-aae4-5053d25950f6\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-5bdrr" Apr 12 18:53:45.674259 kubelet[1995]: E0412 18:53:45.673647 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:45.674867 env[1127]: time="2024-04-12T18:53:45.674779979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2r547,Uid:53ad7c17-7be6-4a8f-8d28-749b14df20c9,Namespace:kube-system,Attempt:0,}" Apr 12 18:53:45.732184 env[1127]: time="2024-04-12T18:53:45.731894754Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-5bdrr,Uid:d89951b6-731f-46c9-aae4-5053d25950f6,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:53:45.832061 env[1127]: time="2024-04-12T18:53:45.831468414Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:45.832061 env[1127]: time="2024-04-12T18:53:45.831578983Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:45.832061 env[1127]: time="2024-04-12T18:53:45.831601836Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:45.832061 env[1127]: time="2024-04-12T18:53:45.831726242Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d2632da77845cfeb9a42b4d74653d642fe498d321050f7c246a13bbb6b988526 pid=2109 runtime=io.containerd.runc.v2 Apr 12 18:53:45.843152 systemd[1]: Started cri-containerd-d2632da77845cfeb9a42b4d74653d642fe498d321050f7c246a13bbb6b988526.scope. Apr 12 18:53:45.844582 env[1127]: time="2024-04-12T18:53:45.844496963Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:45.844582 env[1127]: time="2024-04-12T18:53:45.844534153Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:45.844582 env[1127]: time="2024-04-12T18:53:45.844544853Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:45.844994 env[1127]: time="2024-04-12T18:53:45.844818662Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a2d0ef035de950dd7e4703ee82392dff51284e3024c6dba4850436fa19d3a02c pid=2133 runtime=io.containerd.runc.v2 Apr 12 18:53:45.857166 systemd[1]: Started cri-containerd-a2d0ef035de950dd7e4703ee82392dff51284e3024c6dba4850436fa19d3a02c.scope. Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.859000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.860000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.860000 audit: BPF prog-id=112 op=LOAD Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432363332646137373834356366656239613432623464373436353364 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432363332646137373834356366656239613432623464373436353364 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit: BPF prog-id=113 op=LOAD Apr 12 18:53:45.861000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a8ec0 items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432363332646137373834356366656239613432623464373436353364 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit: BPF prog-id=114 op=LOAD Apr 12 18:53:45.861000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a8f08 items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432363332646137373834356366656239613432623464373436353364 Apr 12 18:53:45.861000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:53:45.861000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { perfmon } for pid=2121 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit[2121]: AVC avc: denied { bpf } for pid=2121 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.861000 audit: BPF prog-id=115 op=LOAD Apr 12 18:53:45.861000 audit[2121]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a9318 items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432363332646137373834356366656239613432623464373436353364 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit: BPF prog-id=116 op=LOAD Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643065663033356465393530646437653437303365653832333932 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643065663033356465393530646437653437303365653832333932 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit: BPF prog-id=117 op=LOAD Apr 12 18:53:45.871000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0003e87f0 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643065663033356465393530646437653437303365653832333932 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit: BPF prog-id=118 op=LOAD Apr 12 18:53:45.871000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0003e8838 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643065663033356465393530646437653437303365653832333932 Apr 12 18:53:45.871000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:53:45.871000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { perfmon } for pid=2144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit[2144]: AVC avc: denied { bpf } for pid=2144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:45.871000 audit: BPF prog-id=119 op=LOAD Apr 12 18:53:45.871000 audit[2144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003e8c48 items=0 ppid=2133 pid=2144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:45.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132643065663033356465393530646437653437303365653832333932 Apr 12 18:53:45.877095 kubelet[1995]: E0412 18:53:45.875428 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:45.877163 env[1127]: time="2024-04-12T18:53:45.874695553Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-2r547,Uid:53ad7c17-7be6-4a8f-8d28-749b14df20c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"d2632da77845cfeb9a42b4d74653d642fe498d321050f7c246a13bbb6b988526\"" Apr 12 18:53:45.881663 env[1127]: time="2024-04-12T18:53:45.881595218Z" level=info msg="CreateContainer within sandbox \"d2632da77845cfeb9a42b4d74653d642fe498d321050f7c246a13bbb6b988526\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:53:45.898705 env[1127]: time="2024-04-12T18:53:45.898650301Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-5bdrr,Uid:d89951b6-731f-46c9-aae4-5053d25950f6,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"a2d0ef035de950dd7e4703ee82392dff51284e3024c6dba4850436fa19d3a02c\"" Apr 12 18:53:45.900735 env[1127]: time="2024-04-12T18:53:45.900678581Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:53:45.976715 env[1127]: time="2024-04-12T18:53:45.976604235Z" level=info msg="CreateContainer within sandbox \"d2632da77845cfeb9a42b4d74653d642fe498d321050f7c246a13bbb6b988526\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"a0c13581305e1076ce6b0f20ad5b2dcb447795a323726f4eac93501d7a01e7e4\"" Apr 12 18:53:45.979173 env[1127]: time="2024-04-12T18:53:45.978286360Z" level=info msg="StartContainer for \"a0c13581305e1076ce6b0f20ad5b2dcb447795a323726f4eac93501d7a01e7e4\"" Apr 12 18:53:45.995198 systemd[1]: Started cri-containerd-a0c13581305e1076ce6b0f20ad5b2dcb447795a323726f4eac93501d7a01e7e4.scope. Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f939006fa78 items=0 ppid=2109 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633133353831333035653130373663653662306632306164356232 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit: BPF prog-id=120 op=LOAD Apr 12 18:53:46.008000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003d03b8 items=0 ppid=2109 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633133353831333035653130373663653662306632306164356232 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.008000 audit: BPF prog-id=121 op=LOAD Apr 12 18:53:46.008000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003d0408 items=0 ppid=2109 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633133353831333035653130373663653662306632306164356232 Apr 12 18:53:46.008000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:53:46.008000 audit: BPF prog-id=120 op=UNLOAD Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { perfmon } for pid=2189 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit[2189]: AVC avc: denied { bpf } for pid=2189 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:46.009000 audit: BPF prog-id=122 op=LOAD Apr 12 18:53:46.009000 audit[2189]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003d0498 items=0 ppid=2109 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130633133353831333035653130373663653662306632306164356232 Apr 12 18:53:46.025089 env[1127]: time="2024-04-12T18:53:46.025007439Z" level=info msg="StartContainer for \"a0c13581305e1076ce6b0f20ad5b2dcb447795a323726f4eac93501d7a01e7e4\" returns successfully" Apr 12 18:53:46.076000 audit[2242]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2242 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.076000 audit[2242]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd38900b10 a2=0 a3=7ffd38900afc items=0 ppid=2200 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.076000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:46.077000 audit[2243]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.077000 audit[2243]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcda8ebf50 a2=0 a3=7ffcda8ebf3c items=0 ppid=2200 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.077000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:53:46.077000 audit[2244]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2244 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.077000 audit[2244]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b14edb0 a2=0 a3=149aa4506321edf9 items=0 ppid=2200 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.077000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:46.078000 audit[2245]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.078000 audit[2245]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed1ef02a0 a2=0 a3=7ffed1ef028c items=0 ppid=2200 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.078000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:53:46.079000 audit[2247]: NETFILTER_CFG table=filter:42 family=2 entries=1 op=nft_register_chain pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.079000 audit[2247]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe2c599530 a2=0 a3=7ffe2c59951c items=0 ppid=2200 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.079000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:46.081000 audit[2246]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.081000 audit[2246]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc0012e710 a2=0 a3=7ffc0012e6fc items=0 ppid=2200 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:53:46.179000 audit[2248]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.179000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7fffff1e1130 a2=0 a3=7fffff1e111c items=0 ppid=2200 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.179000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:46.182000 audit[2250]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.182000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd6c765000 a2=0 a3=7ffd6c764fec items=0 ppid=2200 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:53:46.187000 audit[2253]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.187000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff01e4a110 a2=0 a3=7fff01e4a0fc items=0 ppid=2200 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.187000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:53:46.188000 audit[2254]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.188000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdc1629ee0 a2=0 a3=7ffdc1629ecc items=0 ppid=2200 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.188000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:46.191000 audit[2256]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.191000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd36ad3dc0 a2=0 a3=7ffd36ad3dac items=0 ppid=2200 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:46.193000 audit[2257]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.193000 audit[2257]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe01fb1560 a2=0 a3=7ffe01fb154c items=0 ppid=2200 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.193000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:46.196000 audit[2259]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.196000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd35682fd0 a2=0 a3=7ffd35682fbc items=0 ppid=2200 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.196000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:46.200000 audit[2262]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.200000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffc07ac30a0 a2=0 a3=7ffc07ac308c items=0 ppid=2200 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.200000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:53:46.201000 audit[2263]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.201000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffeb686a400 a2=0 a3=7ffeb686a3ec items=0 ppid=2200 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.201000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:46.205000 audit[2265]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.205000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc746a6ad0 a2=0 a3=7ffc746a6abc items=0 ppid=2200 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.205000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:46.207000 audit[2266]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.207000 audit[2266]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5d572680 a2=0 a3=7fff5d57266c items=0 ppid=2200 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.207000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:46.210000 audit[2268]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.210000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc50877130 a2=0 a3=7ffc5087711c items=0 ppid=2200 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.210000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:46.214000 audit[2271]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.214000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc4e2ff420 a2=0 a3=7ffc4e2ff40c items=0 ppid=2200 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.214000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:46.218000 audit[2274]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.218000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffcc835b0e0 a2=0 a3=7ffcc835b0cc items=0 ppid=2200 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:46.219000 audit[2275]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2275 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.219000 audit[2275]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff89ad5e50 a2=0 a3=7fff89ad5e3c items=0 ppid=2200 pid=2275 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:46.222000 audit[2277]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.222000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe8cadd070 a2=0 a3=7ffe8cadd05c items=0 ppid=2200 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:46.226000 audit[2280]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.226000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd607e9630 a2=0 a3=7ffd607e961c items=0 ppid=2200 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:46.228000 audit[2281]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.228000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3ffbc990 a2=0 a3=7fff3ffbc97c items=0 ppid=2200 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:46.230000 audit[2283]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:53:46.230000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffd78229560 a2=0 a3=7ffd7822954c items=0 ppid=2200 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.230000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:46.252000 audit[2289]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:46.252000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffecfed14e0 a2=0 a3=7ffecfed14cc items=0 ppid=2200 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.252000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:46.262000 audit[2289]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:46.262000 audit[2289]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffecfed14e0 a2=0 a3=7ffecfed14cc items=0 ppid=2200 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.262000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:46.263000 audit[2295]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.263000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeea469510 a2=0 a3=7ffeea4694fc items=0 ppid=2200 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.263000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:53:46.266000 audit[2297]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.266000 audit[2297]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe4b4dd0d0 a2=0 a3=7ffe4b4dd0bc items=0 ppid=2200 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.266000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:53:46.270000 audit[2300]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.270000 audit[2300]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff5e4a9620 a2=0 a3=7fff5e4a960c items=0 ppid=2200 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.270000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:53:46.271000 audit[2301]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.271000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4f06faa0 a2=0 a3=7fff4f06fa8c items=0 ppid=2200 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.271000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:53:46.274000 audit[2303]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.274000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd4d21a370 a2=0 a3=7ffd4d21a35c items=0 ppid=2200 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.274000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:53:46.275000 audit[2304]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2304 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.275000 audit[2304]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1f8ceff0 a2=0 a3=7fff1f8cefdc items=0 ppid=2200 pid=2304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.275000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:53:46.279000 audit[2306]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.279000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffee2f5f770 a2=0 a3=7ffee2f5f75c items=0 ppid=2200 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.279000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:53:46.283000 audit[2309]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.283000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffdaf466240 a2=0 a3=7ffdaf46622c items=0 ppid=2200 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.283000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:53:46.285000 audit[2310]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.285000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff1fef6220 a2=0 a3=7fff1fef620c items=0 ppid=2200 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.285000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:53:46.288000 audit[2312]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.288000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffce4fb6770 a2=0 a3=7ffce4fb675c items=0 ppid=2200 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:53:46.290000 audit[2313]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2313 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.290000 audit[2313]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd0cb011b0 a2=0 a3=7ffd0cb0119c items=0 ppid=2200 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.290000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:53:46.292000 audit[2315]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.292000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdb58d9050 a2=0 a3=7ffdb58d903c items=0 ppid=2200 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.292000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:53:46.297000 audit[2318]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.297000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd86c54e40 a2=0 a3=7ffd86c54e2c items=0 ppid=2200 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:53:46.301000 audit[2321]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.301000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc92cd4820 a2=0 a3=7ffc92cd480c items=0 ppid=2200 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.301000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:53:46.303000 audit[2322]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2322 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.303000 audit[2322]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffc2dd9fa50 a2=0 a3=7ffc2dd9fa3c items=0 ppid=2200 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.303000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:53:46.305000 audit[2324]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.305000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc29ac7730 a2=0 a3=7ffc29ac771c items=0 ppid=2200 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.305000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:46.309000 audit[2327]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.309000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc0bae3620 a2=0 a3=7ffc0bae360c items=0 ppid=2200 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.309000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:53:46.310000 audit[2328]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.310000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdb7a113c0 a2=0 a3=7ffdb7a113ac items=0 ppid=2200 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.310000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:53:46.313000 audit[2330]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.313000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe1dddefe0 a2=0 a3=7ffe1dddefcc items=0 ppid=2200 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.313000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:53:46.314000 audit[2331]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2331 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.314000 audit[2331]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc090705d0 a2=0 a3=7ffc090705bc items=0 ppid=2200 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.314000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:53:46.317000 audit[2333]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.317000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc6424f1a0 a2=0 a3=7ffc6424f18c items=0 ppid=2200 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.317000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:46.321000 audit[2336]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:53:46.321000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffdfc7f0ba0 a2=0 a3=7ffdfc7f0b8c items=0 ppid=2200 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.321000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:53:46.324000 audit[2338]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:46.324000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe64800aa0 a2=0 a3=7ffe64800a8c items=0 ppid=2200 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.324000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:46.325000 audit[2338]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:53:46.325000 audit[2338]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe64800aa0 a2=0 a3=7ffe64800a8c items=0 ppid=2200 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:46.325000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:46.631389 kubelet[1995]: E0412 18:53:46.631347 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:46.645373 kubelet[1995]: I0412 18:53:46.645300 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-2r547" podStartSLOduration=2.645236588 podStartE2EDuration="2.645236588s" podCreationTimestamp="2024-04-12 18:53:44 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:53:46.644505745 +0000 UTC m=+16.179858802" watchObservedRunningTime="2024-04-12 18:53:46.645236588 +0000 UTC m=+16.180589645" Apr 12 18:53:48.343975 env[1127]: time="2024-04-12T18:53:48.343887901Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.345915 env[1127]: time="2024-04-12T18:53:48.345859769Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.347636 env[1127]: time="2024-04-12T18:53:48.347608213Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.349227 env[1127]: time="2024-04-12T18:53:48.349188400Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:48.349806 env[1127]: time="2024-04-12T18:53:48.349775641Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:ac4b460566ae96b5d23f41e9a3b5dd3f1a6d0ed6d7f627076a05e38e74701a66\"" Apr 12 18:53:48.351668 env[1127]: time="2024-04-12T18:53:48.351630487Z" level=info msg="CreateContainer within sandbox \"a2d0ef035de950dd7e4703ee82392dff51284e3024c6dba4850436fa19d3a02c\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:53:48.365243 env[1127]: time="2024-04-12T18:53:48.365155404Z" level=info msg="CreateContainer within sandbox \"a2d0ef035de950dd7e4703ee82392dff51284e3024c6dba4850436fa19d3a02c\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"35b9e438cde4ae66538b61e2acfa8da6ed3fc7981f4c0e2ed46ee8e01c02d428\"" Apr 12 18:53:48.366493 env[1127]: time="2024-04-12T18:53:48.365735240Z" level=info msg="StartContainer for \"35b9e438cde4ae66538b61e2acfa8da6ed3fc7981f4c0e2ed46ee8e01c02d428\"" Apr 12 18:53:48.385716 systemd[1]: Started cri-containerd-35b9e438cde4ae66538b61e2acfa8da6ed3fc7981f4c0e2ed46ee8e01c02d428.scope. Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.399088 kernel: kauditd_printk_skb: 312 callbacks suppressed Apr 12 18:53:48.399210 kernel: audit: type=1400 audit(1712948028.397:1043): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409436 kernel: audit: type=1400 audit(1712948028.397:1044): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409594 kernel: audit: type=1400 audit(1712948028.397:1045): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.416910 kernel: audit: type=1400 audit(1712948028.397:1046): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.416993 kernel: audit: type=1400 audit(1712948028.397:1047): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.420620 kernel: audit: type=1400 audit(1712948028.397:1048): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.424327 kernel: audit: type=1400 audit(1712948028.397:1049): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.428163 kernel: audit: type=1400 audit(1712948028.397:1050): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.431721 kernel: audit: type=1400 audit(1712948028.397:1051): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.397000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.401000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.401000 audit: BPF prog-id=123 op=LOAD Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2133 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.436441 kernel: audit: type=1400 audit(1712948028.401:1052): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623965343338636465346165363635333862363165326163666138 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2133 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623965343338636465346165363635333862363165326163666138 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.402000 audit: BPF prog-id=124 op=LOAD Apr 12 18:53:48.402000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001e3010 items=0 ppid=2133 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.402000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623965343338636465346165363635333862363165326163666138 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.405000 audit: BPF prog-id=125 op=LOAD Apr 12 18:53:48.405000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001e3058 items=0 ppid=2133 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.405000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623965343338636465346165363635333862363165326163666138 Apr 12 18:53:48.409000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:53:48.409000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { perfmon } for pid=2346 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit[2346]: AVC avc: denied { bpf } for pid=2346 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:48.409000 audit: BPF prog-id=126 op=LOAD Apr 12 18:53:48.409000 audit[2346]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001e3468 items=0 ppid=2133 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:48.409000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335623965343338636465346165363635333862363165326163666138 Apr 12 18:53:48.442209 env[1127]: time="2024-04-12T18:53:48.442140663Z" level=info msg="StartContainer for \"35b9e438cde4ae66538b61e2acfa8da6ed3fc7981f4c0e2ed46ee8e01c02d428\" returns successfully" Apr 12 18:53:48.644034 kubelet[1995]: I0412 18:53:48.643894 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-5bdrr" podStartSLOduration=1.193850987 podStartE2EDuration="3.643845885s" podCreationTimestamp="2024-04-12 18:53:45 +0000 UTC" firstStartedPulling="2024-04-12 18:53:45.900129913 +0000 UTC m=+15.435482950" lastFinishedPulling="2024-04-12 18:53:48.350124801 +0000 UTC m=+17.885477848" observedRunningTime="2024-04-12 18:53:48.643471077 +0000 UTC m=+18.178824114" watchObservedRunningTime="2024-04-12 18:53:48.643845885 +0000 UTC m=+18.179198922" Apr 12 18:53:50.440000 audit[2380]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:50.440000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffdf1f34070 a2=0 a3=7ffdf1f3405c items=0 ppid=2200 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:50.440000 audit[2380]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2380 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:50.440000 audit[2380]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffdf1f34070 a2=0 a3=0 items=0 ppid=2200 pid=2380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.440000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:50.458000 audit[2382]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:50.458000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff1c4eb220 a2=0 a3=7fff1c4eb20c items=0 ppid=2200 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.458000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:50.459000 audit[2382]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:50.459000 audit[2382]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fff1c4eb220 a2=0 a3=0 items=0 ppid=2200 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:50.