Apr 12 18:14:34.732992 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:14:34.733011 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:14:34.733019 kernel: efi: EFI v2.70 by EDK II Apr 12 18:14:34.733024 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Apr 12 18:14:34.733029 kernel: random: crng init done Apr 12 18:14:34.733035 kernel: ACPI: Early table checksum verification disabled Apr 12 18:14:34.733041 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Apr 12 18:14:34.733048 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Apr 12 18:14:34.733054 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733059 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733070 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733076 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733082 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733088 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733097 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733103 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733109 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:14:34.733115 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Apr 12 18:14:34.733121 kernel: NUMA: Failed to initialise from firmware Apr 12 18:14:34.733127 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:14:34.733133 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Apr 12 18:14:34.733139 kernel: Zone ranges: Apr 12 18:14:34.733145 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:14:34.733152 kernel: DMA32 empty Apr 12 18:14:34.733157 kernel: Normal empty Apr 12 18:14:34.733163 kernel: Movable zone start for each node Apr 12 18:14:34.733168 kernel: Early memory node ranges Apr 12 18:14:34.733174 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Apr 12 18:14:34.733180 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Apr 12 18:14:34.733186 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Apr 12 18:14:34.733191 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Apr 12 18:14:34.733197 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Apr 12 18:14:34.733203 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Apr 12 18:14:34.733208 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Apr 12 18:14:34.733214 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:14:34.733221 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Apr 12 18:14:34.733227 kernel: psci: probing for conduit method from ACPI. Apr 12 18:14:34.733233 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:14:34.733238 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:14:34.733244 kernel: psci: Trusted OS migration not required Apr 12 18:14:34.733252 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:14:34.733258 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Apr 12 18:14:34.733266 kernel: ACPI: SRAT not present Apr 12 18:14:34.733272 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:14:34.733278 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:14:34.733284 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Apr 12 18:14:34.733290 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:14:34.733296 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:14:34.733302 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:14:34.733308 kernel: CPU features: detected: Spectre-v4 Apr 12 18:14:34.733314 kernel: CPU features: detected: Spectre-BHB Apr 12 18:14:34.733321 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:14:34.733328 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:14:34.733334 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:14:34.733340 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Apr 12 18:14:34.733345 kernel: Policy zone: DMA Apr 12 18:14:34.733352 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:14:34.733362 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:14:34.733368 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:14:34.733374 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:14:34.733380 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:14:34.733386 kernel: Memory: 2457468K/2572288K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 114820K reserved, 0K cma-reserved) Apr 12 18:14:34.733393 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:14:34.733400 kernel: trace event string verifier disabled Apr 12 18:14:34.733405 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:14:34.733412 kernel: rcu: RCU event tracing is enabled. Apr 12 18:14:34.733419 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:14:34.733425 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:14:34.733431 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:14:34.733438 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:14:34.733444 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:14:34.733450 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:14:34.733456 kernel: GICv3: 256 SPIs implemented Apr 12 18:14:34.733463 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:14:34.733470 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:14:34.733476 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:14:34.733482 kernel: GICv3: 16 PPIs implemented Apr 12 18:14:34.733488 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Apr 12 18:14:34.733494 kernel: ACPI: SRAT not present Apr 12 18:14:34.733500 kernel: ITS [mem 0x08080000-0x0809ffff] Apr 12 18:14:34.733506 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:14:34.733512 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:14:34.733519 kernel: GICv3: using LPI property table @0x00000000400d0000 Apr 12 18:14:34.733525 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Apr 12 18:14:34.733553 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:14:34.733560 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:14:34.733567 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:14:34.733573 