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:50.593182 kubelet[1995]: I0412 18:53:50.593135 1995 topology_manager.go:215] "Topology Admit Handler" podUID="511f4c3c-73e3-4148-94b5-1ce027ef0ea1" podNamespace="calico-system" podName="calico-typha-5b67974c69-54bf7" Apr 12 18:53:50.599619 systemd[1]: Created slice kubepods-besteffort-pod511f4c3c_73e3_4148_94b5_1ce027ef0ea1.slice. Apr 12 18:53:50.719618 kubelet[1995]: I0412 18:53:50.719428 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/511f4c3c-73e3-4148-94b5-1ce027ef0ea1-typha-certs\") pod \"calico-typha-5b67974c69-54bf7\" (UID: \"511f4c3c-73e3-4148-94b5-1ce027ef0ea1\") " pod="calico-system/calico-typha-5b67974c69-54bf7" Apr 12 18:53:50.719618 kubelet[1995]: I0412 18:53:50.719549 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v66kp\" (UniqueName: \"kubernetes.io/projected/511f4c3c-73e3-4148-94b5-1ce027ef0ea1-kube-api-access-v66kp\") pod \"calico-typha-5b67974c69-54bf7\" (UID: \"511f4c3c-73e3-4148-94b5-1ce027ef0ea1\") " pod="calico-system/calico-typha-5b67974c69-54bf7" Apr 12 18:53:50.719618 kubelet[1995]: I0412 18:53:50.719604 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/511f4c3c-73e3-4148-94b5-1ce027ef0ea1-tigera-ca-bundle\") pod \"calico-typha-5b67974c69-54bf7\" (UID: \"511f4c3c-73e3-4148-94b5-1ce027ef0ea1\") " pod="calico-system/calico-typha-5b67974c69-54bf7" Apr 12 18:53:50.747012 kubelet[1995]: I0412 18:53:50.746959 1995 topology_manager.go:215] "Topology Admit Handler" podUID="503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f" podNamespace="calico-system" podName="calico-node-7rbkn" Apr 12 18:53:50.752146 systemd[1]: Created slice kubepods-besteffort-pod503122d2_b5e0_41f0_9f8b_d8d7ab6a2e2f.slice. Apr 12 18:53:50.819950 kubelet[1995]: I0412 18:53:50.819872 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-var-run-calico\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.819950 kubelet[1995]: I0412 18:53:50.819935 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-lib-modules\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.819950 kubelet[1995]: I0412 18:53:50.819964 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-cni-log-dir\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820247 kubelet[1995]: I0412 18:53:50.820093 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-tigera-ca-bundle\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820247 kubelet[1995]: I0412 18:53:50.820201 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-xtables-lock\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820247 kubelet[1995]: I0412 18:53:50.820242 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-cni-bin-dir\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820340 kubelet[1995]: I0412 18:53:50.820310 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-cni-net-dir\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820375 kubelet[1995]: I0412 18:53:50.820343 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-policysync\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820375 kubelet[1995]: I0412 18:53:50.820367 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-var-lib-calico\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820611 kubelet[1995]: I0412 18:53:50.820565 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tlg5w\" (UniqueName: \"kubernetes.io/projected/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-kube-api-access-tlg5w\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820671 kubelet[1995]: I0412 18:53:50.820649 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-node-certs\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.820703 kubelet[1995]: I0412 18:53:50.820699 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f-flexvol-driver-host\") pod \"calico-node-7rbkn\" (UID: \"503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f\") " pod="calico-system/calico-node-7rbkn" Apr 12 18:53:50.876586 kubelet[1995]: I0412 18:53:50.876539 1995 topology_manager.go:215] "Topology Admit Handler" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" podNamespace="calico-system" podName="csi-node-driver-p7hwv" Apr 12 18:53:50.876973 kubelet[1995]: E0412 18:53:50.876953 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:53:50.903385 kubelet[1995]: E0412 18:53:50.903340 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:50.904129 env[1127]: time="2024-04-12T18:53:50.904074297Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b67974c69-54bf7,Uid:511f4c3c-73e3-4148-94b5-1ce027ef0ea1,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:50.921651 kubelet[1995]: I0412 18:53:50.921618 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d-registration-dir\") pod \"csi-node-driver-p7hwv\" (UID: \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\") " pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:53:50.921890 kubelet[1995]: I0412 18:53:50.921875 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d-kubelet-dir\") pod \"csi-node-driver-p7hwv\" (UID: \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\") " pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:53:50.922044 kubelet[1995]: I0412 18:53:50.922028 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d-varrun\") pod \"csi-node-driver-p7hwv\" (UID: \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\") " pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:53:50.922181 kubelet[1995]: I0412 18:53:50.922162 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d-socket-dir\") pod \"csi-node-driver-p7hwv\" (UID: \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\") " pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:53:50.922265 kubelet[1995]: I0412 18:53:50.922220 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2ccmt\" (UniqueName: \"kubernetes.io/projected/55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d-kube-api-access-2ccmt\") pod \"csi-node-driver-p7hwv\" (UID: \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\") " pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:53:50.925177 kubelet[1995]: E0412 18:53:50.925123 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:50.925177 kubelet[1995]: W0412 18:53:50.925160 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:50.925177 kubelet[1995]: E0412 18:53:50.925187 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.023725 kubelet[1995]: E0412 18:53:51.023681 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.023725 kubelet[1995]: W0412 18:53:51.023707 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.023725 kubelet[1995]: E0412 18:53:51.023736 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.024045 kubelet[1995]: E0412 18:53:51.024009 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.024045 kubelet[1995]: W0412 18:53:51.024039 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.024124 kubelet[1995]: E0412 18:53:51.024076 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.024373 kubelet[1995]: E0412 18:53:51.024355 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.024373 kubelet[1995]: W0412 18:53:51.024369 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.024464 kubelet[1995]: E0412 18:53:51.024387 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.024568 kubelet[1995]: E0412 18:53:51.024556 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.024568 kubelet[1995]: W0412 18:53:51.024565 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.024625 kubelet[1995]: E0412 18:53:51.024578 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.024721 kubelet[1995]: E0412 18:53:51.024699 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.024721 kubelet[1995]: W0412 18:53:51.024707 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.024721 kubelet[1995]: E0412 18:53:51.024720 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025000 kubelet[1995]: E0412 18:53:51.024896 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025000 kubelet[1995]: W0412 18:53:51.024903 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025000 kubelet[1995]: E0412 18:53:51.024919 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025231 kubelet[1995]: E0412 18:53:51.025216 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025231 kubelet[1995]: W0412 18:53:51.025225 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025332 kubelet[1995]: E0412 18:53:51.025239 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025454 kubelet[1995]: E0412 18:53:51.025440 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025454 kubelet[1995]: W0412 18:53:51.025448 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025567 kubelet[1995]: E0412 18:53:51.025492 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025614 kubelet[1995]: E0412 18:53:51.025586 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025614 kubelet[1995]: W0412 18:53:51.025594 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025683 kubelet[1995]: E0412 18:53:51.025626 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025764 kubelet[1995]: E0412 18:53:51.025745 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025764 kubelet[1995]: W0412 18:53:51.025755 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025868 kubelet[1995]: E0412 18:53:51.025770 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.025932 kubelet[1995]: E0412 18:53:51.025914 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.025932 kubelet[1995]: W0412 18:53:51.025923 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.025932 kubelet[1995]: E0412 18:53:51.025937 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.026130 kubelet[1995]: E0412 18:53:51.026114 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.026130 kubelet[1995]: W0412 18:53:51.026126 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.026226 kubelet[1995]: E0412 18:53:51.026151 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.026360 kubelet[1995]: E0412 18:53:51.026342 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.026360 kubelet[1995]: W0412 18:53:51.026353 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.026475 kubelet[1995]: E0412 18:53:51.026369 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.026579 kubelet[1995]: E0412 18:53:51.026565 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.026579 kubelet[1995]: W0412 18:53:51.026575 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.026688 kubelet[1995]: E0412 18:53:51.026589 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.026858 kubelet[1995]: E0412 18:53:51.026751 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.026858 kubelet[1995]: W0412 18:53:51.026763 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.026858 kubelet[1995]: E0412 18:53:51.026785 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027006 kubelet[1995]: E0412 18:53:51.026993 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027006 kubelet[1995]: W0412 18:53:51.027001 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027121 kubelet[1995]: E0412 18:53:51.027016 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027177 kubelet[1995]: E0412 18:53:51.027171 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027177 kubelet[1995]: W0412 18:53:51.027177 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027249 kubelet[1995]: E0412 18:53:51.027191 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027383 kubelet[1995]: E0412 18:53:51.027371 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027383 kubelet[1995]: W0412 18:53:51.027379 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027504 kubelet[1995]: E0412 18:53:51.027428 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027571 kubelet[1995]: E0412 18:53:51.027560 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027571 kubelet[1995]: W0412 18:53:51.027567 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027644 kubelet[1995]: E0412 18:53:51.027579 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027758 kubelet[1995]: E0412 18:53:51.027746 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027758 kubelet[1995]: W0412 18:53:51.027753 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027852 kubelet[1995]: E0412 18:53:51.027765 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.027904 kubelet[1995]: E0412 18:53:51.027893 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.027904 kubelet[1995]: W0412 18:53:51.027901 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.027979 kubelet[1995]: E0412 18:53:51.027915 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.028104 kubelet[1995]: E0412 18:53:51.028090 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.028104 kubelet[1995]: W0412 18:53:51.028104 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.028196 kubelet[1995]: E0412 18:53:51.028146 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.028307 kubelet[1995]: E0412 18:53:51.028294 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.028333 kubelet[1995]: W0412 18:53:51.028307 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.028333 kubelet[1995]: E0412 18:53:51.028322 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.028516 kubelet[1995]: E0412 18:53:51.028501 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.028516 kubelet[1995]: W0412 18:53:51.028513 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.028590 kubelet[1995]: E0412 18:53:51.028527 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.028734 kubelet[1995]: E0412 18:53:51.028721 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.028757 kubelet[1995]: W0412 18:53:51.028733 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.028757 kubelet[1995]: E0412 18:53:51.028747 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.029235 kubelet[1995]: E0412 18:53:51.029216 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.029235 kubelet[1995]: W0412 18:53:51.029230 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.029285 kubelet[1995]: E0412 18:53:51.029245 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.048448 kubelet[1995]: E0412 18:53:51.048412 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.048448 kubelet[1995]: W0412 18:53:51.048445 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.048634 kubelet[1995]: E0412 18:53:51.048477 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.054765 kubelet[1995]: E0412 18:53:51.054726 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:51.055249 env[1127]: time="2024-04-12T18:53:51.055199945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7rbkn,Uid:503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f,Namespace:calico-system,Attempt:0,}" Apr 12 18:53:51.129981 kubelet[1995]: E0412 18:53:51.129935 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.129981 kubelet[1995]: W0412 18:53:51.129967 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.130195 kubelet[1995]: E0412 18:53:51.129995 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.139157 kubelet[1995]: E0412 18:53:51.139094 1995 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:53:51.139157 kubelet[1995]: W0412 18:53:51.139144 1995 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:53:51.139323 kubelet[1995]: E0412 18:53:51.139171 1995 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:53:51.149201 env[1127]: time="2024-04-12T18:53:51.149115686Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:51.149356 env[1127]: time="2024-04-12T18:53:51.149177283Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:51.149356 env[1127]: time="2024-04-12T18:53:51.149190928Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:51.149546 env[1127]: time="2024-04-12T18:53:51.149503379Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/97bd070c2fded8a1c47b62aeaa428c9ca0f0c4fc65d0c184ec11054e287839a2 pid=2431 runtime=io.containerd.runc.v2 Apr 12 18:53:51.149811 env[1127]: time="2024-04-12T18:53:51.149768208Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:53:51.149888 env[1127]: time="2024-04-12T18:53:51.149804427Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:53:51.149888 env[1127]: time="2024-04-12T18:53:51.149814175Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:53:51.149983 env[1127]: time="2024-04-12T18:53:51.149903805Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176 pid=2436 runtime=io.containerd.runc.v2 Apr 12 18:53:51.164190 systemd[1]: Started cri-containerd-97bd070c2fded8a1c47b62aeaa428c9ca0f0c4fc65d0c184ec11054e287839a2.scope. Apr 12 18:53:51.176691 systemd[1]: Started cri-containerd-e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176.scope. Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.183000 audit: BPF prog-id=127 op=LOAD Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2431 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626430373063326664656438613163343762363261656161343238 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2431 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626430373063326664656438613163343762363261656161343238 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit: BPF prog-id=128 op=LOAD Apr 12 18:53:51.184000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0002a2610 items=0 ppid=2431 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626430373063326664656438613163343762363261656161343238 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit: BPF prog-id=129 op=LOAD Apr 12 18:53:51.184000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0002a2658 items=0 ppid=2431 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626430373063326664656438613163343762363261656161343238 Apr 12 18:53:51.184000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:53:51.184000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.184000 audit: BPF prog-id=130 op=LOAD Apr 12 18:53:51.184000 audit[2452]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0002a2a68 items=0 ppid=2431 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3937626430373063326664656438613163343762363261656161343238 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.188000 audit: BPF prog-id=131 op=LOAD Apr 12 18:53:51.189000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.189000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2436 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626334363533663034313336623764393933303464323235386165 Apr 12 18:53:51.189000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.189000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2436 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.189000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626334363533663034313336623764393933303464323235386165 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.190000 audit: BPF prog-id=132 op=LOAD Apr 12 18:53:51.190000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000025170 items=0 ppid=2436 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626334363533663034313336623764393933303464323235386165 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit: BPF prog-id=133 op=LOAD Apr 12 18:53:51.191000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000251b8 items=0 ppid=2436 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626334363533663034313336623764393933303464323235386165 Apr 12 18:53:51.191000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:53:51.191000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { perfmon } for pid=2453 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit[2453]: AVC avc: denied { bpf } for pid=2453 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:51.191000 audit: BPF prog-id=134 op=LOAD Apr 12 18:53:51.191000 audit[2453]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0000255c8 items=0 ppid=2436 pid=2453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538626334363533663034313336623764393933303464323235386165 Apr 12 18:53:51.211995 env[1127]: time="2024-04-12T18:53:51.211927681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-7rbkn,Uid:503122d2-b5e0-41f0-9f8b-d8d7ab6a2e2f,Namespace:calico-system,Attempt:0,} returns sandbox id \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\"" Apr 12 18:53:51.213438 kubelet[1995]: E0412 18:53:51.212959 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:51.214783 env[1127]: time="2024-04-12T18:53:51.214704975Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:53:51.232106 env[1127]: time="2024-04-12T18:53:51.232050879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5b67974c69-54bf7,Uid:511f4c3c-73e3-4148-94b5-1ce027ef0ea1,Namespace:calico-system,Attempt:0,} returns sandbox id \"97bd070c2fded8a1c47b62aeaa428c9ca0f0c4fc65d0c184ec11054e287839a2\"" Apr 12 18:53:51.234045 kubelet[1995]: E0412 18:53:51.234020 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:51.468000 audit[2508]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:51.468000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffc6797d7c0 a2=0 a3=7ffc6797d7ac items=0 ppid=2200 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.468000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:51.469000 audit[2508]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2508 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:53:51.469000 audit[2508]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc6797d7c0 a2=0 a3=0 items=0 ppid=2200 pid=2508 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:51.469000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:53:52.572352 kubelet[1995]: E0412 18:53:52.572296 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:53:53.599056 env[1127]: time="2024-04-12T18:53:53.598977940Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:53.602998 env[1127]: time="2024-04-12T18:53:53.602512999Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:53.607014 env[1127]: time="2024-04-12T18:53:53.606943306Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:53.615211 env[1127]: time="2024-04-12T18:53:53.615070356Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:53.615794 env[1127]: time="2024-04-12T18:53:53.615719430Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:ab5b4f1ca28931c15f9831ae3bfa04c21600da454ce8bbe57872b747c86e221b\"" Apr 12 18:53:53.617573 env[1127]: time="2024-04-12T18:53:53.617523303Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:53:53.627354 env[1127]: time="2024-04-12T18:53:53.622316123Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:53:53.665599 env[1127]: time="2024-04-12T18:53:53.665498418Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b\"" Apr 12 18:53:53.666559 env[1127]: time="2024-04-12T18:53:53.666511800Z" level=info msg="StartContainer for \"e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b\"" Apr 12 18:53:53.696770 systemd[1]: Started cri-containerd-e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b.scope. Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.718121 kernel: kauditd_printk_skb: 179 callbacks suppressed Apr 12 18:53:53.718371 kernel: audit: type=1400 audit(1712948033.716:1103): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f91be349778 items=0 ppid=2436 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:53.727595 kernel: audit: type=1300 audit(1712948033.716:1103): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f91be349778 items=0 ppid=2436 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:53.727774 kernel: audit: type=1327 audit(1712948033.716:1103): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386166623030393131323762656534386334623438336434346264 Apr 12 18:53:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386166623030393131323762656534386334623438336434346264 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.737332 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.737484 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.745534 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.745604 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.750622 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.764823 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.764974 kernel: audit: type=1400 audit(1712948033.716:1104): avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.716000 audit: BPF prog-id=135 op=LOAD Apr 12 18:53:53.716000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003b2388 items=0 ppid=2436 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:53.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386166623030393131323762656534386334623438336434346264 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.721000 audit: BPF prog-id=136 op=LOAD Apr 12 18:53:53.721000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003b23d8 items=0 ppid=2436 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:53.721000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386166623030393131323762656534386334623438336434346264 Apr 12 18:53:53.733000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:53:53.733000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { perfmon } for pid=2516 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit[2516]: AVC avc: denied { bpf } for pid=2516 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:53.733000 audit: BPF prog-id=137 op=LOAD Apr 12 18:53:53.733000 audit[2516]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003b2468 items=0 ppid=2436 pid=2516 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:53.733000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6538386166623030393131323762656534386334623438336434346264 Apr 12 18:53:53.786869 systemd[1]: cri-containerd-e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b.scope: Deactivated successfully. Apr 12 18:53:53.790000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:53:53.796856 env[1127]: time="2024-04-12T18:53:53.796798932Z" level=info msg="StartContainer for \"e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b\" returns successfully" Apr 12 18:53:53.818639 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b-rootfs.mount: Deactivated successfully. Apr 12 18:53:53.841643 env[1127]: time="2024-04-12T18:53:53.841570335Z" level=info msg="shim disconnected" id=e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b Apr 12 18:53:53.841948 env[1127]: time="2024-04-12T18:53:53.841900257Z" level=warning msg="cleaning up after shim disconnected" id=e88afb0091127bee48c4b483d44bdde930023dfe0bd4f04027df3a72fc3de80b namespace=k8s.io Apr 12 18:53:53.841948 env[1127]: time="2024-04-12T18:53:53.841922188Z" level=info msg="cleaning up dead shim" Apr 12 18:53:53.850742 env[1127]: time="2024-04-12T18:53:53.850597272Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:53:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2556 runtime=io.containerd.runc.v2\n" Apr 12 18:53:54.572514 kubelet[1995]: E0412 18:53:54.572422 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:53:54.659946 kubelet[1995]: E0412 18:53:54.659901 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:54.889788 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1185818490.mount: Deactivated successfully. Apr 12 18:53:56.572682 kubelet[1995]: E0412 18:53:56.572615 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:53:57.252008 env[1127]: time="2024-04-12T18:53:57.251953032Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.254135 env[1127]: time="2024-04-12T18:53:57.253944414Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.256114 env[1127]: time="2024-04-12T18:53:57.256071411Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.258173 env[1127]: time="2024-04-12T18:53:57.258131221Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:53:57.258871 env[1127]: time="2024-04-12T18:53:57.258824598Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:b542f80277bc5a77197ee77cfea20140a71de63ad22970bd48462555506b5bb9\"" Apr 12 18:53:57.259592 env[1127]: time="2024-04-12T18:53:57.259528153Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:53:57.269075 env[1127]: time="2024-04-12T18:53:57.269016909Z" level=info msg="CreateContainer within sandbox \"97bd070c2fded8a1c47b62aeaa428c9ca0f0c4fc65d0c184ec11054e287839a2\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:53:57.281111 env[1127]: time="2024-04-12T18:53:57.281060468Z" level=info msg="CreateContainer within sandbox \"97bd070c2fded8a1c47b62aeaa428c9ca0f0c4fc65d0c184ec11054e287839a2\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"b43f3f0f6cc3532a1d3fc13ae4deb45dc1f448893136475f3736e69cb2934e88\"" Apr 12 18:53:57.281629 env[1127]: time="2024-04-12T18:53:57.281597619Z" level=info msg="StartContainer for \"b43f3f0f6cc3532a1d3fc13ae4deb45dc1f448893136475f3736e69cb2934e88\"" Apr 12 18:53:57.295672 systemd[1]: Started cri-containerd-b43f3f0f6cc3532a1d3fc13ae4deb45dc1f448893136475f3736e69cb2934e88.scope. Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit: BPF prog-id=138 op=LOAD Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2431 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336633663066366363333533326131643366633133616534646562 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2431 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336633663066366363333533326131643366633133616534646562 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.307000 audit: BPF prog-id=139 op=LOAD Apr 12 18:53:57.307000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002359b0 items=0 ppid=2431 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.307000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336633663066366363333533326131643366633133616534646562 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit: BPF prog-id=140 op=LOAD Apr 12 18:53:57.308000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002359f8 items=0 ppid=2431 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336633663066366363333533326131643366633133616534646562 Apr 12 18:53:57.308000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:53:57.308000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { perfmon } for pid=2584 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit[2584]: AVC avc: denied { bpf } for pid=2584 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:53:57.308000 audit: BPF prog-id=141 op=LOAD Apr 12 18:53:57.308000 audit[2584]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000235e08 items=0 ppid=2431 pid=2584 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:53:57.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234336633663066366363333533326131643366633133616534646562 Apr 12 18:53:57.334896 env[1127]: time="2024-04-12T18:53:57.334831266Z" level=info msg="StartContainer for \"b43f3f0f6cc3532a1d3fc13ae4deb45dc1f448893136475f3736e69cb2934e88\" returns successfully" Apr 12 18:53:57.665780 kubelet[1995]: E0412 18:53:57.665752 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:53:57.674067 kubelet[1995]: I0412 18:53:57.672891 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5b67974c69-54bf7" podStartSLOduration=1.652180365 podStartE2EDuration="7.67285537s" podCreationTimestamp="2024-04-12 18:53:50 +0000 UTC" firstStartedPulling="2024-04-12 18:53:51.238512988 +0000 UTC m=+20.773866025" lastFinishedPulling="2024-04-12 18:53:57.259187992 +0000 UTC m=+26.794541030" observedRunningTime="2024-04-12 18:53:57.672292751 +0000 UTC m=+27.207645788" watchObservedRunningTime="2024-04-12 18:53:57.67285537 +0000 UTC m=+27.208208407" Apr 12 18:53:58.497997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1608473741.mount: Deactivated successfully. Apr 12 18:53:58.572743 kubelet[1995]: E0412 18:53:58.572685 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:53:58.667573 kubelet[1995]: I0412 18:53:58.667521 1995 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:53:58.668223 kubelet[1995]: E0412 18:53:58.668103 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:00.572499 kubelet[1995]: E0412 18:54:00.572443 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:54:02.572885 kubelet[1995]: E0412 18:54:02.572806 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:54:02.716574 env[1127]: time="2024-04-12T18:54:02.716487658Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:02.719024 env[1127]: time="2024-04-12T18:54:02.718971522Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:02.721163 env[1127]: time="2024-04-12T18:54:02.721114555Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:02.723303 env[1127]: time="2024-04-12T18:54:02.723252246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:02.724238 env[1127]: time="2024-04-12T18:54:02.724189651Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:6527a355814010ee83110dd5165fae88f7d9de75775b78565824d51f8da54897\"" Apr 12 18:54:02.726142 env[1127]: time="2024-04-12T18:54:02.726102890Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:54:02.744873 env[1127]: time="2024-04-12T18:54:02.744784492Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a\"" Apr 12 18:54:02.745553 env[1127]: time="2024-04-12T18:54:02.745507694Z" level=info msg="StartContainer for \"c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a\"" Apr 12 18:54:02.767078 systemd[1]: Started cri-containerd-c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a.scope. Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.787823 kernel: kauditd_printk_skb: 91 callbacks suppressed Apr 12 18:54:02.787952 kernel: audit: type=1400 audit(1712948042.784:1128): avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4235bad098 items=0 ppid=2436 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:02.794628 kernel: audit: type=1300 audit(1712948042.784:1128): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f4235bad098 items=0 ppid=2436 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:02.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339316136383635333763333032333466653730386433663461313964 Apr 12 18:54:02.798757 kernel: audit: type=1327 audit(1712948042.784:1128): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339316136383635333763333032333466653730386433663461313964 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.801747 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.804705 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.807649 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.810771 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.814069 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.817135 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.817291 kernel: audit: type=1400 audit(1712948042.784:1129): avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.784000 audit: BPF prog-id=142 op=LOAD Apr 12 18:54:02.784000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0003ba6b8 items=0 ppid=2436 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:02.784000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339316136383635333763333032333466653730386433663461313964 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.789000 audit: BPF prog-id=143 op=LOAD Apr 12 18:54:02.789000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0003ba708 items=0 ppid=2436 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:02.789000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339316136383635333763333032333466653730386433663461313964 Apr 12 18:54:02.794000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:54:02.794000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { perfmon } for pid=2623 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit[2623]: AVC avc: denied { bpf } for pid=2623 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:02.794000 audit: BPF prog-id=144 op=LOAD Apr 12 18:54:02.794000 audit[2623]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0003ba798 items=0 ppid=2436 pid=2623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:02.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6339316136383635333763333032333466653730386433663461313964 Apr 12 18:54:02.830260 env[1127]: time="2024-04-12T18:54:02.829227404Z" level=info msg="StartContainer for \"c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a\" returns successfully" Apr 12 18:54:03.433109 systemd[1]: Started sshd@7-10.0.0.104:22-10.0.0.1:48090.service. Apr 12 18:54:03.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.104:22-10.0.0.1:48090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:03.476000 audit[2651]: USER_ACCT pid=2651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.477010 sshd[2651]: Accepted publickey for core from 10.0.0.1 port 48090 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:03.477000 audit[2651]: CRED_ACQ pid=2651 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.477000 audit[2651]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff31716ee0 a2=3 a3=0 items=0 ppid=1 pid=2651 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:03.477000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:03.478597 sshd[2651]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:03.483167 systemd-logind[1110]: New session 8 of user core. Apr 12 18:54:03.483994 systemd[1]: Started session-8.scope. Apr 12 18:54:03.488000 audit[2651]: USER_START pid=2651 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.490000 audit[2655]: CRED_ACQ pid=2655 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.517387 systemd[1]: cri-containerd-c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a.scope: Deactivated successfully. Apr 12 18:54:03.523000 audit: BPF prog-id=144 op=UNLOAD Apr 12 18:54:03.554507 kubelet[1995]: I0412 18:54:03.554476 1995 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:54:03.571324 kubelet[1995]: I0412 18:54:03.571256 1995 topology_manager.go:215] "Topology Admit Handler" podUID="0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a" podNamespace="kube-system" podName="coredns-76f75df574-q4878" Apr 12 18:54:03.575901 kubelet[1995]: I0412 18:54:03.575865 1995 topology_manager.go:215] "Topology Admit Handler" podUID="c7932afe-95dd-418f-8c2e-8f1e3c70ef87" podNamespace="kube-system" podName="coredns-76f75df574-2q6l5" Apr 12 18:54:03.576337 systemd[1]: Created slice kubepods-burstable-pod0f89e2ac_1034_4aa1_b8b3_ac98e875ca1a.slice. Apr 12 18:54:03.577812 kubelet[1995]: I0412 18:54:03.576932 1995 topology_manager.go:215] "Topology Admit Handler" podUID="9a74ac03-eadb-4cc1-a495-7161a34169fc" podNamespace="calico-system" podName="calico-kube-controllers-85cf6c9888-jf9tj" Apr 12 18:54:03.585435 systemd[1]: Created slice kubepods-burstable-podc7932afe_95dd_418f_8c2e_8f1e3c70ef87.slice. Apr 12 18:54:03.591015 systemd[1]: Created slice kubepods-besteffort-pod9a74ac03_eadb_4cc1_a495_7161a34169fc.slice. Apr 12 18:54:03.620151 kubelet[1995]: I0412 18:54:03.620109 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jgxr5\" (UniqueName: \"kubernetes.io/projected/c7932afe-95dd-418f-8c2e-8f1e3c70ef87-kube-api-access-jgxr5\") pod \"coredns-76f75df574-2q6l5\" (UID: \"c7932afe-95dd-418f-8c2e-8f1e3c70ef87\") " pod="kube-system/coredns-76f75df574-2q6l5" Apr 12 18:54:03.620344 kubelet[1995]: I0412 18:54:03.620170 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a-config-volume\") pod \"coredns-76f75df574-q4878\" (UID: \"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a\") " pod="kube-system/coredns-76f75df574-q4878" Apr 12 18:54:03.620344 kubelet[1995]: I0412 18:54:03.620248 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/9a74ac03-eadb-4cc1-a495-7161a34169fc-tigera-ca-bundle\") pod \"calico-kube-controllers-85cf6c9888-jf9tj\" (UID: \"9a74ac03-eadb-4cc1-a495-7161a34169fc\") " pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" Apr 12 18:54:03.620344 kubelet[1995]: I0412 18:54:03.620280 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rrrz7\" (UniqueName: \"kubernetes.io/projected/9a74ac03-eadb-4cc1-a495-7161a34169fc-kube-api-access-rrrz7\") pod \"calico-kube-controllers-85cf6c9888-jf9tj\" (UID: \"9a74ac03-eadb-4cc1-a495-7161a34169fc\") " pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" Apr 12 18:54:03.620344 kubelet[1995]: I0412 18:54:03.620306 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c7932afe-95dd-418f-8c2e-8f1e3c70ef87-config-volume\") pod \"coredns-76f75df574-2q6l5\" (UID: \"c7932afe-95dd-418f-8c2e-8f1e3c70ef87\") " pod="kube-system/coredns-76f75df574-2q6l5" Apr 12 18:54:03.620344 kubelet[1995]: I0412 18:54:03.620325 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-gd78f\" (UniqueName: \"kubernetes.io/projected/0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a-kube-api-access-gd78f\") pod \"coredns-76f75df574-q4878\" (UID: \"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a\") " pod="kube-system/coredns-76f75df574-q4878" Apr 12 18:54:03.678528 kubelet[1995]: E0412 18:54:03.678494 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:03.735736 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a-rootfs.mount: Deactivated successfully. Apr 12 18:54:03.979116 sshd[2651]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:03.981000 audit[2651]: USER_END pid=2651 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.981000 audit[2651]: CRED_DISP pid=2651 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:03.983383 systemd[1]: sshd@7-10.0.0.104:22-10.0.0.1:48090.service: Deactivated successfully. Apr 12 18:54:03.983000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.104:22-10.0.0.1:48090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:03.984488 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:54:03.985175 systemd-logind[1110]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:54:03.987564 systemd-logind[1110]: Removed session 8. Apr 12 18:54:04.092032 env[1127]: time="2024-04-12T18:54:04.091977884Z" level=info msg="shim disconnected" id=c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a Apr 12 18:54:04.092032 env[1127]: time="2024-04-12T18:54:04.092031585Z" level=warning msg="cleaning up after shim disconnected" id=c91a686537c30234fe708d3f4a19d75bb7500b802497072f9dbbb1ed2140828a namespace=k8s.io Apr 12 18:54:04.092032 env[1127]: time="2024-04-12T18:54:04.092040802Z" level=info msg="cleaning up dead shim" Apr 12 18:54:04.099237 env[1127]: time="2024-04-12T18:54:04.099183598Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:54:04Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2682 runtime=io.containerd.runc.v2\n" Apr 12 18:54:04.179627 kubelet[1995]: E0412 18:54:04.179578 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:04.180162 env[1127]: time="2024-04-12T18:54:04.180116967Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q4878,Uid:0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:04.190653 kubelet[1995]: E0412 18:54:04.190620 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:04.191271 env[1127]: time="2024-04-12T18:54:04.191235149Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2q6l5,Uid:c7932afe-95dd-418f-8c2e-8f1e3c70ef87,Namespace:kube-system,Attempt:0,}" Apr 12 18:54:04.196230 env[1127]: time="2024-04-12T18:54:04.196169601Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85cf6c9888-jf9tj,Uid:9a74ac03-eadb-4cc1-a495-7161a34169fc,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:04.251711 env[1127]: time="2024-04-12T18:54:04.251585283Z" level=error msg="Failed to destroy network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.252233 env[1127]: time="2024-04-12T18:54:04.252195351Z" level=error msg="encountered an error cleaning up failed sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.252233 env[1127]: time="2024-04-12T18:54:04.252245646Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q4878,Uid:0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.252529 kubelet[1995]: E0412 18:54:04.252505 1995 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.252615 kubelet[1995]: E0412 18:54:04.252566 1995 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q4878" Apr 12 18:54:04.252615 kubelet[1995]: E0412 18:54:04.252588 1995 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-q4878" Apr 12 18:54:04.252670 kubelet[1995]: E0412 18:54:04.252635 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-q4878_kube-system(0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-q4878_kube-system(0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q4878" podUID="0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a" Apr 12 18:54:04.260061 env[1127]: time="2024-04-12T18:54:04.259996194Z" level=error msg="Failed to destroy network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.260362 env[1127]: time="2024-04-12T18:54:04.260328379Z" level=error msg="encountered an error cleaning up failed sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.260436 env[1127]: time="2024-04-12T18:54:04.260382660Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2q6l5,Uid:c7932afe-95dd-418f-8c2e-8f1e3c70ef87,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.260645 kubelet[1995]: E0412 18:54:04.260618 1995 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.260645 kubelet[1995]: E0412 18:54:04.260652 1995 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2q6l5" Apr 12 18:54:04.260830 kubelet[1995]: E0412 18:54:04.260671 1995 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-2q6l5" Apr 12 18:54:04.260830 kubelet[1995]: E0412 18:54:04.260730 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-2q6l5_kube-system(c7932afe-95dd-418f-8c2e-8f1e3c70ef87)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-2q6l5_kube-system(c7932afe-95dd-418f-8c2e-8f1e3c70ef87)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2q6l5" podUID="c7932afe-95dd-418f-8c2e-8f1e3c70ef87" Apr 12 18:54:04.262226 env[1127]: time="2024-04-12T18:54:04.262195541Z" level=error msg="Failed to destroy network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.262482 env[1127]: time="2024-04-12T18:54:04.262457032Z" level=error msg="encountered an error cleaning up failed sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.262630 env[1127]: time="2024-04-12T18:54:04.262492569Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85cf6c9888-jf9tj,Uid:9a74ac03-eadb-4cc1-a495-7161a34169fc,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.262692 kubelet[1995]: E0412 18:54:04.262663 1995 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.262724 kubelet[1995]: E0412 18:54:04.262719 1995 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" Apr 12 18:54:04.262750 kubelet[1995]: E0412 18:54:04.262744 1995 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" Apr 12 18:54:04.262816 kubelet[1995]: E0412 18:54:04.262806 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-85cf6c9888-jf9tj_calico-system(9a74ac03-eadb-4cc1-a495-7161a34169fc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-85cf6c9888-jf9tj_calico-system(9a74ac03-eadb-4cc1-a495-7161a34169fc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" podUID="9a74ac03-eadb-4cc1-a495-7161a34169fc" Apr 12 18:54:04.580129 systemd[1]: Created slice kubepods-besteffort-pod55f4d7e2_2a0e_4db6_bdb8_e16c25ba0d5d.slice. Apr 12 18:54:04.582073 env[1127]: time="2024-04-12T18:54:04.582023773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p7hwv,Uid:55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d,Namespace:calico-system,Attempt:0,}" Apr 12 18:54:04.631446 env[1127]: time="2024-04-12T18:54:04.631375390Z" level=error msg="Failed to destroy network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.631779 env[1127]: time="2024-04-12T18:54:04.631740397Z" level=error msg="encountered an error cleaning up failed sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.631975 env[1127]: time="2024-04-12T18:54:04.631789920Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p7hwv,Uid:55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.632130 kubelet[1995]: E0412 18:54:04.632098 1995 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.632410 kubelet[1995]: E0412 18:54:04.632185 1995 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:54:04.632410 kubelet[1995]: E0412 18:54:04.632218 1995 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-p7hwv" Apr 12 18:54:04.632410 kubelet[1995]: E0412 18:54:04.632300 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-p7hwv_calico-system(55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-p7hwv_calico-system(55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:54:04.682588 kubelet[1995]: E0412 18:54:04.682556 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:04.684018 env[1127]: time="2024-04-12T18:54:04.683790730Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:54:04.684407 kubelet[1995]: I0412 18:54:04.684358 1995 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:04.684985 env[1127]: time="2024-04-12T18:54:04.684935483Z" level=info msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" Apr 12 18:54:04.686772 kubelet[1995]: I0412 18:54:04.686742 1995 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:04.687189 env[1127]: time="2024-04-12T18:54:04.687155889Z" level=info msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" Apr 12 18:54:04.688836 kubelet[1995]: I0412 18:54:04.688815 1995 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:04.689307 env[1127]: time="2024-04-12T18:54:04.689271959Z" level=info msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" Apr 12 18:54:04.690370 kubelet[1995]: I0412 18:54:04.690102 1995 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:04.690618 env[1127]: time="2024-04-12T18:54:04.690588265Z" level=info msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" Apr 12 18:54:04.737556 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f-shm.mount: Deactivated successfully. Apr 12 18:54:04.740603 env[1127]: time="2024-04-12T18:54:04.740551142Z" level=error msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" failed" error="failed to destroy network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.741367 kubelet[1995]: E0412 18:54:04.741098 1995 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:04.741367 kubelet[1995]: E0412 18:54:04.741211 1995 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8"} Apr 12 18:54:04.741367 kubelet[1995]: E0412 18:54:04.741278 1995 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9a74ac03-eadb-4cc1-a495-7161a34169fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:04.741367 kubelet[1995]: E0412 18:54:04.741335 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9a74ac03-eadb-4cc1-a495-7161a34169fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" podUID="9a74ac03-eadb-4cc1-a495-7161a34169fc" Apr 12 18:54:04.758751 env[1127]: time="2024-04-12T18:54:04.758691062Z" level=error msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" failed" error="failed to destroy network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.758999 kubelet[1995]: E0412 18:54:04.758955 1995 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:04.759094 kubelet[1995]: E0412 18:54:04.759005 1995 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15"} Apr 12 18:54:04.759094 kubelet[1995]: E0412 18:54:04.759046 1995 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c7932afe-95dd-418f-8c2e-8f1e3c70ef87\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:04.759094 kubelet[1995]: E0412 18:54:04.759080 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c7932afe-95dd-418f-8c2e-8f1e3c70ef87\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-2q6l5" podUID="c7932afe-95dd-418f-8c2e-8f1e3c70ef87" Apr 12 18:54:04.760168 env[1127]: time="2024-04-12T18:54:04.760090393Z" level=error msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" failed" error="failed to destroy network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.760341 kubelet[1995]: E0412 18:54:04.760320 1995 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:04.760341 kubelet[1995]: E0412 18:54:04.760344 1995 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f"} Apr 12 18:54:04.760475 kubelet[1995]: E0412 18:54:04.760376 1995 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:04.760475 kubelet[1995]: E0412 18:54:04.760408 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-q4878" podUID="0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a" Apr 12 18:54:04.767491 env[1127]: time="2024-04-12T18:54:04.767428886Z" level=error msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" failed" error="failed to destroy network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:54:04.767628 kubelet[1995]: E0412 18:54:04.767609 1995 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:04.767697 kubelet[1995]: E0412 18:54:04.767637 1995 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0"} Apr 12 18:54:04.767697 kubelet[1995]: E0412 18:54:04.767673 1995 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:54:04.767795 kubelet[1995]: E0412 18:54:04.767698 1995 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-p7hwv" podUID="55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d" Apr 12 18:54:08.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.104:22-10.0.0.1:36418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:08.981713 systemd[1]: Started sshd@8-10.0.0.104:22-10.0.0.1:36418.service. Apr 12 18:54:08.982962 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 18:54:08.983057 kernel: audit: type=1130 audit(1712948048.981:1144): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.104:22-10.0.0.1:36418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:09.020000 audit[2932]: USER_ACCT pid=2932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.021613 sshd[2932]: Accepted publickey for core from 10.0.0.1 port 36418 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:09.027468 kernel: audit: type=1101 audit(1712948049.020:1145): pid=2932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.027000 audit[2932]: CRED_ACQ pid=2932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.027890 sshd[2932]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:09.038009 kernel: audit: type=1103 audit(1712948049.027:1146): pid=2932 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.038087 kernel: audit: type=1006 audit(1712948049.027:1147): pid=2932 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:54:09.038118 kernel: audit: type=1300 audit(1712948049.027:1147): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d58f230 a2=3 a3=0 items=0 ppid=1 pid=2932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:09.027000 audit[2932]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd4d58f230 a2=3 a3=0 items=0 ppid=1 pid=2932 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:09.037313 systemd[1]: Started session-9.scope. Apr 12 18:54:09.038496 systemd-logind[1110]: New session 9 of user core. Apr 12 18:54:09.027000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:09.044358 kernel: audit: type=1327 audit(1712948049.027:1147): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:09.044476 kernel: audit: type=1105 audit(1712948049.042:1148): pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.042000 audit[2932]: USER_START pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.043000 audit[2934]: CRED_ACQ pid=2934 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.054753 kernel: audit: type=1103 audit(1712948049.043:1149): pid=2934 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.144658 sshd[2932]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:09.145000 audit[2932]: USER_END pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.146771 systemd[1]: sshd@8-10.0.0.104:22-10.0.0.1:36418.service: Deactivated successfully. Apr 12 18:54:09.147378 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:54:09.145000 audit[2932]: CRED_DISP pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.153297 kernel: audit: type=1106 audit(1712948049.145:1150): pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.153369 kernel: audit: type=1104 audit(1712948049.145:1151): pid=2932 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:09.146000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.104:22-10.0.0.1:36418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:09.153806 systemd-logind[1110]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:54:09.154602 systemd-logind[1110]: Removed session 9. Apr 12 18:54:11.225318 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1988415657.mount: Deactivated successfully. Apr 12 18:54:13.052249 env[1127]: time="2024-04-12T18:54:13.052189946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:13.054525 env[1127]: time="2024-04-12T18:54:13.054485028Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:13.056179 env[1127]: time="2024-04-12T18:54:13.056144335Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:13.057763 env[1127]: time="2024-04-12T18:54:13.057730364Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:13.058224 env[1127]: time="2024-04-12T18:54:13.058203704Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:5c6ffd2b2a1d03e9506d4669a91587cd464de04cb141392742fbf4dff2fbd931\"" Apr 12 18:54:13.066696 env[1127]: time="2024-04-12T18:54:13.066638149Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:54:13.082657 env[1127]: time="2024-04-12T18:54:13.082588724Z" level=info msg="CreateContainer within sandbox \"e8bc4653f04136b7d99304d2258aef20f5e8ff9b5158f356e1edc7fa52a8b176\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49\"" Apr 12 18:54:13.083287 env[1127]: time="2024-04-12T18:54:13.083240559Z" level=info msg="StartContainer for \"adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49\"" Apr 12 18:54:13.102643 systemd[1]: Started cri-containerd-adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49.scope. Apr 12 18:54:13.118000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.118000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001c56b0 a2=3c a3=7fabaa95b858 items=0 ppid=2436 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.118000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164626561376334303930636261626431323131303731613461356633 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit: BPF prog-id=145 op=LOAD Apr 12 18:54:13.119000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c59d8 a2=78 a3=c00032fbd8 items=0 ppid=2436 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164626561376334303930636261626431323131303731613461356633 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit: BPF prog-id=146 op=LOAD Apr 12 18:54:13.119000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001c5770 a2=78 a3=c00032fc28 items=0 ppid=2436 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164626561376334303930636261626431323131303731613461356633 Apr 12 18:54:13.119000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:54:13.119000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { perfmon } for pid=2955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit[2955]: AVC avc: denied { bpf } for pid=2955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:13.119000 audit: BPF prog-id=147 op=LOAD Apr 12 18:54:13.119000 audit[2955]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001c5c30 a2=78 a3=c00032fcb8 items=0 ppid=2436 pid=2955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164626561376334303930636261626431323131303731613461356633 Apr 12 18:54:13.133333 env[1127]: time="2024-04-12T18:54:13.133271418Z" level=info msg="StartContainer for \"adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49\" returns successfully" Apr 12 18:54:13.202977 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:54:13.203109 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:54:13.610907 kubelet[1995]: I0412 18:54:13.610850 1995 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:54:13.611527 kubelet[1995]: E0412 18:54:13.611510 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:13.640000 audit[3016]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.640000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff873ac8b0 a2=0 a3=7fff873ac89c items=0 ppid=2200 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.640000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.641000 audit[3016]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3016 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:13.641000 audit[3016]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff873ac8b0 a2=0 a3=7fff873ac89c items=0 ppid=2200 pid=3016 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:13.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:13.710107 kubelet[1995]: E0412 18:54:13.710074 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:13.710291 kubelet[1995]: E0412 18:54:13.710269 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:14.070642 systemd[1]: run-containerd-runc-k8s.io-adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49-runc.ZJZ26c.mount: Deactivated successfully. Apr 12 18:54:14.151921 systemd[1]: Started sshd@9-10.0.0.104:22-10.0.0.1:36430.service. Apr 12 18:54:14.151000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.104:22-10.0.0.1:36430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:14.155449 kernel: kauditd_printk_skb: 50 callbacks suppressed Apr 12 18:54:14.155617 kernel: audit: type=1130 audit(1712948054.151:1161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.104:22-10.0.0.1:36430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:14.196000 audit[3042]: USER_ACCT pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.197555 sshd[3042]: Accepted publickey for core from 10.0.0.1 port 36430 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:14.199795 sshd[3042]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:14.198000 audit[3042]: CRED_ACQ pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.205098 systemd-logind[1110]: New session 10 of user core. Apr 12 18:54:14.206137 systemd[1]: Started session-10.scope. Apr 12 18:54:14.208655 kernel: audit: type=1101 audit(1712948054.196:1162): pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.208791 kernel: audit: type=1103 audit(1712948054.198:1163): pid=3042 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.208813 kernel: audit: type=1006 audit(1712948054.198:1164): pid=3042 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:54:14.198000 audit[3042]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe18d3efa0 a2=3 a3=0 items=0 ppid=1 pid=3042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.217833 kernel: audit: type=1300 audit(1712948054.198:1164): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe18d3efa0 a2=3 a3=0 items=0 ppid=1 pid=3042 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.217992 kernel: audit: type=1327 audit(1712948054.198:1164): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:14.198000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:14.211000 audit[3042]: USER_START pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.226339 kernel: audit: type=1105 audit(1712948054.211:1165): pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.226523 kernel: audit: type=1103 audit(1712948054.213:1166): pid=3044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.213000 audit[3044]: CRED_ACQ pid=3044 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.335969 sshd[3042]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:14.337000 audit[3042]: USER_END pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.339150 systemd[1]: sshd@9-10.0.0.104:22-10.0.0.1:36430.service: Deactivated successfully. Apr 12 18:54:14.340124 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:54:14.342234 systemd-logind[1110]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:54:14.337000 audit[3042]: CRED_DISP pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.343476 systemd-logind[1110]: Removed session 10. Apr 12 18:54:14.346919 kernel: audit: type=1106 audit(1712948054.337:1167): pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.347029 kernel: audit: type=1104 audit(1712948054.337:1168): pid=3042 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:14.339000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.104:22-10.0.0.1:36430 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:14.486000 audit[3089]: AVC avc: denied { write } for pid=3089 comm="tee" name="fd" dev="proc" ino=24063 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.486000 audit[3089]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd2d1bf97b a2=241 a3=1b6 items=1 ppid=3064 pid=3089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.486000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:54:14.486000 audit: PATH item=0 name="/dev/fd/63" inode=23118 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.504000 audit[3119]: AVC avc: denied { write } for pid=3119 comm="tee" name="fd" dev="proc" ino=22408 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.504000 audit[3119]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc568a998d a2=241 a3=1b6 items=1 ppid=3067 pid=3119 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.504000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:54:14.504000 audit: PATH item=0 name="/dev/fd/63" inode=24072 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.504000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.508000 audit[3109]: AVC avc: denied { write } for pid=3109 comm="tee" name="fd" dev="proc" ino=23142 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.512000 audit[3122]: AVC avc: denied { write } for pid=3122 comm="tee" name="fd" dev="proc" ino=22414 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.512000 audit[3122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4f94c98b a2=241 a3=1b6 items=1 ppid=3069 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.512000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:54:14.512000 audit: PATH item=0 name="/dev/fd/63" inode=22405 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.512000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.508000 audit[3109]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffddf5e597c a2=241 a3=1b6 items=1 ppid=3068 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.508000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:54:14.508000 audit: PATH item=0 name="/dev/fd/63" inode=23129 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.508000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.517000 audit[3124]: AVC avc: denied { write } for pid=3124 comm="tee" name="fd" dev="proc" ino=25136 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.517000 audit[3124]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7e36898b a2=241 a3=1b6 items=1 ppid=3076 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.517000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:54:14.517000 audit: PATH item=0 name="/dev/fd/63" inode=23134 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.517000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.523000 audit[3137]: AVC avc: denied { write } for pid=3137 comm="tee" name="fd" dev="proc" ino=25140 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.523000 audit[3137]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff7b2aa98c a2=241 a3=1b6 items=1 ppid=3074 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.523000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:54:14.523000 audit: PATH item=0 name="/dev/fd/63" inode=23143 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.530000 audit[3145]: AVC avc: denied { write } for pid=3145 comm="tee" name="fd" dev="proc" ino=25147 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:54:14.530000 audit[3145]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc5974f98b a2=241 a3=1b6 items=1 ppid=3072 pid=3145 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.530000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:54:14.530000 audit: PATH item=0 name="/dev/fd/63" inode=25144 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:54:14.530000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:54:14.712351 kubelet[1995]: E0412 18:54:14.711914 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:14.727904 systemd[1]: run-containerd-runc-k8s.io-adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49-runc.aMnVC4.mount: Deactivated successfully. Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.812000 audit: BPF prog-id=148 op=LOAD Apr 12 18:54:14.812000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8d0f7d90 a2=70 a3=7fe9a1b08000 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.812000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.813000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.813000 audit: BPF prog-id=149 op=LOAD Apr 12 18:54:14.813000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffd8d0f7d90 a2=70 a3=6f items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.813000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.814000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffd8d0f7d40 a2=70 a3=7ffd8d0f7d90 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.814000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.814000 audit: BPF prog-id=150 op=LOAD Apr 12 18:54:14.814000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7ffd8d0f7d20 a2=70 a3=7ffd8d0f7d90 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.814000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.815000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:54:14.815000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.815000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0f7e00 a2=70 a3=0 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.815000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.815000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.815000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0f7df0 a2=70 a3=0 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.815000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.816000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.816000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffd8d0f7d60 a2=70 a3=0 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.816000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffd8d0f7e30 a2=70 a3=21c6e10 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.817000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffd8d0f7e30 a2=70 a3=21c3880 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.817000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { perfmon } for pid=3236 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit[3236]: AVC avc: denied { bpf } for pid=3236 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.817000 audit: BPF prog-id=151 op=LOAD Apr 12 18:54:14.817000 audit[3236]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffd8d0f7d50 a2=70 a3=0 items=0 ppid=3073 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.817000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:54:14.824000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.824000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff58e4ac0 a2=70 a3=208 items=0 ppid=3073 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:14.824000 audit[3238]: AVC avc: denied { bpf } for pid=3238 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:14.824000 audit[3238]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffff58e4990 a2=70 a3=3 items=0 ppid=3073 pid=3238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.824000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:54:14.830000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:54:14.886000 audit[3266]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3266 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:14.886000 audit[3266]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffee5c3db70 a2=0 a3=7ffee5c3db5c items=0 ppid=3073 pid=3266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.886000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:14.892000 audit[3268]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3268 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:14.892000 audit[3268]: SYSCALL arch=c000003e syscall=46 success=yes exit=6992 a0=3 a1=7ffd8d864f10 a2=0 a3=7ffd8d864efc items=0 ppid=3073 pid=3268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.892000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:14.894000 audit[3267]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3267 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:14.894000 audit[3267]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd442bee80 a2=0 a3=7ffd442bee6c items=0 ppid=3073 pid=3267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.894000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:14.895000 audit[3270]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3270 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:14.895000 audit[3270]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7ffe469af2b0 a2=0 a3=7ffe469af29c items=0 ppid=3073 pid=3270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:14.895000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:15.689382 systemd-networkd[1023]: vxlan.calico: Link UP Apr 12 18:54:15.689392 systemd-networkd[1023]: vxlan.calico: Gained carrier Apr 12 18:54:17.571614 systemd-networkd[1023]: vxlan.calico: Gained IPv6LL Apr 12 18:54:17.586978 env[1127]: time="2024-04-12T18:54:17.586850505Z" level=info msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" Apr 12 18:54:17.652756 kubelet[1995]: I0412 18:54:17.652701 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-7rbkn" podStartSLOduration=5.808463079 podStartE2EDuration="27.652622803s" podCreationTimestamp="2024-04-12 18:53:50 +0000 UTC" firstStartedPulling="2024-04-12 18:53:51.214316812 +0000 UTC m=+20.749669859" lastFinishedPulling="2024-04-12 18:54:13.058476536 +0000 UTC m=+42.593829583" observedRunningTime="2024-04-12 18:54:13.727638153 +0000 UTC m=+43.262991190" watchObservedRunningTime="2024-04-12 18:54:17.652622803 +0000 UTC m=+47.187975840" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.651 [INFO][3297] k8s.go 585: Cleaning up netns ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.651 [INFO][3297] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" iface="eth0" netns="/var/run/netns/cni-bc552ebe-f865-cecb-1ea3-0e209ceb82c0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.652 [INFO][3297] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" iface="eth0" netns="/var/run/netns/cni-bc552ebe-f865-cecb-1ea3-0e209ceb82c0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.653 [INFO][3297] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" iface="eth0" netns="/var/run/netns/cni-bc552ebe-f865-cecb-1ea3-0e209ceb82c0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.653 [INFO][3297] k8s.go 592: Releasing IP address(es) ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.653 [INFO][3297] utils.go 188: Calico CNI releasing IP address ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.711 [INFO][3305] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.712 [INFO][3305] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.712 [INFO][3305] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.721 [WARNING][3305] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.721 [INFO][3305] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.725 [INFO][3305] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:17.730580 env[1127]: 2024-04-12 18:54:17.728 [INFO][3297] k8s.go 598: Teardown processing complete. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:17.733670 env[1127]: time="2024-04-12T18:54:17.730804084Z" level=info msg="TearDown network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" successfully" Apr 12 18:54:17.733670 env[1127]: time="2024-04-12T18:54:17.730849399Z" level=info msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" returns successfully" Apr 12 18:54:17.733321 systemd[1]: run-netns-cni\x2dbc552ebe\x2df865\x2dcecb\x2d1ea3\x2d0e209ceb82c0.mount: Deactivated successfully. Apr 12 18:54:17.734123 env[1127]: time="2024-04-12T18:54:17.733670277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85cf6c9888-jf9tj,Uid:9a74ac03-eadb-4cc1-a495-7161a34169fc,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:18.087179 systemd-networkd[1023]: calidc2e030e1ca: Link UP Apr 12 18:54:18.094215 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:18.094367 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidc2e030e1ca: link becomes ready Apr 12 18:54:18.093241 systemd-networkd[1023]: calidc2e030e1ca: Gained carrier Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:17.966 [INFO][3312] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0 calico-kube-controllers-85cf6c9888- calico-system 9a74ac03-eadb-4cc1-a495-7161a34169fc 774 0 2024-04-12 18:53:51 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:85cf6c9888 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-85cf6c9888-jf9tj eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calidc2e030e1ca [] []}} ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:17.966 [INFO][3312] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.004 [INFO][3326] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" HandleID="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.022 [INFO][3326] ipam_plugin.go 268: Auto assigning IP ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" HandleID="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002adc90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-85cf6c9888-jf9tj", "timestamp":"2024-04-12 18:54:18.00422539 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.022 [INFO][3326] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.022 [INFO][3326] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.022 [INFO][3326] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.025 [INFO][3326] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.037 [INFO][3326] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.046 [INFO][3326] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.050 [INFO][3326] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.056 [INFO][3326] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.056 [INFO][3326] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.060 [INFO][3326] ipam.go 1682: Creating new handle: k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3 Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.069 [INFO][3326] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.078 [INFO][3326] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.078 [INFO][3326] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" host="localhost" Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.078 [INFO][3326] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:18.112389 env[1127]: 2024-04-12 18:54:18.078 [INFO][3326] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" HandleID="k8s-pod-network.fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.081 [INFO][3312] k8s.go 385: Populated endpoint ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0", GenerateName:"calico-kube-controllers-85cf6c9888-", Namespace:"calico-system", SelfLink:"", UID:"9a74ac03-eadb-4cc1-a495-7161a34169fc", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85cf6c9888", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-85cf6c9888-jf9tj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidc2e030e1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.081 [INFO][3312] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.081 [INFO][3312] dataplane_linux.go 68: Setting the host side veth name to calidc2e030e1ca ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.099 [INFO][3312] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.099 [INFO][3312] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0", GenerateName:"calico-kube-controllers-85cf6c9888-", Namespace:"calico-system", SelfLink:"", UID:"9a74ac03-eadb-4cc1-a495-7161a34169fc", ResourceVersion:"774", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85cf6c9888", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3", Pod:"calico-kube-controllers-85cf6c9888-jf9tj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidc2e030e1ca", MAC:"86:43:04:2e:50:7d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:18.113746 env[1127]: 2024-04-12 18:54:18.109 [INFO][3312] k8s.go 498: Wrote updated endpoint to datastore ContainerID="fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3" Namespace="calico-system" Pod="calico-kube-controllers-85cf6c9888-jf9tj" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:18.128016 env[1127]: time="2024-04-12T18:54:18.127902684Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:18.128016 env[1127]: time="2024-04-12T18:54:18.127969270Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:18.128282 env[1127]: time="2024-04-12T18:54:18.127986011Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:18.128282 env[1127]: time="2024-04-12T18:54:18.128240899Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3 pid=3357 runtime=io.containerd.runc.v2 Apr 12 18:54:18.133000 audit[3364]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3364 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:18.133000 audit[3364]: SYSCALL arch=c000003e syscall=46 success=yes exit=20404 a0=3 a1=7ffc1f246ac0 a2=0 a3=7ffc1f246aac items=0 ppid=3073 pid=3364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.133000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:18.149142 systemd[1]: Started cri-containerd-fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3.scope. Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.163000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.163000 audit: BPF prog-id=152 op=LOAD Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3357 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646661373237636234313166646566323562316138666435346137 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3357 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646661373237636234313166646566323562316138666435346137 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.164000 audit: BPF prog-id=153 op=LOAD Apr 12 18:54:18.164000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000284530 items=0 ppid=3357 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.164000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646661373237636234313166646566323562316138666435346137 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit: BPF prog-id=154 op=LOAD Apr 12 18:54:18.169000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000284578 items=0 ppid=3357 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646661373237636234313166646566323562316138666435346137 Apr 12 18:54:18.169000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:54:18.169000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { perfmon } for pid=3367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit[3367]: AVC avc: denied { bpf } for pid=3367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:18.169000 audit: BPF prog-id=155 op=LOAD Apr 12 18:54:18.169000 audit[3367]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000284988 items=0 ppid=3357 pid=3367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:18.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662646661373237636234313166646566323562316138666435346137 Apr 12 18:54:18.171002 systemd-resolved[1067]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:54:18.201419 env[1127]: time="2024-04-12T18:54:18.201313427Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-85cf6c9888-jf9tj,Uid:9a74ac03-eadb-4cc1-a495-7161a34169fc,Namespace:calico-system,Attempt:1,} returns sandbox id \"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3\"" Apr 12 18:54:18.203595 env[1127]: time="2024-04-12T18:54:18.203540750Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:54:18.733838 systemd[1]: run-containerd-runc-k8s.io-fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3-runc.AGUToY.mount: Deactivated successfully. Apr 12 18:54:19.340802 systemd[1]: Started sshd@10-10.0.0.104:22-10.0.0.1:58692.service. Apr 12 18:54:19.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.104:22-10.0.0.1:58692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:19.342122 kernel: kauditd_printk_skb: 185 callbacks suppressed Apr 12 18:54:19.342186 kernel: audit: type=1130 audit(1712948059.340:1216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.104:22-10.0.0.1:58692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:19.389000 audit[3393]: USER_ACCT pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.389769 sshd[3393]: Accepted publickey for core from 10.0.0.1 port 58692 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:19.393000 audit[3393]: CRED_ACQ pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.394618 sshd[3393]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:19.398258 kernel: audit: type=1101 audit(1712948059.389:1217): pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.398383 kernel: audit: type=1103 audit(1712948059.393:1218): pid=3393 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.398436 kernel: audit: type=1006 audit(1712948059.393:1219): pid=3393 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Apr 12 18:54:19.399579 systemd-logind[1110]: New session 11 of user core. Apr 12 18:54:19.400703 systemd[1]: Started session-11.scope. Apr 12 18:54:19.393000 audit[3393]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd119362a0 a2=3 a3=0 items=0 ppid=1 pid=3393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.405178 kernel: audit: type=1300 audit(1712948059.393:1219): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd119362a0 a2=3 a3=0 items=0 ppid=1 pid=3393 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:19.405440 kernel: audit: type=1327 audit(1712948059.393:1219): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:19.393000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:19.406569 kernel: audit: type=1105 audit(1712948059.405:1220): pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.405000 audit[3393]: USER_START pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.410902 kernel: audit: type=1103 audit(1712948059.407:1221): pid=3395 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.407000 audit[3395]: CRED_ACQ pid=3395 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.527292 sshd[3393]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:19.528000 audit[3393]: USER_END pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.530573 systemd[1]: sshd@10-10.0.0.104:22-10.0.0.1:58692.service: Deactivated successfully. Apr 12 18:54:19.531308 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:54:19.532307 systemd-logind[1110]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:54:19.533247 systemd-logind[1110]: Removed session 11. Apr 12 18:54:19.565353 kernel: audit: type=1106 audit(1712948059.528:1222): pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.565503 kernel: audit: type=1104 audit(1712948059.528:1223): pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.528000 audit[3393]: CRED_DISP pid=3393 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:19.564580 systemd-networkd[1023]: calidc2e030e1ca: Gained IPv6LL Apr 12 18:54:19.530000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.104:22-10.0.0.1:58692 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:19.573524 env[1127]: time="2024-04-12T18:54:19.573462466Z" level=info msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" Apr 12 18:54:19.573935 env[1127]: time="2024-04-12T18:54:19.573466173Z" level=info msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" Apr 12 18:54:20.572789 env[1127]: time="2024-04-12T18:54:20.572748357Z" level=info msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] k8s.go 585: Cleaning up netns ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" iface="eth0" netns="/var/run/netns/cni-44964e54-22f9-ba51-6128-2b274a27568e" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" iface="eth0" netns="/var/run/netns/cni-44964e54-22f9-ba51-6128-2b274a27568e" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" iface="eth0" netns="/var/run/netns/cni-44964e54-22f9-ba51-6128-2b274a27568e" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] k8s.go 592: Releasing IP address(es) ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.279 [INFO][3443] utils.go 188: Calico CNI releasing IP address ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.297 [INFO][3458] ipam_plugin.go 415: Releasing address using handleID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.297 [INFO][3458] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.297 [INFO][3458] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.632 [WARNING][3458] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.632 [INFO][3458] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.722 [INFO][3458] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:20.725601 env[1127]: 2024-04-12 18:54:20.724 [INFO][3443] k8s.go 598: Teardown processing complete. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:20.726367 env[1127]: time="2024-04-12T18:54:20.725769154Z" level=info msg="TearDown network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" successfully" Apr 12 18:54:20.726367 env[1127]: time="2024-04-12T18:54:20.725809560Z" level=info msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" returns successfully" Apr 12 18:54:20.726460 kubelet[1995]: E0412 18:54:20.726103 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:20.727541 systemd[1]: run-netns-cni\x2d44964e54\x2d22f9\x2dba51\x2d6128\x2d2b274a27568e.mount: Deactivated successfully. Apr 12 18:54:20.729625 env[1127]: time="2024-04-12T18:54:20.727567961Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q4878,Uid:0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] k8s.go 585: Cleaning up netns ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" iface="eth0" netns="/var/run/netns/cni-4471d8c8-aac4-8267-201e-a36c93ba5d82" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" iface="eth0" netns="/var/run/netns/cni-4471d8c8-aac4-8267-201e-a36c93ba5d82" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" iface="eth0" netns="/var/run/netns/cni-4471d8c8-aac4-8267-201e-a36c93ba5d82" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] k8s.go 592: Releasing IP address(es) ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.305 [INFO][3434] utils.go 188: Calico CNI releasing IP address ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.324 [INFO][3465] ipam_plugin.go 415: Releasing address using handleID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.324 [INFO][3465] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:20.723 [INFO][3465] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:21.047 [WARNING][3465] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:21.047 [INFO][3465] ipam_plugin.go 443: Releasing address using workloadID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:21.108 [INFO][3465] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:21.110557 env[1127]: 2024-04-12 18:54:21.109 [INFO][3434] k8s.go 598: Teardown processing complete. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:21.113199 env[1127]: time="2024-04-12T18:54:21.110684015Z" level=info msg="TearDown network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" successfully" Apr 12 18:54:21.113199 env[1127]: time="2024-04-12T18:54:21.110725393Z" level=info msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" returns successfully" Apr 12 18:54:21.112375 systemd[1]: run-netns-cni\x2d4471d8c8\x2daac4\x2d8267\x2d201e\x2da36c93ba5d82.mount: Deactivated successfully. Apr 12 18:54:21.113655 env[1127]: time="2024-04-12T18:54:21.113598979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p7hwv,Uid:55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d,Namespace:calico-system,Attempt:1,}" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.975 [INFO][3491] k8s.go 585: Cleaning up netns ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.975 [INFO][3491] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" iface="eth0" netns="/var/run/netns/cni-0af75b9e-a4ef-a532-5d26-fcb25aaea94a" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.976 [INFO][3491] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" iface="eth0" netns="/var/run/netns/cni-0af75b9e-a4ef-a532-5d26-fcb25aaea94a" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.976 [INFO][3491] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" iface="eth0" netns="/var/run/netns/cni-0af75b9e-a4ef-a532-5d26-fcb25aaea94a" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.976 [INFO][3491] k8s.go 592: Releasing IP address(es) ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.976 [INFO][3491] utils.go 188: Calico CNI releasing IP address ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.993 [INFO][3499] ipam_plugin.go 415: Releasing address using handleID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:20.993 [INFO][3499] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:21.108 [INFO][3499] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:21.115 [WARNING][3499] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:21.116 [INFO][3499] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:21.117 [INFO][3499] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:21.120443 env[1127]: 2024-04-12 18:54:21.119 [INFO][3491] k8s.go 598: Teardown processing complete. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:21.120881 env[1127]: time="2024-04-12T18:54:21.120584193Z" level=info msg="TearDown network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" successfully" Apr 12 18:54:21.120881 env[1127]: time="2024-04-12T18:54:21.120603870Z" level=info msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" returns successfully" Apr 12 18:54:21.120934 kubelet[1995]: E0412 18:54:21.120873 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:21.122102 env[1127]: time="2024-04-12T18:54:21.121408340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2q6l5,Uid:c7932afe-95dd-418f-8c2e-8f1e3c70ef87,Namespace:kube-system,Attempt:1,}" Apr 12 18:54:21.122385 systemd[1]: run-netns-cni\x2d0af75b9e\x2da4ef\x2da532\x2d5d26\x2dfcb25aaea94a.mount: Deactivated successfully. Apr 12 18:54:21.309388 kubelet[1995]: E0412 18:54:21.309358 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:21.586879 systemd-networkd[1023]: cali2c4be31b17d: Link UP Apr 12 18:54:21.589198 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:54:21.589257 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali2c4be31b17d: link becomes ready Apr 12 18:54:21.589351 systemd-networkd[1023]: cali2c4be31b17d: Gained carrier Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.461 [INFO][3529] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--q4878-eth0 coredns-76f75df574- kube-system 0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a 793 0 2024-04-12 18:53:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-q4878 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali2c4be31b17d [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.462 [INFO][3529] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.526 [INFO][3569] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" HandleID="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.541 [INFO][3569] ipam_plugin.go 268: Auto assigning IP ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" HandleID="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0005a95d0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-q4878", "timestamp":"2024-04-12 18:54:21.526166073 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.541 [INFO][3569] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.541 [INFO][3569] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.541 [INFO][3569] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.543 [INFO][3569] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.553 [INFO][3569] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.561 [INFO][3569] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.564 [INFO][3569] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.567 [INFO][3569] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.567 [INFO][3569] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.570 [INFO][3569] ipam.go 1682: Creating new handle: k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924 Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.573 [INFO][3569] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.581 [INFO][3569] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.581 [INFO][3569] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" host="localhost" Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.582 [INFO][3569] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:21.736658 env[1127]: 2024-04-12 18:54:21.582 [INFO][3569] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" HandleID="k8s-pod-network.7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.583 [INFO][3529] k8s.go 385: Populated endpoint ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--q4878-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-q4878", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2c4be31b17d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.583 [INFO][3529] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.583 [INFO][3529] dataplane_linux.go 68: Setting the host side veth name to cali2c4be31b17d ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.589 [INFO][3529] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.589 [INFO][3529] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--q4878-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924", Pod:"coredns-76f75df574-q4878", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2c4be31b17d", MAC:"f2:ab:39:8f:11:5a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:21.737745 env[1127]: 2024-04-12 18:54:21.727 [INFO][3529] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924" Namespace="kube-system" Pod="coredns-76f75df574-q4878" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:21.750000 audit[3611]: NETFILTER_CFG table=filter:102 family=2 entries=40 op=nft_register_chain pid=3611 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.750000 audit[3611]: SYSCALL arch=c000003e syscall=46 success=yes exit=21592 a0=3 a1=7ffc7c06fa90 a2=0 a3=7ffc7c06fa7c items=0 ppid=3073 pid=3611 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.750000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:21.784193 systemd-networkd[1023]: cali235bf702ba7: Link UP Apr 12 18:54:21.785942 systemd-networkd[1023]: cali235bf702ba7: Gained carrier Apr 12 18:54:21.786424 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali235bf702ba7: link becomes ready Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.500 [INFO][3546] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--2q6l5-eth0 coredns-76f75df574- kube-system c7932afe-95dd-418f-8c2e-8f1e3c70ef87 800 0 2024-04-12 18:53:45 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-2q6l5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali235bf702ba7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.500 [INFO][3546] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.557 [INFO][3584] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" HandleID="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.568 [INFO][3584] ipam_plugin.go 268: Auto assigning IP ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" HandleID="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050150), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-2q6l5", "timestamp":"2024-04-12 18:54:21.557574922 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.568 [INFO][3584] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.591 [INFO][3584] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.591 [INFO][3584] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.730 [INFO][3584] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.736 [INFO][3584] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.767 [INFO][3584] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.769 [INFO][3584] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.771 [INFO][3584] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.771 [INFO][3584] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.772 [INFO][3584] ipam.go 1682: Creating new handle: k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.776 [INFO][3584] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.780 [INFO][3584] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.780 [INFO][3584] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" host="localhost" Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.780 [INFO][3584] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:21.920116 env[1127]: 2024-04-12 18:54:21.780 [INFO][3584] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" HandleID="k8s-pod-network.c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.781 [INFO][3546] k8s.go 385: Populated endpoint ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2q6l5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c7932afe-95dd-418f-8c2e-8f1e3c70ef87", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-2q6l5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali235bf702ba7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.781 [INFO][3546] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.781 [INFO][3546] dataplane_linux.go 68: Setting the host side veth name to cali235bf702ba7 ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.786 [INFO][3546] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.786 [INFO][3546] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2q6l5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c7932afe-95dd-418f-8c2e-8f1e3c70ef87", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a", Pod:"coredns-76f75df574-2q6l5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali235bf702ba7", MAC:"f6:99:68:68:30:5f", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:21.920977 env[1127]: 2024-04-12 18:54:21.918 [INFO][3546] k8s.go 498: Wrote updated endpoint to datastore ContainerID="c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a" Namespace="kube-system" Pod="coredns-76f75df574-2q6l5" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:21.929000 audit[3626]: NETFILTER_CFG table=filter:103 family=2 entries=40 op=nft_register_chain pid=3626 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:21.929000 audit[3626]: SYSCALL arch=c000003e syscall=46 success=yes exit=21072 a0=3 a1=7ffdf003e900 a2=0 a3=7ffdf003e8ec items=0 ppid=3073 pid=3626 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:21.929000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:22.064872 systemd-networkd[1023]: cali335e9a3c7d0: Link UP Apr 12 18:54:22.068539 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali335e9a3c7d0: link becomes ready Apr 12 18:54:22.068530 systemd-networkd[1023]: cali335e9a3c7d0: Gained carrier Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.496 [INFO][3540] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--p7hwv-eth0 csi-node-driver- calico-system 55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d 794 0 2024-04-12 18:53:50 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-p7hwv eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali335e9a3c7d0 [] []}} ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.497 [INFO][3540] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.558 [INFO][3580] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" HandleID="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.568 [INFO][3580] ipam_plugin.go 268: Auto assigning IP ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" HandleID="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000260230), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-p7hwv", "timestamp":"2024-04-12 18:54:21.558217268 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.568 [INFO][3580] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.780 [INFO][3580] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.780 [INFO][3580] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.918 [INFO][3580] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.955 [INFO][3580] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.958 [INFO][3580] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.960 [INFO][3580] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.962 [INFO][3580] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:21.962 [INFO][3580] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.048 [INFO][3580] ipam.go 1682: Creating new handle: k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.053 [INFO][3580] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.060 [INFO][3580] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.060 [INFO][3580] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" host="localhost" Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.061 [INFO][3580] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:22.075432 env[1127]: 2024-04-12 18:54:22.061 [INFO][3580] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" HandleID="k8s-pod-network.7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.062 [INFO][3540] k8s.go 385: Populated endpoint ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p7hwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-p7hwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali335e9a3c7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.063 [INFO][3540] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.063 [INFO][3540] dataplane_linux.go 68: Setting the host side veth name to cali335e9a3c7d0 ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.065 [INFO][3540] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.065 [INFO][3540] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p7hwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d", ResourceVersion:"794", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b", Pod:"csi-node-driver-p7hwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali335e9a3c7d0", MAC:"5a:b6:4d:18:7d:87", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:22.076078 env[1127]: 2024-04-12 18:54:22.073 [INFO][3540] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b" Namespace="calico-system" Pod="csi-node-driver-p7hwv" WorkloadEndpoint="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:22.093186 env[1127]: time="2024-04-12T18:54:22.093126034Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:22.093186 env[1127]: time="2024-04-12T18:54:22.093160499Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:22.093186 env[1127]: time="2024-04-12T18:54:22.093169867Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:22.093468 env[1127]: time="2024-04-12T18:54:22.093259916Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924 pid=3652 runtime=io.containerd.runc.v2 Apr 12 18:54:22.092000 audit[3650]: NETFILTER_CFG table=filter:104 family=2 entries=38 op=nft_register_chain pid=3650 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:54:22.092000 audit[3650]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffed1e0d670 a2=0 a3=7ffed1e0d65c items=0 ppid=3073 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.092000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:54:22.111156 systemd[1]: Started cri-containerd-7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924.scope. Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.121000 audit: BPF prog-id=156 op=LOAD Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=3652 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646430313764663562363437336263333666333734383764623763 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=c items=0 ppid=3652 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646430313764663562363437336263333666333734383764623763 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit: BPF prog-id=157 op=LOAD Apr 12 18:54:22.123000 audit[3660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000206f90 items=0 ppid=3652 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646430313764663562363437336263333666333734383764623763 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit: BPF prog-id=158 op=LOAD Apr 12 18:54:22.123000 audit[3660]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000206fd8 items=0 ppid=3652 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646430313764663562363437336263333666333734383764623763 Apr 12 18:54:22.123000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:54:22.123000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { perfmon } for pid=3660 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit[3660]: AVC avc: denied { bpf } for pid=3660 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.123000 audit: BPF prog-id=159 op=LOAD Apr 12 18:54:22.123000 audit[3660]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0002073e8 items=0 ppid=3652 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.123000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761646430313764663562363437336263333666333734383764623763 Apr 12 18:54:22.124808 systemd-resolved[1067]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:54:22.147201 env[1127]: time="2024-04-12T18:54:22.147145618Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-q4878,Uid:0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a,Namespace:kube-system,Attempt:1,} returns sandbox id \"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924\"" Apr 12 18:54:22.148156 kubelet[1995]: E0412 18:54:22.148127 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:22.150304 env[1127]: time="2024-04-12T18:54:22.150261768Z" level=info msg="CreateContainer within sandbox \"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:22.277174 env[1127]: time="2024-04-12T18:54:22.276803921Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:22.277174 env[1127]: time="2024-04-12T18:54:22.276853434Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:22.277174 env[1127]: time="2024-04-12T18:54:22.276874013Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:22.277383 env[1127]: time="2024-04-12T18:54:22.277261470Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a pid=3691 runtime=io.containerd.runc.v2 Apr 12 18:54:22.289615 systemd[1]: Started cri-containerd-c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a.scope. Apr 12 18:54:22.294888 env[1127]: time="2024-04-12T18:54:22.294616582Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:54:22.294888 env[1127]: time="2024-04-12T18:54:22.294665022Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:54:22.294888 env[1127]: time="2024-04-12T18:54:22.294678287Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:54:22.299841 env[1127]: time="2024-04-12T18:54:22.295132721Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b pid=3718 runtime=io.containerd.runc.v2 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit: BPF prog-id=160 op=LOAD Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3691 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383133363631376364333034306636333336333931373833613634 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3691 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383133363631376364333034306636333336333931373833613634 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.309000 audit: BPF prog-id=161 op=LOAD Apr 12 18:54:22.309000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001dbbe0 items=0 ppid=3691 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383133363631376364333034306636333336333931373833613634 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit: BPF prog-id=162 op=LOAD Apr 12 18:54:22.310000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dbc28 items=0 ppid=3691 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383133363631376364333034306636333336333931373833613634 Apr 12 18:54:22.310000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:54:22.310000 audit: BPF prog-id=161 op=UNLOAD Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.310000 audit: BPF prog-id=163 op=LOAD Apr 12 18:54:22.310000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c2038 items=0 ppid=3691 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6330383133363631376364333034306636333336333931373833613634 Apr 12 18:54:22.311203 systemd-resolved[1067]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:54:22.318134 systemd[1]: Started cri-containerd-7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b.scope. Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.335000 audit: BPF prog-id=164 op=LOAD Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3718 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613961346262343961306237373262626136343231656637383939 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3718 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613961346262343961306237373262626136343231656637383939 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit: BPF prog-id=165 op=LOAD Apr 12 18:54:22.336000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00024bce0 items=0 ppid=3718 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613961346262343961306237373262626136343231656637383939 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.336000 audit: BPF prog-id=166 op=LOAD Apr 12 18:54:22.336000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00024bd28 items=0 ppid=3718 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.336000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613961346262343961306237373262626136343231656637383939 Apr 12 18:54:22.336000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:54:22.336000 audit: BPF prog-id=165 op=UNLOAD Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { perfmon } for pid=3732 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit[3732]: AVC avc: denied { bpf } for pid=3732 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.337000 audit: BPF prog-id=167 op=LOAD Apr 12 18:54:22.337000 audit[3732]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003b6138 items=0 ppid=3718 pid=3732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.337000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3765613961346262343961306237373262626136343231656637383939 Apr 12 18:54:22.338159 systemd-resolved[1067]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:54:22.344029 env[1127]: time="2024-04-12T18:54:22.343832117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-2q6l5,Uid:c7932afe-95dd-418f-8c2e-8f1e3c70ef87,Namespace:kube-system,Attempt:1,} returns sandbox id \"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a\"" Apr 12 18:54:22.345671 kubelet[1995]: E0412 18:54:22.345056 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:22.347178 env[1127]: time="2024-04-12T18:54:22.347137311Z" level=info msg="CreateContainer within sandbox \"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:54:22.350542 env[1127]: time="2024-04-12T18:54:22.350506417Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-p7hwv,Uid:55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d,Namespace:calico-system,Attempt:1,} returns sandbox id \"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b\"" Apr 12 18:54:22.636752 env[1127]: time="2024-04-12T18:54:22.636630390Z" level=info msg="CreateContainer within sandbox \"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"28dbfb23cf0ed44a4dac1e4acc1258634d93a2c84854e13352da4d49570b9b78\"" Apr 12 18:54:22.637422 env[1127]: time="2024-04-12T18:54:22.637381690Z" level=info msg="StartContainer for \"28dbfb23cf0ed44a4dac1e4acc1258634d93a2c84854e13352da4d49570b9b78\"" Apr 12 18:54:22.651422 systemd[1]: Started cri-containerd-28dbfb23cf0ed44a4dac1e4acc1258634d93a2c84854e13352da4d49570b9b78.scope. Apr 12 18:54:22.661189 env[1127]: time="2024-04-12T18:54:22.661114875Z" level=info msg="CreateContainer within sandbox \"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"2e15caf1089f9f25231ef4809513403c4ef15ddd765cf21c466e8babc9a57434\"" Apr 12 18:54:22.661763 env[1127]: time="2024-04-12T18:54:22.661740520Z" level=info msg="StartContainer for \"2e15caf1089f9f25231ef4809513403c4ef15ddd765cf21c466e8babc9a57434\"" Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.665000 audit: BPF prog-id=168 op=LOAD Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3652 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646266623233636630656434346134646163316534616363313235 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=3652 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646266623233636630656434346134646163316534616363313235 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit: BPF prog-id=169 op=LOAD Apr 12 18:54:22.666000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003257b0 items=0 ppid=3652 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646266623233636630656434346134646163316534616363313235 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.666000 audit: BPF prog-id=170 op=LOAD Apr 12 18:54:22.666000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003257f8 items=0 ppid=3652 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646266623233636630656434346134646163316534616363313235 Apr 12 18:54:22.667000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:54:22.667000 audit: BPF prog-id=169 op=UNLOAD Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { perfmon } for pid=3772 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit[3772]: AVC avc: denied { bpf } for pid=3772 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.667000 audit: BPF prog-id=171 op=LOAD Apr 12 18:54:22.667000 audit[3772]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000325c08 items=0 ppid=3652 pid=3772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3238646266623233636630656434346134646163316534616363313235 Apr 12 18:54:22.676715 systemd[1]: Started cri-containerd-2e15caf1089f9f25231ef4809513403c4ef15ddd765cf21c466e8babc9a57434.scope. Apr 12 18:54:22.685269 env[1127]: time="2024-04-12T18:54:22.685213637Z" level=info msg="StartContainer for \"28dbfb23cf0ed44a4dac1e4acc1258634d93a2c84854e13352da4d49570b9b78\" returns successfully" Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.692000 audit: BPF prog-id=172 op=LOAD Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3691 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313563616631303839663966323532333165663438303935313334 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3691 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313563616631303839663966323532333165663438303935313334 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit: BPF prog-id=173 op=LOAD Apr 12 18:54:22.693000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00030c3a0 items=0 ppid=3691 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313563616631303839663966323532333165663438303935313334 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit: BPF prog-id=174 op=LOAD Apr 12 18:54:22.693000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00030c3e8 items=0 ppid=3691 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313563616631303839663966323532333165663438303935313334 Apr 12 18:54:22.693000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:54:22.693000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { perfmon } for pid=3796 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit[3796]: AVC avc: denied { bpf } for pid=3796 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:22.693000 audit: BPF prog-id=175 op=LOAD Apr 12 18:54:22.693000 audit[3796]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00030c7f8 items=0 ppid=3691 pid=3796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265313563616631303839663966323532333165663438303935313334 Apr 12 18:54:22.722861 env[1127]: time="2024-04-12T18:54:22.722771917Z" level=info msg="StartContainer for \"2e15caf1089f9f25231ef4809513403c4ef15ddd765cf21c466e8babc9a57434\" returns successfully" Apr 12 18:54:22.733788 systemd[1]: run-containerd-runc-k8s.io-7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924-runc.XnCSuK.mount: Deactivated successfully. Apr 12 18:54:22.739820 kubelet[1995]: E0412 18:54:22.739729 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:22.742124 kubelet[1995]: E0412 18:54:22.742078 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:22.753295 kubelet[1995]: I0412 18:54:22.753136 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-q4878" podStartSLOduration=37.753086448 podStartE2EDuration="37.753086448s" podCreationTimestamp="2024-04-12 18:53:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:22.751998655 +0000 UTC m=+52.287351692" watchObservedRunningTime="2024-04-12 18:54:22.753086448 +0000 UTC m=+52.288439485" Apr 12 18:54:22.774000 audit[3840]: NETFILTER_CFG table=filter:105 family=2 entries=14 op=nft_register_rule pid=3840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:22.774000 audit[3840]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fffd530c5c0 a2=0 a3=7fffd530c5ac items=0 ppid=2200 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:22.775000 audit[3840]: NETFILTER_CFG table=nat:106 family=2 entries=14 op=nft_register_rule pid=3840 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:22.775000 audit[3840]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7fffd530c5c0 a2=0 a3=0 items=0 ppid=2200 pid=3840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.775000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:22.789000 audit[3843]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:22.789000 audit[3843]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7ffe80d7dd50 a2=0 a3=7ffe80d7dd3c items=0 ppid=2200 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:22.790000 audit[3843]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=3843 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:22.790000 audit[3843]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe80d7dd50 a2=0 a3=0 items=0 ppid=2200 pid=3843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:22.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:22.888117 systemd-networkd[1023]: cali2c4be31b17d: Gained IPv6LL Apr 12 18:54:23.395654 systemd-networkd[1023]: cali335e9a3c7d0: Gained IPv6LL Apr 12 18:54:23.587933 systemd-networkd[1023]: cali235bf702ba7: Gained IPv6LL Apr 12 18:54:23.746824 kubelet[1995]: E0412 18:54:23.746705 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:23.747202 kubelet[1995]: E0412 18:54:23.746801 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:23.935458 kubelet[1995]: I0412 18:54:23.935380 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-2q6l5" podStartSLOduration=38.935337635 podStartE2EDuration="38.935337635s" podCreationTimestamp="2024-04-12 18:53:45 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:54:22.766689735 +0000 UTC m=+52.302042772" watchObservedRunningTime="2024-04-12 18:54:23.935337635 +0000 UTC m=+53.470690672" Apr 12 18:54:23.960000 audit[3849]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=3849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:23.960000 audit[3849]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdd4721260 a2=0 a3=7ffdd472124c items=0 ppid=2200 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.960000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:23.961000 audit[3849]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=3849 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:23.961000 audit[3849]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffdd4721260 a2=0 a3=7ffdd472124c items=0 ppid=2200 pid=3849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:23.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:23.997509 env[1127]: time="2024-04-12T18:54:23.997337194Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:23.999810 env[1127]: time="2024-04-12T18:54:23.999759561Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:24.002007 env[1127]: time="2024-04-12T18:54:24.001966454Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:24.004116 env[1127]: time="2024-04-12T18:54:24.004061396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:24.004895 env[1127]: time="2024-04-12T18:54:24.004865656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:3e4fd05c0c1c037d7b99e8aab4e14d2f54e8150b91b06776fb019a2d51611a88\"" Apr 12 18:54:24.006118 env[1127]: time="2024-04-12T18:54:24.005980259Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:54:24.019483 env[1127]: time="2024-04-12T18:54:24.019420478Z" level=info msg="CreateContainer within sandbox \"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:54:24.038726 env[1127]: time="2024-04-12T18:54:24.038670894Z" level=info msg="CreateContainer within sandbox \"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586\"" Apr 12 18:54:24.039244 env[1127]: time="2024-04-12T18:54:24.039215475Z" level=info msg="StartContainer for \"9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586\"" Apr 12 18:54:24.060608 systemd[1]: Started cri-containerd-9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586.scope. Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit: BPF prog-id=176 op=LOAD Apr 12 18:54:24.072000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3357 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962373032323437393835363066623230356463363332386563323237 Apr 12 18:54:24.072000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.072000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=3357 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962373032323437393835363066623230356463363332386563323237 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit: BPF prog-id=177 op=LOAD Apr 12 18:54:24.073000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000313a00 items=0 ppid=3357 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962373032323437393835363066623230356463363332386563323237 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit: BPF prog-id=178 op=LOAD Apr 12 18:54:24.073000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000313a48 items=0 ppid=3357 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962373032323437393835363066623230356463363332386563323237 Apr 12 18:54:24.073000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:54:24.073000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:24.073000 audit: BPF prog-id=179 op=LOAD Apr 12 18:54:24.073000 audit[3859]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000313e58 items=0 ppid=3357 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962373032323437393835363066623230356463363332386563323237 Apr 12 18:54:24.103455 env[1127]: time="2024-04-12T18:54:24.101189120Z" level=info msg="StartContainer for \"9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586\" returns successfully" Apr 12 18:54:24.530654 systemd[1]: Started sshd@11-10.0.0.104:22-10.0.0.1:58698.service. Apr 12 18:54:24.530000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.104:22-10.0.0.1:58698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:24.531966 kernel: kauditd_printk_skb: 370 callbacks suppressed Apr 12 18:54:24.532110 kernel: audit: type=1130 audit(1712948064.530:1342): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.104:22-10.0.0.1:58698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:24.571000 audit[3888]: USER_ACCT pid=3888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.572200 sshd[3888]: Accepted publickey for core from 10.0.0.1 port 58698 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:24.597340 sshd[3888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:24.597822 kernel: audit: type=1101 audit(1712948064.571:1343): pid=3888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.597851 kernel: audit: type=1103 audit(1712948064.596:1344): pid=3888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.596000 audit[3888]: CRED_ACQ pid=3888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.603885 kernel: audit: type=1006 audit(1712948064.596:1345): pid=3888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Apr 12 18:54:24.603994 kernel: audit: type=1300 audit(1712948064.596:1345): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00018940 a2=3 a3=0 items=0 ppid=1 pid=3888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.596000 audit[3888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc00018940 a2=3 a3=0 items=0 ppid=1 pid=3888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.605321 systemd[1]: Started session-12.scope. Apr 12 18:54:24.605754 systemd-logind[1110]: New session 12 of user core. Apr 12 18:54:24.607911 kernel: audit: type=1327 audit(1712948064.596:1345): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:24.596000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:24.609000 audit[3888]: USER_START pid=3888 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.611000 audit[3890]: CRED_ACQ pid=3890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.618099 kernel: audit: type=1105 audit(1712948064.609:1346): pid=3888 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.618149 kernel: audit: type=1103 audit(1712948064.611:1347): pid=3890 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.750171 kubelet[1995]: E0412 18:54:24.750128 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:24.750673 kubelet[1995]: E0412 18:54:24.750458 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:24.911614 sshd[3888]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:24.913069 systemd[1]: Started sshd@12-10.0.0.104:22-10.0.0.1:58700.service. Apr 12 18:54:24.912000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.104:22-10.0.0.1:58700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:24.914000 audit[3888]: USER_END pid=3888 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.921923 kernel: audit: type=1130 audit(1712948064.912:1348): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.104:22-10.0.0.1:58700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:24.921992 kernel: audit: type=1106 audit(1712948064.914:1349): pid=3888 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.914000 audit[3888]: CRED_DISP pid=3888 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.922202 systemd[1]: sshd@11-10.0.0.104:22-10.0.0.1:58698.service: Deactivated successfully. Apr 12 18:54:24.