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:14:34.733579 kernel: arm-pv: using stolen time PV Apr 12 18:14:34.733585 kernel: Console: colour dummy device 80x25 Apr 12 18:14:34.733592 kernel: ACPI: Core revision 20210730 Apr 12 18:14:34.733598 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:14:34.733605 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:14:34.733611 kernel: LSM: Security Framework initializing Apr 12 18:14:34.733619 kernel: SELinux: Initializing. Apr 12 18:14:34.733626 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:14:34.733633 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:14:34.733639 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:14:34.733658 kernel: Platform MSI: ITS@0x8080000 domain created Apr 12 18:14:34.733665 kernel: PCI/MSI: ITS@0x8080000 domain created Apr 12 18:14:34.733671 kernel: Remapping and enabling EFI services. Apr 12 18:14:34.733677 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:14:34.733683 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:14:34.733690 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Apr 12 18:14:34.733698 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Apr 12 18:14:34.733708 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:14:34.733714 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:14:34.733721 kernel: Detected PIPT I-cache on CPU2 Apr 12 18:14:34.733728 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Apr 12 18:14:34.733734 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Apr 12 18:14:34.733741 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:14:34.733747 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Apr 12 18:14:34.733753 kernel: Detected PIPT I-cache on CPU3 Apr 12 18:14:34.733759 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Apr 12 18:14:34.733767 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Apr 12 18:14:34.733773 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:14:34.733780 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Apr 12 18:14:34.733787 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:14:34.733798 kernel: SMP: Total of 4 processors activated. Apr 12 18:14:34.733805 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:14:34.733812 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:14:34.733819 kernel: CPU features: detected: Common not Private translations Apr 12 18:14:34.733826 kernel: CPU features: detected: CRC32 instructions Apr 12 18:14:34.733832 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:14:34.733839 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:14:34.733846 kernel: CPU features: detected: Privileged Access Never Apr 12 18:14:34.733854 kernel: CPU features: detected: RAS Extension Support Apr 12 18:14:34.733860 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 18:14:34.733867 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:14:34.733873 kernel: alternatives: patching kernel code Apr 12 18:14:34.733881 kernel: devtmpfs: initialized Apr 12 18:14:34.733887 kernel: KASLR enabled Apr 12 18:14:34.733894 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:14:34.733901 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:14:34.733908 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:14:34.733914 kernel: SMBIOS 3.0.0 present. Apr 12 18:14:34.733921 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Apr 12 18:14:34.733928 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:14:34.733934 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:14:34.733941 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:14:34.733949 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:14:34.733955 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:14:34.733962 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Apr 12 18:14:34.733968 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:14:34.733975 kernel: cpuidle: using governor menu Apr 12 18:14:34.733981 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:14:34.733988 kernel: ASID allocator initialised with 32768 entries Apr 12 18:14:34.733994 kernel: ACPI: bus type PCI registered Apr 12 18:14:34.734001 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:14:34.734008 kernel: Serial: AMBA PL011 UART driver Apr 12 18:14:34.734015 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:14:34.734021 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:14:34.734028 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:14:34.734034 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:14:34.734041 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:14:34.734048 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:14:34.734054 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:14:34.734060 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:14:34.734105 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:14:34.734112 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:14:34.734119 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:14:34.734125 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:14:34.734132 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:14:34.734138 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:14:34.734145 kernel: ACPI: Interpreter enabled Apr 12 18:14:34.734151 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:14:34.734158 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:14:34.734166 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:14:34.734173 kernel: printk: console [ttyAMA0] enabled Apr 12 18:14:34.734179 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:14:34.734296 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:14:34.734357 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:14:34.734417 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:14:34.734475 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Apr 12 18:14:34.734541 