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.104:22-10.0.0.1:58698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:24.922910 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:54:24.923515 systemd-logind[1110]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:54:24.924310 systemd-logind[1110]: Removed session 12. Apr 12 18:54:24.950000 audit[3909]: USER_ACCT pid=3909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.951635 sshd[3909]: Accepted publickey for core from 10.0.0.1 port 58700 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:24.951000 audit[3909]: CRED_ACQ pid=3909 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.951000 audit[3909]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff39f3d2d0 a2=3 a3=0 items=0 ppid=1 pid=3909 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:24.951000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:24.952492 sshd[3909]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:24.955505 systemd-logind[1110]: New session 13 of user core. Apr 12 18:54:24.956262 systemd[1]: Started session-13.scope. Apr 12 18:54:24.959000 audit[3909]: USER_START pid=3909 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:24.960000 audit[3912]: CRED_ACQ pid=3912 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.641000 audit[3925]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:25.641000 audit[3925]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffd023294d0 a2=0 a3=7ffd023294bc items=0 ppid=2200 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:25.641000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:25.665000 audit[3925]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3925 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:25.665000 audit[3925]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffd023294d0 a2=0 a3=7ffd023294bc items=0 ppid=2200 pid=3925 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:25.665000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:25.752605 kubelet[1995]: E0412 18:54:25.752576 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:25.788223 sshd[3909]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:25.788000 audit[3909]: USER_END pid=3909 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.789000 audit[3909]: CRED_DISP pid=3909 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.791645 systemd[1]: Started sshd@13-10.0.0.104:22-10.0.0.1:58706.service. Apr 12 18:54:25.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.104:22-10.0.0.1:58706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:25.792081 systemd[1]: sshd@12-10.0.0.104:22-10.0.0.1:58700.service: Deactivated successfully. Apr 12 18:54:25.792000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.104:22-10.0.0.1:58700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:25.793611 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:54:25.794387 systemd-logind[1110]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:54:25.795636 systemd-logind[1110]: Removed session 13. Apr 12 18:54:25.949000 audit[3945]: USER_ACCT pid=3945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.949855 sshd[3945]: Accepted publickey for core from 10.0.0.1 port 58706 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:25.950000 audit[3945]: CRED_ACQ pid=3945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.950000 audit[3945]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff038f7100 a2=3 a3=0 items=0 ppid=1 pid=3945 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:25.950000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:25.951143 sshd[3945]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:25.955330 systemd-logind[1110]: New session 14 of user core. Apr 12 18:54:25.956453 systemd[1]: Started session-14.scope. Apr 12 18:54:25.961000 audit[3945]: USER_START pid=3945 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.962000 audit[3954]: CRED_ACQ pid=3954 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:25.999309 kubelet[1995]: I0412 18:54:25.998717 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-85cf6c9888-jf9tj" podStartSLOduration=29.196468139 podStartE2EDuration="34.998674771s" podCreationTimestamp="2024-04-12 18:53:51 +0000 UTC" firstStartedPulling="2024-04-12 18:54:18.203031584 +0000 UTC m=+47.738384621" lastFinishedPulling="2024-04-12 18:54:24.005238216 +0000 UTC m=+53.540591253" observedRunningTime="2024-04-12 18:54:24.933074972 +0000 UTC m=+54.468428009" watchObservedRunningTime="2024-04-12 18:54:25.998674771 +0000 UTC m=+55.534027808" Apr 12 18:54:26.104469 sshd[3945]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:26.105000 audit[3945]: USER_END pid=3945 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:26.105000 audit[3945]: CRED_DISP pid=3945 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:26.107625 systemd-logind[1110]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:54:26.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.104:22-10.0.0.1:58706 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:26.109092 systemd[1]: sshd@13-10.0.0.104:22-10.0.0.1:58706.service: Deactivated successfully. Apr 12 18:54:26.109883 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:54:26.111353 systemd-logind[1110]: Removed session 14. Apr 12 18:54:26.684508 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount331531514.mount: Deactivated successfully. Apr 12 18:54:27.107000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.107000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.107000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000d89280 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:27.107000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0020be150 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:27.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:27.107000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:27.460489 env[1127]: time="2024-04-12T18:54:27.460325946Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:27.497000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.497000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520989 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.497000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.497000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c008b2a9c0 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.497000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c009117740 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.497000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6f a1=c008ac2e10 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.497000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.512000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.512000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520983 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.512000 audit[1913]: AVC avc: denied { watch } for pid=1913 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:27.512000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6d a1=c00693e660 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.512000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6c a1=c008ac2e70 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.512000 audit[1913]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6b a1=c00c852c60 a2=fc6 a3=0 items=0 ppid=1730 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c358,c764 key=(null) Apr 12 18:54:27.512000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313034002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:54:27.573671 env[1127]: time="2024-04-12T18:54:27.573617082Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:27.622892 env[1127]: time="2024-04-12T18:54:27.622825120Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:27.661531 env[1127]: time="2024-04-12T18:54:27.661474902Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:27.662265 env[1127]: time="2024-04-12T18:54:27.662237613Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:f457bd778a36f01fbbc41cd8b9ac45cf5e7e3a09e4d619cfa819328acd45ea0b\"" Apr 12 18:54:27.663902 env[1127]: time="2024-04-12T18:54:27.663865509Z" level=info msg="CreateContainer within sandbox \"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:54:27.912365 env[1127]: time="2024-04-12T18:54:27.912302379Z" level=info msg="CreateContainer within sandbox \"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"cc3328dba5d1ccc2913a1e10df53d3abb8d61e8d2fb255e92ac3a5652a8f46ea\"" Apr 12 18:54:27.912910 env[1127]: time="2024-04-12T18:54:27.912884791Z" level=info msg="StartContainer for \"cc3328dba5d1ccc2913a1e10df53d3abb8d61e8d2fb255e92ac3a5652a8f46ea\"" Apr 12 18:54:27.933201 systemd[1]: Started cri-containerd-cc3328dba5d1ccc2913a1e10df53d3abb8d61e8d2fb255e92ac3a5652a8f46ea.scope. Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f814d4f6e68 items=0 ppid=3718 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333332386462613564316363633239313361316531306466353364 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.945000 audit: BPF prog-id=180 op=LOAD Apr 12 18:54:27.945000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c000394bf8 items=0 ppid=3718 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.945000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333332386462613564316363633239313361316531306466353364 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit: BPF prog-id=181 op=LOAD Apr 12 18:54:27.946000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000394c48 items=0 ppid=3718 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333332386462613564316363633239313361316531306466353364 Apr 12 18:54:27.946000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:54:27.946000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { perfmon } for pid=3974 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit[3974]: AVC avc: denied { bpf } for pid=3974 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:27.946000 audit: BPF prog-id=182 op=LOAD Apr 12 18:54:27.946000 audit[3974]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000394cd8 items=0 ppid=3718 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:27.946000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6363333332386462613564316363633239313361316531306466353364 Apr 12 18:54:27.958863 env[1127]: time="2024-04-12T18:54:27.958809528Z" level=info msg="StartContainer for \"cc3328dba5d1ccc2913a1e10df53d3abb8d61e8d2fb255e92ac3a5652a8f46ea\" returns successfully" Apr 12 18:54:27.961814 env[1127]: time="2024-04-12T18:54:27.961058238Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:54:30.548093 env[1127]: time="2024-04-12T18:54:30.548040492Z" level=info msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.586 [WARNING][4015] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0", GenerateName:"calico-kube-controllers-85cf6c9888-", Namespace:"calico-system", SelfLink:"", UID:"9a74ac03-eadb-4cc1-a495-7161a34169fc", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85cf6c9888", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3", Pod:"calico-kube-controllers-85cf6c9888-jf9tj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidc2e030e1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.587 [INFO][4015] k8s.go 585: Cleaning up netns ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.587 [INFO][4015] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" iface="eth0" netns="" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.587 [INFO][4015] k8s.go 592: Releasing IP address(es) ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.587 [INFO][4015] utils.go 188: Calico CNI releasing IP address ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.604 [INFO][4025] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.604 [INFO][4025] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.604 [INFO][4025] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.611 [WARNING][4025] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.611 [INFO][4025] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.613 [INFO][4025] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:30.615721 env[1127]: 2024-04-12 18:54:30.614 [INFO][4015] k8s.go 598: Teardown processing complete. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.616178 env[1127]: time="2024-04-12T18:54:30.615760421Z" level=info msg="TearDown network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" successfully" Apr 12 18:54:30.616178 env[1127]: time="2024-04-12T18:54:30.615793353Z" level=info msg="StopPodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" returns successfully" Apr 12 18:54:30.616416 env[1127]: time="2024-04-12T18:54:30.616362872Z" level=info msg="RemovePodSandbox for \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" Apr 12 18:54:30.616469 env[1127]: time="2024-04-12T18:54:30.616415220Z" level=info msg="Forcibly stopping sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\"" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.647 [WARNING][4046] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0", GenerateName:"calico-kube-controllers-85cf6c9888-", Namespace:"calico-system", SelfLink:"", UID:"9a74ac03-eadb-4cc1-a495-7161a34169fc", ResourceVersion:"882", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 51, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"85cf6c9888", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fbdfa727cb411fdef25b1a8fd54a73a9e0cd37062afe1256ea0e7c5952c47ff3", Pod:"calico-kube-controllers-85cf6c9888-jf9tj", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calidc2e030e1ca", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.647 [INFO][4046] k8s.go 585: Cleaning up netns ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.648 [INFO][4046] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" iface="eth0" netns="" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.648 [INFO][4046] k8s.go 592: Releasing IP address(es) ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.648 [INFO][4046] utils.go 188: Calico CNI releasing IP address ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.665 [INFO][4054] ipam_plugin.go 415: Releasing address using handleID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.665 [INFO][4054] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.665 [INFO][4054] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.672 [WARNING][4054] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.672 [INFO][4054] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" HandleID="k8s-pod-network.d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Workload="localhost-k8s-calico--kube--controllers--85cf6c9888--jf9tj-eth0" Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.682 [INFO][4054] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:30.685513 env[1127]: 2024-04-12 18:54:30.684 [INFO][4046] k8s.go 598: Teardown processing complete. ContainerID="d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8" Apr 12 18:54:30.686018 env[1127]: time="2024-04-12T18:54:30.685554472Z" level=info msg="TearDown network for sandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" successfully" Apr 12 18:54:31.107318 systemd[1]: Started sshd@14-10.0.0.104:22-10.0.0.1:41440.service. Apr 12 18:54:31.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.104:22-10.0.0.1:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:31.162962 kernel: kauditd_printk_skb: 96 callbacks suppressed Apr 12 18:54:31.163131 kernel: audit: type=1130 audit(1712948071.107:1385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.104:22-10.0.0.1:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:31.193000 audit[4063]: USER_ACCT pid=4063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.194015 sshd[4063]: Accepted publickey for core from 10.0.0.1 port 41440 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:31.195761 sshd[4063]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:31.194000 audit[4063]: CRED_ACQ pid=4063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.199666 systemd-logind[1110]: New session 15 of user core. Apr 12 18:54:31.200677 systemd[1]: Started session-15.scope. Apr 12 18:54:31.201343 kernel: audit: type=1101 audit(1712948071.193:1386): pid=4063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.201414 kernel: audit: type=1103 audit(1712948071.194:1387): pid=4063 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.201450 kernel: audit: type=1006 audit(1712948071.195:1388): pid=4063 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:54:31.203601 kernel: audit: type=1300 audit(1712948071.195:1388): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19995760 a2=3 a3=0 items=0 ppid=1 pid=4063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.195000 audit[4063]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc19995760 a2=3 a3=0 items=0 ppid=1 pid=4063 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.207534 kernel: audit: type=1327 audit(1712948071.195:1388): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:31.195000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:31.208843 kernel: audit: type=1105 audit(1712948071.205:1389): pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.205000 audit[4063]: USER_START pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.206000 audit[4065]: CRED_ACQ pid=4065 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.224550 kernel: audit: type=1103 audit(1712948071.206:1390): pid=4065 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.406510 sshd[4063]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:31.407000 audit[4063]: USER_END pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.409266 systemd[1]: sshd@14-10.0.0.104:22-10.0.0.1:41440.service: Deactivated successfully. Apr 12 18:54:31.410191 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:54:31.411198 systemd-logind[1110]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:54:31.411949 systemd-logind[1110]: Removed session 15. Apr 12 18:54:31.407000 audit[4063]: CRED_DISP pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.433209 kernel: audit: type=1106 audit(1712948071.407:1391): pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.433286 kernel: audit: type=1104 audit(1712948071.407:1392): pid=4063 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:31.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.104:22-10.0.0.1:41440 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:31.486606 env[1127]: time="2024-04-12T18:54:31.486523711Z" level=info msg="RemovePodSandbox \"d7d2621a048a73fb4e4ed5e8c1eece8b34a9e494ec6eec122b88e30fae2355b8\" returns successfully" Apr 12 18:54:31.487220 env[1127]: time="2024-04-12T18:54:31.487193669Z" level=info msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.520 [WARNING][4092] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p7hwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b", Pod:"csi-node-driver-p7hwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali335e9a3c7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.520 [INFO][4092] k8s.go 585: Cleaning up netns ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.520 [INFO][4092] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" iface="eth0" netns="" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.520 [INFO][4092] k8s.go 592: Releasing IP address(es) ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.520 [INFO][4092] utils.go 188: Calico CNI releasing IP address ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.541 [INFO][4099] ipam_plugin.go 415: Releasing address using handleID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.541 [INFO][4099] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.541 [INFO][4099] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.548 [WARNING][4099] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.548 [INFO][4099] ipam_plugin.go 443: Releasing address using workloadID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.549 [INFO][4099] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.554201 env[1127]: 2024-04-12 18:54:31.552 [INFO][4092] k8s.go 598: Teardown processing complete. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.555090 env[1127]: time="2024-04-12T18:54:31.555028149Z" level=info msg="TearDown network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" successfully" Apr 12 18:54:31.555090 env[1127]: time="2024-04-12T18:54:31.555065038Z" level=info msg="StopPodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" returns successfully" Apr 12 18:54:31.555731 env[1127]: time="2024-04-12T18:54:31.555697736Z" level=info msg="RemovePodSandbox for \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" Apr 12 18:54:31.555817 env[1127]: time="2024-04-12T18:54:31.555741598Z" level=info msg="Forcibly stopping sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\"" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.593 [WARNING][4123] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--p7hwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"55f4d7e2-2a0e-4db6-bdb8-e16c25ba0d5d", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 50, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b", Pod:"csi-node-driver-p7hwv", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali335e9a3c7d0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.593 [INFO][4123] k8s.go 585: Cleaning up netns ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.593 [INFO][4123] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" iface="eth0" netns="" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.593 [INFO][4123] k8s.go 592: Releasing IP address(es) ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.593 [INFO][4123] utils.go 188: Calico CNI releasing IP address ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.619 [INFO][4130] ipam_plugin.go 415: Releasing address using handleID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.620 [INFO][4130] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.620 [INFO][4130] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.626 [WARNING][4130] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.626 [INFO][4130] ipam_plugin.go 443: Releasing address using workloadID ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" HandleID="k8s-pod-network.33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Workload="localhost-k8s-csi--node--driver--p7hwv-eth0" Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.628 [INFO][4130] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.631511 env[1127]: 2024-04-12 18:54:31.629 [INFO][4123] k8s.go 598: Teardown processing complete. ContainerID="33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0" Apr 12 18:54:31.632113 env[1127]: time="2024-04-12T18:54:31.632053567Z" level=info msg="TearDown network for sandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" successfully" Apr 12 18:54:31.635568 env[1127]: time="2024-04-12T18:54:31.635516005Z" level=info msg="RemovePodSandbox \"33701f3065262f4f541cf11e04b6e644f2b42cdcb4746336b18be71a2c3807b0\" returns successfully" Apr 12 18:54:31.636057 env[1127]: time="2024-04-12T18:54:31.636032093Z" level=info msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.669 [WARNING][4153] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--q4878-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924", Pod:"coredns-76f75df574-q4878", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2c4be31b17d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.670 [INFO][4153] k8s.go 585: Cleaning up netns ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.670 [INFO][4153] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" iface="eth0" netns="" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.670 [INFO][4153] k8s.go 592: Releasing IP address(es) ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.670 [INFO][4153] utils.go 188: Calico CNI releasing IP address ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.691 [INFO][4160] ipam_plugin.go 415: Releasing address using handleID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.691 [INFO][4160] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.691 [INFO][4160] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.698 [WARNING][4160] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.698 [INFO][4160] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.699 [INFO][4160] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.703319 env[1127]: 2024-04-12 18:54:31.701 [INFO][4153] k8s.go 598: Teardown processing complete. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.703319 env[1127]: time="2024-04-12T18:54:31.703258702Z" level=info msg="TearDown network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" successfully" Apr 12 18:54:31.703319 env[1127]: time="2024-04-12T18:54:31.703294850Z" level=info msg="StopPodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" returns successfully" Apr 12 18:54:31.704061 env[1127]: time="2024-04-12T18:54:31.703852627Z" level=info msg="RemovePodSandbox for \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" Apr 12 18:54:31.704061 env[1127]: time="2024-04-12T18:54:31.703886841Z" level=info msg="Forcibly stopping sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\"" Apr 12 18:54:31.762500 env[1127]: time="2024-04-12T18:54:31.762444773Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.765851 env[1127]: time="2024-04-12T18:54:31.765816292Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.768982 env[1127]: time="2024-04-12T18:54:31.768941518Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.773200 env[1127]: time="2024-04-12T18:54:31.770495864Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:54:31.773200 env[1127]: time="2024-04-12T18:54:31.770910976Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:7ac3827a6231c88089a78b3c48feee265627f54838c750d32163d73364a5aae1\"" Apr 12 18:54:31.773200 env[1127]: time="2024-04-12T18:54:31.772715224Z" level=info msg="CreateContainer within sandbox \"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:54:31.784986 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3840450015.mount: Deactivated successfully. Apr 12 18:54:31.787084 env[1127]: time="2024-04-12T18:54:31.787036873Z" level=info msg="CreateContainer within sandbox \"7ea9a4bb49a0b772bba6421ef7899c51805b04b417b5d2cd16e8e44c8193207b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"ba3071cdad2e7f3e449dff01005a20a7fd206d9f68153b958c59e0b20018f1ec\"" Apr 12 18:54:31.789443 env[1127]: time="2024-04-12T18:54:31.787816872Z" level=info msg="StartContainer for \"ba3071cdad2e7f3e449dff01005a20a7fd206d9f68153b958c59e0b20018f1ec\"" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.746 [WARNING][4183] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--q4878-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0f89e2ac-1034-4aa1-b8b3-ac98e875ca1a", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7add017df5b6473bc36f37487db7c0eba6f4f16f43df10c5d4a81eec1aaca924", Pod:"coredns-76f75df574-q4878", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali2c4be31b17d", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.746 [INFO][4183] k8s.go 585: Cleaning up netns ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.746 [INFO][4183] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" iface="eth0" netns="" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.746 [INFO][4183] k8s.go 592: Releasing IP address(es) ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.746 [INFO][4183] utils.go 188: Calico CNI releasing IP address ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.769 [INFO][4190] ipam_plugin.go 415: Releasing address using handleID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.769 [INFO][4190] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.769 [INFO][4190] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.777 [WARNING][4190] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.777 [INFO][4190] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" HandleID="k8s-pod-network.91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Workload="localhost-k8s-coredns--76f75df574--q4878-eth0" Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.779 [INFO][4190] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.789443 env[1127]: 2024-04-12 18:54:31.785 [INFO][4183] k8s.go 598: Teardown processing complete. ContainerID="91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f" Apr 12 18:54:31.789443 env[1127]: time="2024-04-12T18:54:31.788756953Z" level=info msg="TearDown network for sandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" successfully" Apr 12 18:54:31.793153 env[1127]: time="2024-04-12T18:54:31.793118777Z" level=info msg="RemovePodSandbox \"91914365e4a3cc085cd978d1168c753ebfcc53064b69edec8f2910da4c62070f\" returns successfully" Apr 12 18:54:31.793603 env[1127]: time="2024-04-12T18:54:31.793578222Z" level=info msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" Apr 12 18:54:31.812196 systemd[1]: run-containerd-runc-k8s.io-ba3071cdad2e7f3e449dff01005a20a7fd206d9f68153b958c59e0b20018f1ec-runc.p9wehU.mount: Deactivated successfully. Apr 12 18:54:31.815181 systemd[1]: Started cri-containerd-ba3071cdad2e7f3e449dff01005a20a7fd206d9f68153b958c59e0b20018f1ec.scope. Apr 12 18:54:31.830000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.830000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7f267c769cc8 items=0 ppid=3718 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.830000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333037316364616432653766336534343964666630313030356132 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.831000 audit: BPF prog-id=183 op=LOAD Apr 12 18:54:31.831000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003046a8 items=0 ppid=3718 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333037316364616432653766336534343964666630313030356132 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.832000 audit: BPF prog-id=184 op=LOAD Apr 12 18:54:31.832000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0003046f8 items=0 ppid=3718 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.832000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333037316364616432653766336534343964666630313030356132 Apr 12 18:54:31.835000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:54:31.835000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { perfmon } for pid=4211 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit[4211]: AVC avc: denied { bpf } for pid=4211 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:54:31.835000 audit: BPF prog-id=185 op=LOAD Apr 12 18:54:31.835000 audit[4211]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c000304788 items=0 ppid=3718 pid=4211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:31.835000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261333037316364616432653766336534343964666630313030356132 Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.861 [WARNING][4230] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2q6l5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c7932afe-95dd-418f-8c2e-8f1e3c70ef87", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a", Pod:"coredns-76f75df574-2q6l5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali235bf702ba7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.861 [INFO][4230] k8s.go 585: Cleaning up netns ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.861 [INFO][4230] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" iface="eth0" netns="" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.861 [INFO][4230] k8s.go 592: Releasing IP address(es) ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.861 [INFO][4230] utils.go 188: Calico CNI releasing IP address ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.881 [INFO][4255] ipam_plugin.go 415: Releasing address using handleID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.881 [INFO][4255] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.881 [INFO][4255] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.888 [WARNING][4255] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.888 [INFO][4255] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.889 [INFO][4255] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.892758 env[1127]: 2024-04-12 18:54:31.891 [INFO][4230] k8s.go 598: Teardown processing complete. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.893578 env[1127]: time="2024-04-12T18:54:31.892805031Z" level=info msg="TearDown network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" successfully" Apr 12 18:54:31.893578 env[1127]: time="2024-04-12T18:54:31.892854774Z" level=info msg="StopPodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" returns successfully" Apr 12 18:54:31.893692 env[1127]: time="2024-04-12T18:54:31.893649421Z" level=info msg="RemovePodSandbox for \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" Apr 12 18:54:31.893871 env[1127]: time="2024-04-12T18:54:31.893691640Z" level=info msg="Forcibly stopping sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\"" Apr 12 18:54:31.916929 env[1127]: time="2024-04-12T18:54:31.916864869Z" level=info msg="StartContainer for \"ba3071cdad2e7f3e449dff01005a20a7fd206d9f68153b958c59e0b20018f1ec\" returns successfully" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.930 [WARNING][4277] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--2q6l5-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"c7932afe-95dd-418f-8c2e-8f1e3c70ef87", ResourceVersion:"848", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 53, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"c08136617cd3040f6336391783a6482e2121b25ec36087e2ed2cbd2c80d5fa4a", Pod:"coredns-76f75df574-2q6l5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali235bf702ba7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.931 [INFO][4277] k8s.go 585: Cleaning up netns ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.931 [INFO][4277] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" iface="eth0" netns="" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.931 [INFO][4277] k8s.go 592: Releasing IP address(es) ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.931 [INFO][4277] utils.go 188: Calico CNI releasing IP address ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.949 [INFO][4288] ipam_plugin.go 415: Releasing address using handleID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.949 [INFO][4288] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.949 [INFO][4288] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.955 [WARNING][4288] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.955 [INFO][4288] ipam_plugin.go 443: Releasing address using workloadID ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" HandleID="k8s-pod-network.5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Workload="localhost-k8s-coredns--76f75df574--2q6l5-eth0" Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.956 [INFO][4288] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:54:31.959631 env[1127]: 2024-04-12 18:54:31.958 [INFO][4277] k8s.go 598: Teardown processing complete. ContainerID="5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15" Apr 12 18:54:31.959631 env[1127]: time="2024-04-12T18:54:31.959607008Z" level=info msg="TearDown network for sandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" successfully" Apr 12 18:54:31.963794 env[1127]: time="2024-04-12T18:54:31.963736074Z" level=info msg="RemovePodSandbox \"5cc5730467301132228c72f8a6957fd70262de2b4c4b26a55f395f310b4ace15\" returns successfully" Apr 12 18:54:32.656633 kubelet[1995]: I0412 18:54:32.656558 1995 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:54:32.676076 kubelet[1995]: I0412 18:54:32.676017 1995 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:54:34.810605 kernel: hrtimer: interrupt took 10696577 ns Apr 12 18:54:36.420000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.104:22-10.0.0.1:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:36.421435 systemd[1]: Started sshd@15-10.0.0.104:22-10.0.0.1:41452.service. Apr 12 18:54:36.444043 kernel: kauditd_printk_skb: 44 callbacks suppressed Apr 12 18:54:36.444216 kernel: audit: type=1130 audit(1712948076.420:1400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.104:22-10.0.0.1:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:36.517000 audit[4333]: USER_ACCT pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.521880 sshd[4333]: Accepted publickey for core from 10.0.0.1 port 41452 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:36.521000 audit[4333]: CRED_ACQ pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.526295 sshd[4333]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:36.533763 kernel: audit: type=1101 audit(1712948076.517:1401): pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.533944 kernel: audit: type=1103 audit(1712948076.521:1402): pid=4333 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.539016 kernel: audit: type=1006 audit(1712948076.521:1403): pid=4333 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:54:36.539152 kernel: audit: type=1300 audit(1712948076.521:1403): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b9e3e80 a2=3 a3=0 items=0 ppid=1 pid=4333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.521000 audit[4333]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6b9e3e80 a2=3 a3=0 items=0 ppid=1 pid=4333 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:36.544781 systemd-logind[1110]: New session 16 of user core. Apr 12 18:54:36.545557 systemd[1]: Started session-16.scope. Apr 12 18:54:36.569618 kernel: audit: type=1327 audit(1712948076.521:1403): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:36.521000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:36.593000 audit[4333]: USER_START pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.599000 audit[4335]: CRED_ACQ pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.633672 kernel: audit: type=1105 audit(1712948076.593:1404): pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.633840 kernel: audit: type=1103 audit(1712948076.599:1405): pid=4335 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.836507 sshd[4333]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:36.836000 audit[4333]: USER_END pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.845945 systemd[1]: sshd@15-10.0.0.104:22-10.0.0.1:41452.service: Deactivated successfully. Apr 12 18:54:36.846923 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:54:36.836000 audit[4333]: CRED_DISP pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.856951 systemd-logind[1110]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:54:36.858779 kernel: audit: type=1106 audit(1712948076.836:1406): pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.858901 kernel: audit: type=1104 audit(1712948076.836:1407): pid=4333 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:36.844000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.104:22-10.0.0.1:41452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:36.862225 systemd-logind[1110]: Removed session 16. Apr 12 18:54:41.836988 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:54:41.837149 kernel: audit: type=1130 audit(1712948081.832:1409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.104:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:41.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.104:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:41.834113 systemd[1]: Started sshd@16-10.0.0.104:22-10.0.0.1:36660.service. Apr 12 18:54:41.862000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.862000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f63a0 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.879708 kernel: audit: type=1400 audit(1712948081.862:1410): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.879886 kernel: audit: type=1300 audit(1712948081.862:1410): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0023f63a0 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.862000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.885999 kernel: audit: type=1327 audit(1712948081.862:1410): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.874000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.889977 sshd[4347]: Accepted publickey for core from 10.0.0.1 port 36660 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:41.892353 sshd[4347]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:41.895230 kernel: audit: type=1400 audit(1712948081.874:1411): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.895384 kernel: audit: type=1300 audit(1712948081.874:1411): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002797280 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.874000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002797280 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.874000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.899930 systemd-logind[1110]: New session 17 of user core. Apr 12 18:54:41.901128 systemd[1]: Started session-17.scope. Apr 12 18:54:41.906612 kernel: audit: type=1327 audit(1712948081.874:1411): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.906762 kernel: audit: type=1400 audit(1712948081.875:1412): avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.875000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.910664 kernel: audit: type=1300 audit(1712948081.875:1412): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002797420 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.875000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002797420 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.916141 kernel: audit: type=1327 audit(1712948081.875:1412): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.875000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.876000 audit[1866]: AVC avc: denied { watch } for pid=1866 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:54:41.876000 audit[1866]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026aeb00 a2=fc6 a3=0 items=0 ppid=1711 pid=1866 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c27,c454 key=(null) Apr 12 18:54:41.876000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:54:41.887000 audit[4347]: USER_ACCT pid=4347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:41.890000 audit[4347]: CRED_ACQ pid=4347 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:41.890000 audit[4347]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9ad2e60 a2=3 a3=0 items=0 ppid=1 pid=4347 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:41.890000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:41.913000 audit[4347]: USER_START pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:41.916000 audit[4349]: CRED_ACQ pid=4349 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:42.089000 audit[4347]: USER_END pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:42.089249 sshd[4347]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:42.089000 audit[4347]: CRED_DISP pid=4347 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:42.093081 systemd[1]: sshd@16-10.0.0.104:22-10.0.0.1:36660.service: Deactivated successfully. Apr 12 18:54:42.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.104:22-10.0.0.1:36660 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:42.094088 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:54:42.102329 systemd-logind[1110]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:54:42.114476 systemd-logind[1110]: Removed session 17. Apr 12 18:54:47.098715 systemd[1]: Started sshd@17-10.0.0.104:22-10.0.0.1:36674.service. Apr 12 18:54:47.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.104:22-10.0.0.1:36674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:47.103720 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:54:47.103907 kernel: audit: type=1130 audit(1712948087.098:1422): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.104:22-10.0.0.1:36674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:47.148000 audit[4369]: USER_ACCT pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.150339 sshd[4369]: Accepted publickey for core from 10.0.0.1 port 36674 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:47.153027 sshd[4369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:47.148000 audit[4369]: CRED_ACQ pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.162107 kernel: audit: type=1101 audit(1712948087.148:1423): pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.162236 kernel: audit: type=1103 audit(1712948087.148:1424): pid=4369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.162312 kernel: audit: type=1006 audit(1712948087.148:1425): pid=4369 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Apr 12 18:54:47.148000 audit[4369]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffc92ec30 a2=3 a3=0 items=0 ppid=1 pid=4369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.166733 systemd-logind[1110]: New session 18 of user core. Apr 12 18:54:47.168512 systemd[1]: Started session-18.scope. Apr 12 18:54:47.171915 kernel: audit: type=1300 audit(1712948087.148:1425): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffffc92ec30 a2=3 a3=0 items=0 ppid=1 pid=4369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:47.172047 kernel: audit: type=1327 audit(1712948087.148:1425): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:47.148000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:47.190000 audit[4369]: USER_START pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.192000 audit[4371]: CRED_ACQ pid=4371 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.206926 kernel: audit: type=1105 audit(1712948087.190:1426): pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.207180 kernel: audit: type=1103 audit(1712948087.192:1427): pid=4371 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.322949 sshd[4369]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:47.323000 audit[4369]: USER_END pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.327056 systemd[1]: sshd@17-10.0.0.104:22-10.0.0.1:36674.service: Deactivated successfully. Apr 12 18:54:47.328091 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:54:47.329652 systemd-logind[1110]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:54:47.323000 audit[4369]: CRED_DISP pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.331306 systemd-logind[1110]: Removed session 18. Apr 12 18:54:47.335989 kernel: audit: type=1106 audit(1712948087.323:1428): pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.336191 kernel: audit: type=1104 audit(1712948087.323:1429): pid=4369 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:47.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.104:22-10.0.0.1:36674 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:48.572918 kubelet[1995]: E0412 18:54:48.572873 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:52.329165 systemd[1]: Started sshd@18-10.0.0.104:22-10.0.0.1:53394.service. Apr 12 18:54:52.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.104:22-10.0.0.1:53394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.330659 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:54:52.330731 kernel: audit: type=1130 audit(1712948092.328:1431): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.104:22-10.0.0.1:53394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.370000 audit[4406]: USER_ACCT pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.370901 sshd[4406]: Accepted publickey for core from 10.0.0.1 port 53394 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:52.375443 kernel: audit: type=1101 audit(1712948092.370:1432): pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.384514 kernel: audit: type=1103 audit(1712948092.375:1433): pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.384569 kernel: audit: type=1006 audit(1712948092.375:1434): pid=4406 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Apr 12 18:54:52.384601 kernel: audit: type=1300 audit(1712948092.375:1434): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1c6a7820 a2=3 a3=0 items=0 ppid=1 pid=4406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:52.375000 audit[4406]: CRED_ACQ pid=4406 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.375000 audit[4406]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd1c6a7820 a2=3 a3=0 items=0 ppid=1 pid=4406 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:52.376135 sshd[4406]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:52.380742 systemd-logind[1110]: New session 19 of user core. Apr 12 18:54:52.381992 systemd[1]: Started session-19.scope. Apr 12 18:54:52.386269 kernel: audit: type=1327 audit(1712948092.375:1434): proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:52.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:52.386000 audit[4406]: USER_START pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.392030 kernel: audit: type=1105 audit(1712948092.386:1435): pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.392096 kernel: audit: type=1103 audit(1712948092.388:1436): pid=4408 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.388000 audit[4408]: CRED_ACQ pid=4408 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.498070 sshd[4406]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:52.499000 audit[4406]: USER_END pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.504484 kernel: audit: type=1106 audit(1712948092.499:1437): pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.501785 systemd[1]: sshd@18-10.0.0.104:22-10.0.0.1:53394.service: Deactivated successfully. Apr 12 18:54:52.502491 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:54:52.503187 systemd-logind[1110]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:54:52.504363 systemd[1]: Started sshd@19-10.0.0.104:22-10.0.0.1:53408.service. Apr 12 18:54:52.499000 audit[4406]: CRED_DISP pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.501000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.104:22-10.0.0.1:53394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.104:22-10.0.0.1:53408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:52.509435 kernel: audit: type=1104 audit(1712948092.499:1438): pid=4406 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.509884 systemd-logind[1110]: Removed session 19. Apr 12 18:54:52.544000 audit[4419]: USER_ACCT pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.545064 sshd[4419]: Accepted publickey for core from 10.0.0.1 port 53408 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:52.545000 audit[4419]: CRED_ACQ pid=4419 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.545000 audit[4419]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdc9e96c60 a2=3 a3=0 items=0 ppid=1 pid=4419 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:52.545000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:52.546531 sshd[4419]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:52.550548 systemd-logind[1110]: New session 20 of user core. Apr 12 18:54:52.551682 systemd[1]: Started session-20.scope. Apr 12 18:54:52.556000 audit[4419]: USER_START pid=4419 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:52.557000 audit[4421]: CRED_ACQ pid=4421 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.572844 kubelet[1995]: E0412 18:54:53.572806 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:54:53.615220 sshd[4419]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:53.616000 audit[4419]: USER_END pid=4419 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.616000 audit[4419]: CRED_DISP pid=4419 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.619073 systemd[1]: Started sshd@20-10.0.0.104:22-10.0.0.1:53418.service. Apr 12 18:54:53.618000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.104:22-10.0.0.1:53418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:53.619574 systemd[1]: sshd@19-10.0.0.104:22-10.0.0.1:53408.service: Deactivated successfully. Apr 12 18:54:53.619000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.104:22-10.0.0.1:53408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:53.620722 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:54:53.621251 systemd-logind[1110]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:54:53.622246 systemd-logind[1110]: Removed session 20. Apr 12 18:54:53.661000 audit[4430]: USER_ACCT pid=4430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.662203 sshd[4430]: Accepted publickey for core from 10.0.0.1 port 53418 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:53.662000 audit[4430]: CRED_ACQ pid=4430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.662000 audit[4430]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff4d8d3270 a2=3 a3=0 items=0 ppid=1 pid=4430 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:53.662000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:53.663636 sshd[4430]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:53.668337 systemd-logind[1110]: New session 21 of user core. Apr 12 18:54:53.669546 systemd[1]: Started session-21.scope. Apr 12 18:54:53.674000 audit[4430]: USER_START pid=4430 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:53.676000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.490000 audit[4459]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:55.490000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffd78795280 a2=0 a3=7ffd7879526c items=0 ppid=2200 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.490000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:55.491000 audit[4459]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4459 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:55.491000 audit[4459]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffd78795280 a2=0 a3=0 items=0 ppid=2200 pid=4459 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.491000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:55.505417 sshd[4430]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:55.506000 audit[4430]: USER_END pid=4430 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.507000 audit[4430]: CRED_DISP pid=4430 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.509850 systemd[1]: Started sshd@21-10.0.0.104:22-10.0.0.1:53420.service. Apr 12 18:54:55.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.104:22-10.0.0.1:53420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:55.511108 systemd[1]: sshd@20-10.0.0.104:22-10.0.0.1:53418.service: Deactivated successfully. Apr 12 18:54:55.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.104:22-10.0.0.1:53418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:55.512045 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:54:55.512902 systemd-logind[1110]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:54:55.514110 systemd-logind[1110]: Removed session 21. Apr 12 18:54:55.515000 audit[4462]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:55.515000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=11860 a0=3 a1=7ffc3d5660a0 a2=0 a3=7ffc3d56608c items=0 ppid=2200 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.515000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:55.516000 audit[4462]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4462 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:54:55.516000 audit[4462]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffc3d5660a0 a2=0 a3=0 items=0 ppid=2200 pid=4462 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.516000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:54:55.551155 sshd[4463]: Accepted publickey for core from 10.0.0.1 port 53420 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:55.550000 audit[4463]: USER_ACCT pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.551000 audit[4463]: CRED_ACQ pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.551000 audit[4463]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd71a99a90 a2=3 a3=0 items=0 ppid=1 pid=4463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:55.552347 sshd[4463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:55.558178 systemd[1]: Started session-22.scope. Apr 12 18:54:55.558790 systemd-logind[1110]: New session 22 of user core. Apr 12 18:54:55.565000 audit[4463]: USER_START pid=4463 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.567000 audit[4466]: CRED_ACQ pid=4466 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.830854 sshd[4463]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:55.833000 audit[4463]: USER_END pid=4463 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.833000 audit[4463]: CRED_DISP pid=4463 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.836480 systemd-logind[1110]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:54:55.838045 systemd[1]: Started sshd@22-10.0.0.104:22-10.0.0.1:53428.service. Apr 12 18:54:55.838780 systemd[1]: sshd@21-10.0.0.104:22-10.0.0.1:53420.service: Deactivated successfully. Apr 12 18:54:55.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.104:22-10.0.0.1:53428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:55.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.104:22-10.0.0.1:53420 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:55.840079 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:54:55.841359 systemd-logind[1110]: Removed session 22. Apr 12 18:54:55.882000 audit[4474]: USER_ACCT pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.884164 sshd[4474]: Accepted publickey for core from 10.0.0.1 port 53428 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:54:55.885000 audit[4474]: CRED_ACQ pid=4474 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.886000 audit[4474]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdbf3a0b70 a2=3 a3=0 items=0 ppid=1 pid=4474 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:54:55.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:54:55.887470 sshd[4474]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:54:55.893508 systemd-logind[1110]: New session 23 of user core. Apr 12 18:54:55.894810 systemd[1]: Started session-23.scope. Apr 12 18:54:55.901000 audit[4474]: USER_START pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:55.903000 audit[4477]: CRED_ACQ pid=4477 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:56.043601 sshd[4474]: pam_unix(sshd:session): session closed for user core Apr 12 18:54:56.044000 audit[4474]: USER_END pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:56.044000 audit[4474]: CRED_DISP pid=4474 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:54:56.046751 systemd[1]: sshd@22-10.0.0.104:22-10.0.0.1:53428.service: Deactivated successfully. Apr 12 18:54:56.046000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.104:22-10.0.0.1:53428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:54:56.047920 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:54:56.048661 systemd-logind[1110]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:54:56.049605 systemd-logind[1110]: Removed session 23. Apr 12 18:54:57.455270 systemd[1]: run-containerd-runc-k8s.io-9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586-runc.mUXSlc.mount: Deactivated successfully. Apr 12 18:55:01.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.104:22-10.0.0.1:44076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.048030 systemd[1]: Started sshd@23-10.0.0.104:22-10.0.0.1:44076.service. Apr 12 18:55:01.049805 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:55:01.049878 kernel: audit: type=1130 audit(1712948101.046:1480): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.104:22-10.0.0.1:44076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.087000 audit[4513]: USER_ACCT pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.089515 sshd[4513]: Accepted publickey for core from 10.0.0.1 port 44076 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:55:01.093235 sshd[4513]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:01.091000 audit[4513]: CRED_ACQ pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.099456 kernel: audit: type=1101 audit(1712948101.087:1481): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.099549 kernel: audit: type=1103 audit(1712948101.091:1482): pid=4513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.099577 kernel: audit: type=1006 audit(1712948101.091:1483): pid=4513 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:55:01.098960 systemd-logind[1110]: New session 24 of user core. Apr 12 18:55:01.099431 systemd[1]: Started session-24.scope. Apr 12 18:55:01.091000 audit[4513]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5e06d90 a2=3 a3=0 items=0 ppid=1 pid=4513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:01.107446 kernel: audit: type=1300 audit(1712948101.091:1483): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdf5e06d90 a2=3 a3=0 items=0 ppid=1 pid=4513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:01.107605 kernel: audit: type=1327 audit(1712948101.091:1483): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:01.091000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:01.109170 kernel: audit: type=1105 audit(1712948101.103:1484): pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.103000 audit[4513]: USER_START pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.105000 audit[4515]: CRED_ACQ pid=4515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.119021 kernel: audit: type=1103 audit(1712948101.105:1485): pid=4515 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.218669 sshd[4513]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:01.218000 audit[4513]: USER_END pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.221557 systemd[1]: sshd@23-10.0.0.104:22-10.0.0.1:44076.service: Deactivated successfully. Apr 12 18:55:01.222569 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:55:01.218000 audit[4513]: CRED_DISP pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.228797 kernel: audit: type=1106 audit(1712948101.218:1486): pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.228959 kernel: audit: type=1104 audit(1712948101.218:1487): pid=4513 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:01.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.104:22-10.0.0.1:44076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:01.229613 systemd-logind[1110]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:55:01.230540 systemd-logind[1110]: Removed session 24. Apr 12 18:55:03.572635 kubelet[1995]: E0412 18:55:03.572576 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:55:04.219087 systemd[1]: run-containerd-runc-k8s.io-9b70224798560fb205dc6328ec2271cd781f14ba273858476ebc9116bfb1a586-runc.Tofns5.mount: Deactivated successfully. Apr 12 18:55:04.668000 audit[4549]: NETFILTER_CFG table=filter:117 family=2 entries=20 op=nft_register_rule pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:04.668000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffde49ca3c0 a2=0 a3=7ffde49ca3ac items=0 ppid=2200 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:04.668000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:04.670000 audit[4549]: NETFILTER_CFG table=nat:118 family=2 entries=104 op=nft_register_chain pid=4549 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:04.670000 audit[4549]: SYSCALL arch=c000003e syscall=46 success=yes exit=48684 a0=3 a1=7ffde49ca3c0 a2=0 a3=7ffde49ca3ac items=0 ppid=2200 pid=4549 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:04.