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Apr 12 18:14:34.734551 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Apr 12 18:14:34.734557 kernel: PCI host bridge to bus 0000:00 Apr 12 18:14:34.734625 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Apr 12 18:14:34.734678 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:14:34.734731 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Apr 12 18:14:34.734784 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:14:34.734855 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Apr 12 18:14:34.734924 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:14:34.734984 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Apr 12 18:14:34.735043 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Apr 12 18:14:34.735114 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:14:34.735174 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:14:34.735233 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Apr 12 18:14:34.735294 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Apr 12 18:14:34.735347 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Apr 12 18:14:34.735399 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:14:34.735450 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Apr 12 18:14:34.735458 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:14:34.735465 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:14:34.735472 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:14:34.735480 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:14:34.735486 kernel: iommu: Default domain type: Translated Apr 12 18:14:34.735493 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:14:34.735499 kernel: vgaarb: loaded Apr 12 18:14:34.735505 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:14:34.735512 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:14:34.735519 kernel: PTP clock support registered Apr 12 18:14:34.735525 kernel: Registered efivars operations Apr 12 18:14:34.735531 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:14:34.735549 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:14:34.735555 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:14:34.735562 kernel: pnp: PnP ACPI init Apr 12 18:14:34.735631 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Apr 12 18:14:34.735641 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:14:34.735648 kernel: NET: Registered PF_INET protocol family Apr 12 18:14:34.735654 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:14:34.735661 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:14:34.735668 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:14:34.735676 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:14:34.735683 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:14:34.735689 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:14:34.735696 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:14:34.735702 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:14:34.735709 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:14:34.735715 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:14:34.735722 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 18:14:34.735729 kernel: kvm [1]: HYP mode not available Apr 12 18:14:34.735736 kernel: Initialise system trusted keyrings Apr 12 18:14:34.735742 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:14:34.735749 kernel: Key type asymmetric registered Apr 12 18:14:34.735755 kernel: Asymmetric key parser 'x509' registered Apr 12 18:14:34.735762 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:14:34.735768 kernel: io scheduler mq-deadline registered Apr 12 18:14:34.735774 kernel: io scheduler kyber registered Apr 12 18:14:34.735781 kernel: io scheduler bfq registered Apr 12 18:14:34.735787 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:14:34.735795 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:14:34.735802 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:14:34.735862 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Apr 12 18:14:34.735870 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:14:34.735877 kernel: thunder_xcv, ver 1.0 Apr 12 18:14:34.735884 kernel: thunder_bgx, ver 1.0 Apr 12 18:14:34.735890 kernel: nicpf, ver 1.0 Apr 12 18:14:34.735896 kernel: nicvf, ver 1.0 Apr 12 18:14:34.735960 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:14:34.736023 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:14:34 UTC (1712945674) Apr 12 18:14:34.736032 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:14:34.736038 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:14:34.736045 kernel: Segment Routing with IPv6 Apr 12 18:14:34.736051 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:14:34.736058 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:14:34.736078 kernel: Key type dns_resolver registered Apr 12 18:14:34.736086 kernel: registered taskstats version 1 Apr 12 18:14:34.736094 kernel: Loading compiled-in X.509 certificates Apr 12 18:14:34.736101 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:14:34.736108 kernel: Key type .fscrypt registered Apr 12 18:14:34.736114 kernel: Key type fscrypt-provisioning registered Apr 12 18:14:34.736120 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:14:34.736130 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:14:34.736136 kernel: ima: No architecture policies found Apr 12 18:14:34.736143 kernel: Freeing unused kernel memory: 36352K Apr 12 18:14:34.736150 kernel: Run /init as init process Apr 12 18:14:34.736157 kernel: with arguments: Apr 12 18:14:34.736163 kernel: /init Apr 12 18:14:34.736170 kernel: with environment: Apr 12 18:14:34.736177 kernel: HOME=/ Apr 12 18:14:34.736184 kernel: TERM=linux Apr 12 18:14:34.736191 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:14:34.736199 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:14:34.736208 systemd[1]: Detected virtualization