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:06.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.104:22-10.0.0.1:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:06.240131 systemd[1]: Started sshd@24-10.0.0.104:22-10.0.0.1:44090.service. Apr 12 18:55:06.241660 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:55:06.241727 kernel: audit: type=1130 audit(1712948106.238:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.104:22-10.0.0.1:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:06.310000 audit[4552]: USER_ACCT pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.311000 audit[4552]: CRED_ACQ pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.314271 sshd[4552]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:06.318049 sshd[4552]: Accepted publickey for core from 10.0.0.1 port 44090 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:55:06.323168 kernel: audit: type=1101 audit(1712948106.310:1492): pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.323285 kernel: audit: type=1103 audit(1712948106.311:1493): pid=4552 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.323322 kernel: audit: type=1006 audit(1712948106.311:1494): pid=4552 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Apr 12 18:55:06.328446 kernel: audit: type=1300 audit(1712948106.311:1494): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a271120 a2=3 a3=0 items=0 ppid=1 pid=4552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:06.311000 audit[4552]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd0a271120 a2=3 a3=0 items=0 ppid=1 pid=4552 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:06.328908 systemd-logind[1110]: New session 25 of user core. Apr 12 18:55:06.331328 systemd[1]: Started session-25.scope. Apr 12 18:55:06.341084 kernel: audit: type=1327 audit(1712948106.311:1494): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:06.311000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:06.390000 audit[4552]: USER_START pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.393000 audit[4554]: CRED_ACQ pid=4554 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.407361 kernel: audit: type=1105 audit(1712948106.390:1495): pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.407526 kernel: audit: type=1103 audit(1712948106.393:1496): pid=4554 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.532958 sshd[4552]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:06.534000 audit[4552]: USER_END pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.538499 systemd[1]: sshd@24-10.0.0.104:22-10.0.0.1:44090.service: Deactivated successfully. Apr 12 18:55:06.539514 systemd[1]: session-25.scope: Deactivated successfully. Apr 12 18:55:06.541795 systemd-logind[1110]: Session 25 logged out. Waiting for processes to exit. Apr 12 18:55:06.534000 audit[4552]: CRED_DISP pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.549325 kernel: audit: type=1106 audit(1712948106.534:1497): pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.549500 kernel: audit: type=1104 audit(1712948106.534:1498): pid=4552 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:06.537000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.0.0.104:22-10.0.0.1:44090 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:06.551072 systemd-logind[1110]: Removed session 25. Apr 12 18:55:10.485000 audit[4570]: NETFILTER_CFG table=filter:119 family=2 entries=9 op=nft_register_rule pid=4570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:10.485000 audit[4570]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc48c5fc40 a2=0 a3=7ffc48c5fc2c items=0 ppid=2200 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.485000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:10.487000 audit[4570]: NETFILTER_CFG table=nat:120 family=2 entries=44 op=nft_register_rule pid=4570 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:10.487000 audit[4570]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffc48c5fc40 a2=0 a3=7ffc48c5fc2c items=0 ppid=2200 pid=4570 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:10.502083 kubelet[1995]: I0412 18:55:10.502045 1995 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-p7hwv" podStartSLOduration=71.082049936 podStartE2EDuration="1m20.501968808s" podCreationTimestamp="2024-04-12 18:53:50 +0000 UTC" firstStartedPulling="2024-04-12 18:54:22.351521201 +0000 UTC m=+51.886874238" lastFinishedPulling="2024-04-12 18:54:31.771440083 +0000 UTC m=+61.306793110" observedRunningTime="2024-04-12 18:54:32.839785324 +0000 UTC m=+62.375138361" watchObservedRunningTime="2024-04-12 18:55:10.501968808 +0000 UTC m=+100.037321845" Apr 12 18:55:10.502859 kubelet[1995]: I0412 18:55:10.502839 1995 topology_manager.go:215] "Topology Admit Handler" podUID="f3f6d6f4-7ae6-410f-b9f5-bc02471acea0" podNamespace="calico-apiserver" podName="calico-apiserver-56b65bdc7f-c42kc" Apr 12 18:55:10.517235 systemd[1]: Created slice kubepods-besteffort-podf3f6d6f4_7ae6_410f_b9f5_bc02471acea0.slice. Apr 12 18:55:10.525000 audit[4572]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:10.525000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe4f9431a0 a2=0 a3=7ffe4f94318c items=0 ppid=2200 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.525000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:10.527000 audit[4572]: NETFILTER_CFG table=nat:122 family=2 entries=44 op=nft_register_rule pid=4572 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:10.527000 audit[4572]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffe4f9431a0 a2=0 a3=7ffe4f94318c items=0 ppid=2200 pid=4572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:10.527000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:10.534597 kubelet[1995]: I0412 18:55:10.534561 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4r6dd\" (UniqueName: \"kubernetes.io/projected/f3f6d6f4-7ae6-410f-b9f5-bc02471acea0-kube-api-access-4r6dd\") pod \"calico-apiserver-56b65bdc7f-c42kc\" (UID: \"f3f6d6f4-7ae6-410f-b9f5-bc02471acea0\") " pod="calico-apiserver/calico-apiserver-56b65bdc7f-c42kc" Apr 12 18:55:10.535551 kubelet[1995]: I0412 18:55:10.535531 1995 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f3f6d6f4-7ae6-410f-b9f5-bc02471acea0-calico-apiserver-certs\") pod \"calico-apiserver-56b65bdc7f-c42kc\" (UID: \"f3f6d6f4-7ae6-410f-b9f5-bc02471acea0\") " pod="calico-apiserver/calico-apiserver-56b65bdc7f-c42kc" Apr 12 18:55:10.636805 kubelet[1995]: E0412 18:55:10.636753 1995 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:55:10.638922 kubelet[1995]: E0412 18:55:10.638874 1995 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f3f6d6f4-7ae6-410f-b9f5-bc02471acea0-calico-apiserver-certs podName:f3f6d6f4-7ae6-410f-b9f5-bc02471acea0 nodeName:}" failed. No retries permitted until 2024-04-12 18:55:11.1371084 +0000 UTC m=+100.672461437 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f3f6d6f4-7ae6-410f-b9f5-bc02471acea0-calico-apiserver-certs") pod "calico-apiserver-56b65bdc7f-c42kc" (UID: "f3f6d6f4-7ae6-410f-b9f5-bc02471acea0") : secret "calico-apiserver-certs" not found Apr 12 18:55:11.427073 env[1127]: time="2024-04-12T18:55:11.423799909Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-56b65bdc7f-c42kc,Uid:f3f6d6f4-7ae6-410f-b9f5-bc02471acea0,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:55:11.546549 kernel: kauditd_printk_skb: 13 callbacks suppressed Apr 12 18:55:11.546727 kernel: audit: type=1130 audit(1712948111.543:1504): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.104:22-10.0.0.1:53354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.104:22-10.0.0.1:53354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.544353 systemd[1]: Started sshd@25-10.0.0.104:22-10.0.0.1:53354.service. Apr 12 18:55:11.617000 audit[4590]: USER_ACCT pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.628583 sshd[4590]: Accepted publickey for core from 10.0.0.1 port 53354 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:55:11.630329 sshd[4590]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:11.627000 audit[4590]: CRED_ACQ pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.646928 kernel: audit: type=1101 audit(1712948111.617:1505): pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.647122 kernel: audit: type=1103 audit(1712948111.627:1506): pid=4590 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.647150 kernel: audit: type=1006 audit(1712948111.627:1507): pid=4590 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Apr 12 18:55:11.627000 audit[4590]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49e7f540 a2=3 a3=0 items=0 ppid=1 pid=4590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.649546 systemd[1]: Started session-26.scope. Apr 12 18:55:11.650106 systemd-logind[1110]: New session 26 of user core. Apr 12 18:55:11.657031 kernel: audit: type=1300 audit(1712948111.627:1507): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe49e7f540 a2=3 a3=0 items=0 ppid=1 pid=4590 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.627000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:11.660709 kernel: audit: type=1327 audit(1712948111.627:1507): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:11.654000 audit[4590]: USER_START pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.658000 audit[4599]: CRED_ACQ pid=4599 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.674900 kernel: audit: type=1105 audit(1712948111.654:1508): pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.675075 kernel: audit: type=1103 audit(1712948111.658:1509): pid=4599 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.746241 systemd-networkd[1023]: calidd7e368f696: Link UP Apr 12 18:55:11.755024 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:55:11.755193 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calidd7e368f696: link becomes ready Apr 12 18:55:11.754539 systemd-networkd[1023]: calidd7e368f696: Gained carrier Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.536 [INFO][4575] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0 calico-apiserver-56b65bdc7f- calico-apiserver f3f6d6f4-7ae6-410f-b9f5-bc02471acea0 1144 0 2024-04-12 18:55:10 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:56b65bdc7f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-56b65bdc7f-c42kc eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calidd7e368f696 [] []}} ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.536 [INFO][4575] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.601 [INFO][4591] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" HandleID="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Workload="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.651 [INFO][4591] ipam_plugin.go 268: Auto assigning IP ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" HandleID="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Workload="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051600), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-56b65bdc7f-c42kc", "timestamp":"2024-04-12 18:55:11.600996323 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.651 [INFO][4591] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.651 [INFO][4591] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.651 [INFO][4591] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.655 [INFO][4591] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.662 [INFO][4591] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.687 [INFO][4591] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.691 [INFO][4591] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.702 [INFO][4591] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.702 [INFO][4591] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.709 [INFO][4591] ipam.go 1682: Creating new handle: k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0 Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.717 [INFO][4591] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.731 [INFO][4591] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.731 [INFO][4591] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" host="localhost" Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.731 [INFO][4591] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:55:11.787620 env[1127]: 2024-04-12 18:55:11.731 [INFO][4591] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" HandleID="k8s-pod-network.19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Workload="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.738 [INFO][4575] k8s.go 385: Populated endpoint ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0", GenerateName:"calico-apiserver-56b65bdc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3f6d6f4-7ae6-410f-b9f5-bc02471acea0", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"56b65bdc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-56b65bdc7f-c42kc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidd7e368f696", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.738 [INFO][4575] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.738 [INFO][4575] dataplane_linux.go 68: Setting the host side veth name to calidd7e368f696 ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.755 [INFO][4575] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.756 [INFO][4575] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0", GenerateName:"calico-apiserver-56b65bdc7f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f3f6d6f4-7ae6-410f-b9f5-bc02471acea0", ResourceVersion:"1144", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 55, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"56b65bdc7f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0", Pod:"calico-apiserver-56b65bdc7f-c42kc", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calidd7e368f696", MAC:"ba:cc:c8:71:90:32", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:55:11.788775 env[1127]: 2024-04-12 18:55:11.779 [INFO][4575] k8s.go 498: Wrote updated endpoint to datastore ContainerID="19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0" Namespace="calico-apiserver" Pod="calico-apiserver-56b65bdc7f-c42kc" WorkloadEndpoint="localhost-k8s-calico--apiserver--56b65bdc7f--c42kc-eth0" Apr 12 18:55:11.825830 env[1127]: time="2024-04-12T18:55:11.825737526Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:55:11.826407 env[1127]: time="2024-04-12T18:55:11.826105765Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:55:11.827082 env[1127]: time="2024-04-12T18:55:11.826515332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:55:11.827464 env[1127]: time="2024-04-12T18:55:11.827429817Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0 pid=4630 runtime=io.containerd.runc.v2 Apr 12 18:55:11.851374 sshd[4590]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:11.857000 audit[4590]: USER_END pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.861462 systemd[1]: sshd@25-10.0.0.104:22-10.0.0.1:53354.service: Deactivated successfully. Apr 12 18:55:11.864436 kernel: audit: type=1106 audit(1712948111.857:1510): pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.857000 audit[4590]: CRED_DISP pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.867478 systemd[1]: run-containerd-runc-k8s.io-19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0-runc.Nrmn3L.mount: Deactivated successfully. Apr 12 18:55:11.868324 systemd[1]: session-26.scope: Deactivated successfully. Apr 12 18:55:11.860000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.0.0.104:22-10.0.0.1:53354 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:11.871430 kernel: audit: type=1104 audit(1712948111.857:1511): pid=4590 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:11.874930 systemd-logind[1110]: Session 26 logged out. Waiting for processes to exit. Apr 12 18:55:11.875328 systemd[1]: Started cri-containerd-19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0.scope. Apr 12 18:55:11.880373 systemd-logind[1110]: Removed session 26. Apr 12 18:55:11.882000 audit[4653]: NETFILTER_CFG table=filter:123 family=2 entries=61 op=nft_register_chain pid=4653 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:55:11.882000 audit[4653]: SYSCALL arch=c000003e syscall=46 success=yes exit=31788 a0=3 a1=7ffdf998fa80 a2=0 a3=7ffdf998fa6c items=0 ppid=3073 pid=4653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.882000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit: BPF prog-id=186 op=LOAD Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=4630 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653161656534636434663238313864356663353135613839373966 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=4630 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653161656534636434663238313864356663353135613839373966 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.906000 audit: BPF prog-id=187 op=LOAD Apr 12 18:55:11.906000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0002208f0 items=0 ppid=4630 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.906000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653161656534636434663238313864356663353135613839373966 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.912000 audit: BPF prog-id=188 op=LOAD Apr 12 18:55:11.912000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000220938 items=0 ppid=4630 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653161656534636434663238313864356663353135613839373966 Apr 12 18:55:11.915000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:55:11.915000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { perfmon } for pid=4639 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit[4639]: AVC avc: denied { bpf } for pid=4639 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:11.915000 audit: BPF prog-id=189 op=LOAD Apr 12 18:55:11.915000 audit[4639]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000220d48 items=0 ppid=4630 pid=4639 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:11.915000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139653161656534636434663238313864356663353135613839373966 Apr 12 18:55:11.924177 systemd-resolved[1067]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:55:11.988757 env[1127]: time="2024-04-12T18:55:11.986319787Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-56b65bdc7f-c42kc,Uid:f3f6d6f4-7ae6-410f-b9f5-bc02471acea0,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0\"" Apr 12 18:55:11.992879 env[1127]: time="2024-04-12T18:55:11.992813929Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:55:12.995725 systemd-networkd[1023]: calidd7e368f696: Gained IPv6LL Apr 12 18:55:13.480764 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3709366793.mount: Deactivated successfully. Apr 12 18:55:13.573840 kubelet[1995]: E0412 18:55:13.573222 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:55:16.093336 env[1127]: time="2024-04-12T18:55:16.093270327Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:16.098539 env[1127]: time="2024-04-12T18:55:16.098329274Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:16.103305 env[1127]: time="2024-04-12T18:55:16.103242957Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:16.106541 env[1127]: time="2024-04-12T18:55:16.106473939Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:55:16.107527 env[1127]: time="2024-04-12T18:55:16.107191589Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:b1053ac6a81e8635acaa253516add87a758796b61fa4e29b767a8bd31e4b3eb2\"" Apr 12 18:55:16.112598 env[1127]: time="2024-04-12T18:55:16.112532942Z" level=info msg="CreateContainer within sandbox \"19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:55:16.145733 env[1127]: time="2024-04-12T18:55:16.145632971Z" level=info msg="CreateContainer within sandbox \"19e1aee4cd4f2818d5fc515a8979f80886721c605d8a66797f5d134a894e12b0\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"01626943e4561eeca14e222ba147afdf1e3690856d26ad34000318b4642a5f21\"" Apr 12 18:55:16.146632 env[1127]: time="2024-04-12T18:55:16.146590055Z" level=info msg="StartContainer for \"01626943e4561eeca14e222ba147afdf1e3690856d26ad34000318b4642a5f21\"" Apr 12 18:55:16.186703 systemd[1]: Started cri-containerd-01626943e4561eeca14e222ba147afdf1e3690856d26ad34000318b4642a5f21.scope. Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.215000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.216000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.216000 audit: BPF prog-id=190 op=LOAD Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000227c48 a2=10 a3=1c items=0 ppid=4630 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363236393433653435363165656361313465323232626131343761 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0002276b0 a2=3c a3=8 items=0 ppid=4630 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363236393433653435363165656361313465323232626131343761 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.217000 audit: BPF prog-id=191 op=LOAD Apr 12 18:55:16.217000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0002279d8 a2=78 a3=c000388410 items=0 ppid=4630 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.217000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363236393433653435363165656361313465323232626131343761 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.218000 audit: BPF prog-id=192 op=LOAD Apr 12 18:55:16.218000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000227770 a2=78 a3=c000388458 items=0 ppid=4630 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.218000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363236393433653435363165656361313465323232626131343761 Apr 12 18:55:16.219000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:55:16.219000 audit: BPF prog-id=191 op=UNLOAD Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { perfmon } for pid=4685 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit[4685]: AVC avc: denied { bpf } for pid=4685 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:55:16.219000 audit: BPF prog-id=193 op=LOAD Apr 12 18:55:16.219000 audit[4685]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000227c30 a2=78 a3=c000388868 items=0 ppid=4630 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.219000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3031363236393433653435363165656361313465323232626131343761 Apr 12 18:55:16.277032 env[1127]: time="2024-04-12T18:55:16.276963611Z" level=info msg="StartContainer for \"01626943e4561eeca14e222ba147afdf1e3690856d26ad34000318b4642a5f21\" returns successfully" Apr 12 18:55:16.650144 kernel: kauditd_printk_skb: 118 callbacks suppressed Apr 12 18:55:16.650348 kernel: audit: type=1325 audit(1712948116.646:1550): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.646000 audit[4716]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.646000 audit[4716]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff8cbbd490 a2=0 a3=7fff8cbbd47c items=0 ppid=2200 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.660741 kernel: audit: type=1300 audit(1712948116.646:1550): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7fff8cbbd490 a2=0 a3=7fff8cbbd47c items=0 ppid=2200 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.660941 kernel: audit: type=1327 audit(1712948116.646:1550): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:16.646000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:16.649000 audit[4716]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.649000 audit[4716]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7fff8cbbd490 a2=0 a3=7fff8cbbd47c items=0 ppid=2200 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.675257 kernel: audit: type=1325 audit(1712948116.649:1551): table=nat:125 family=2 entries=44 op=nft_register_rule pid=4716 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.675480 kernel: audit: type=1300 audit(1712948116.649:1551): arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7fff8cbbd490 a2=0 a3=7fff8cbbd47c items=0 ppid=2200 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.675551 kernel: audit: type=1327 audit(1712948116.649:1551): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:16.649000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:16.856973 kernel: audit: type=1400 audit(1712948116.840:1552): avc: denied { watch } for pid=4696 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_55_11.400235292/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c288 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c213,c288 tclass=file permissive=0 Apr 12 18:55:16.857173 kernel: audit: type=1300 audit(1712948116.840:1552): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aaca80 a2=fc6 a3=0 items=0 ppid=4630 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c288 key=(null) Apr 12 18:55:16.840000 audit[4696]: AVC avc: denied { watch } for pid=4696 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_55_11.400235292/tls.crt" dev="tmpfs" ino=4 scontext=system_u:system_r:svirt_lxc_net_t:s0:c213,c288 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c213,c288 tclass=file permissive=0 Apr 12 18:55:16.840000 audit[4696]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000aaca80 a2=fc6 a3=0 items=0 ppid=4630 pid=4696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c213,c288 key=(null) Apr 12 18:55:16.840000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:55:16.863437 kernel: audit: type=1327 audit(1712948116.840:1552): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:55:16.866009 systemd[1]: Started sshd@26-10.0.0.104:22-10.0.0.1:53370.service. Apr 12 18:55:16.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.104:22-10.0.0.1:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:16.873529 kernel: audit: type=1130 audit(1712948116.864:1553): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.104:22-10.0.0.1:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:16.925383 sshd[4718]: Accepted publickey for core from 10.0.0.1 port 53370 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:55:16.923000 audit[4718]: USER_ACCT pid=4718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:16.925000 audit[4718]: CRED_ACQ pid=4718 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:16.925000 audit[4718]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe94fd3fe0 a2=3 a3=0 items=0 ppid=1 pid=4718 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.925000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:16.927766 sshd[4718]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:16.936054 systemd[1]: Started session-27.scope. Apr 12 18:55:16.936617 systemd-logind[1110]: New session 27 of user core. Apr 12 18:55:16.948000 audit[4718]: USER_START pid=4718 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:16.950000 audit[4722]: CRED_ACQ pid=4722 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:16.972000 audit[4724]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.972000 audit[4724]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe7dfc9610 a2=0 a3=7ffe7dfc95fc items=0 ppid=2200 pid=4724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.972000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:16.974000 audit[4724]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:55:16.974000 audit[4724]: SYSCALL arch=c000003e syscall=46 success=yes exit=14988 a0=3 a1=7ffe7dfc9610 a2=0 a3=7ffe7dfc95fc items=0 ppid=2200 pid=4724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:16.974000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:55:17.086036 sshd[4718]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:17.085000 audit[4718]: USER_END pid=4718 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:17.085000 audit[4718]: CRED_DISP pid=4718 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:17.089413 systemd[1]: sshd@26-10.0.0.104:22-10.0.0.1:53370.service: Deactivated successfully. Apr 12 18:55:17.088000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.0.0.104:22-10.0.0.1:53370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:17.090460 systemd[1]: session-27.scope: Deactivated successfully. Apr 12 18:55:17.091243 systemd-logind[1110]: Session 27 logged out. Waiting for processes to exit. Apr 12 18:55:17.092432 systemd-logind[1110]: Removed session 27. Apr 12 18:55:20.574654 kubelet[1995]: E0412 18:55:20.574596 1995 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:55:21.284925 systemd[1]: run-containerd-runc-k8s.io-adbea7c4090cbabd1211071a4a5f32261ddd99d729085840f433406760f6ef49-runc.VYqmBj.mount: Deactivated successfully. Apr 12 18:55:22.092516 systemd[1]: Started sshd@27-10.0.0.104:22-10.0.0.1:42644.service. Apr 12 18:55:22.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.104:22-10.0.0.1:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:22.094164 kernel: kauditd_printk_skb: 16 callbacks suppressed Apr 12 18:55:22.094279 kernel: audit: type=1130 audit(1712948122.091:1564): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.104:22-10.0.0.1:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:55:22.148000 audit[4765]: USER_ACCT pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.150136 sshd[4765]: Accepted publickey for core from 10.0.0.1 port 42644 ssh2: RSA SHA256:YcqR9Dqo/1Ybntt1aIORABiFzXA47j16nwHTSfCmLBw Apr 12 18:55:22.151000 audit[4765]: CRED_ACQ pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.154370 sshd[4765]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:55:22.160915 kernel: audit: type=1101 audit(1712948122.148:1565): pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.161015 kernel: audit: type=1103 audit(1712948122.151:1566): pid=4765 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.161043 kernel: audit: type=1006 audit(1712948122.151:1567): pid=4765 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Apr 12 18:55:22.162264 systemd-logind[1110]: New session 28 of user core. Apr 12 18:55:22.163305 systemd[1]: Started session-28.scope. Apr 12 18:55:22.151000 audit[4765]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed3f27be0 a2=3 a3=0 items=0 ppid=1 pid=4765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:22.169588 kernel: audit: type=1300 audit(1712948122.151:1567): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffed3f27be0 a2=3 a3=0 items=0 ppid=1 pid=4765 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:55:22.169784 kernel: audit: type=1327 audit(1712948122.151:1567): proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:22.151000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:55:22.170000 audit[4765]: USER_START pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.178372 kernel: audit: type=1105 audit(1712948122.170:1568): pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.178543 kernel: audit: type=1103 audit(1712948122.170:1569): pid=4768 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.170000 audit[4768]: CRED_ACQ pid=4768 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.297571 sshd[4765]: pam_unix(sshd:session): session closed for user core Apr 12 18:55:22.297000 audit[4765]: USER_END pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.300553 systemd[1]: sshd@27-10.0.0.104:22-10.0.0.1:42644.service: Deactivated successfully. Apr 12 18:55:22.301549 systemd[1]: session-28.scope: Deactivated successfully. Apr 12 18:55:22.303328 systemd-logind[1110]: Session 28 logged out. Waiting for processes to exit. Apr 12 18:55:22.304361 systemd-logind[1110]: Removed session 28. Apr 12 18:55:22.297000 audit[4765]: CRED_DISP pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.310672 kernel: audit: type=1106 audit(1712948122.297:1570): pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.310834 kernel: audit: type=1104 audit(1712948122.297:1571): pid=4765 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:55:22.299000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-10.0.0.104:22-10.0.0.1:42644 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'