kvm. Apr 12 18:14:34.736216 systemd[1]: Detected architecture arm64. Apr 12 18:14:34.736225 systemd[1]: Running in initrd. Apr 12 18:14:34.736232 systemd[1]: No hostname configured, using default hostname. Apr 12 18:14:34.736239 systemd[1]: Hostname set to . Apr 12 18:14:34.736246 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:14:34.736253 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:14:34.736262 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:14:34.736269 systemd[1]: Reached target cryptsetup.target. Apr 12 18:14:34.736277 systemd[1]: Reached target paths.target. Apr 12 18:14:34.736284 systemd[1]: Reached target slices.target. Apr 12 18:14:34.736291 systemd[1]: Reached target swap.target. Apr 12 18:14:34.736300 systemd[1]: Reached target timers.target. Apr 12 18:14:34.736307 systemd[1]: Listening on iscsid.socket. Apr 12 18:14:34.736314 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:14:34.736321 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:14:34.736329 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:14:34.736336 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:14:34.736343 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:14:34.736350 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:14:34.736357 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:14:34.736365 systemd[1]: Reached target sockets.target. Apr 12 18:14:34.736372 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:14:34.736379 systemd[1]: Finished network-cleanup.service. Apr 12 18:14:34.736386 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:14:34.736394 systemd[1]: Starting systemd-journald.service... Apr 12 18:14:34.736401 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:14:34.736408 systemd[1]: Starting systemd-resolved.service... Apr 12 18:14:34.736415 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:14:34.736422 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:14:34.736429 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:14:34.736436 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:14:34.736443 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:14:34.736451 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:14:34.736460 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:14:34.736467 kernel: audit: type=1130 audit(1712945674.731:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.736477 systemd-journald[250]: Journal started Apr 12 18:14:34.736516 systemd-journald[250]: Runtime Journal (/run/log/journal/616a97b3b27f485fb829beaa789b3765) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:14:34.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.723943 systemd-modules-load[251]: Inserted module 'overlay' Apr 12 18:14:34.738683 systemd[1]: Started systemd-journald.service. Apr 12 18:14:34.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.741086 kernel: audit: type=1130 audit(1712945674.738:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.746192 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:14:34.751086 kernel: Bridge firewalling registered Apr 12 18:14:34.751110 systemd-modules-load[251]: Inserted module 'br_netfilter' Apr 12 18:14:34.753992 systemd-resolved[252]: Positive Trust Anchors: Apr 12 18:14:34.754007 systemd-resolved[252]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:14:34.754034 systemd-resolved[252]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:14:34.764239 kernel: audit: type=1130 audit(1712945674.756:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.755103 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:14:34.758183 systemd-resolved[252]: Defaulting to hostname 'linux'. Apr 12 18:14:34.766408 kernel: SCSI subsystem initialized Apr 12 18:14:34.764034 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:14:34.767094 systemd[1]: Started systemd-resolved.service. Apr 12 18:14:34.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.772087 kernel: audit: type=1130 audit(1712945674.768:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.772116 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:14:34.771388 systemd[1]: Reached target nss-lookup.target. Apr 12 18:14:34.774960 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:14:34.774975 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:14:34.775212 dracut-cmdline[269]: dracut-dracut-053 Apr 12 18:14:34.777312 dracut-cmdline[269]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:14:34.781557 systemd-modules-load[251]: Inserted module 'dm_multipath' Apr 12 18:14:34.782272 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:14:34.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.786097 kernel: audit: type=1130 audit(1712945674.783:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.783807 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:14:34.792878 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:14:34.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.797087 kernel: audit: type=1130 audit(1712945674.793:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.839082 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:14:34.851089 kernel: iscsi: registered transport (tcp) Apr 12 18:14:34.865372 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:14:34.865386 kernel: QLogic iSCSI HBA Driver Apr 12 18:14:34.897734 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:14:34.903161 kernel: audit: type=1130 audit(1712945674.898:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:34.899221 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:14:34.946109 kernel: raid6: neonx8 gen() 13763 MB/s Apr 12 18:14:34.963105 kernel: raid6: neonx8 xor() 10779 MB/s Apr 12 18:14:34.980101 kernel: raid6: neonx4 gen() 13491 MB/s Apr 12 18:14:34.997097 kernel: raid6: neonx4 xor() 11256 MB/s Apr 12 18:14:35.014098 kernel: raid6: neonx2 gen() 12900 MB/s Apr 12 18:14:35.031097 kernel: raid6: neonx2 xor() 10332 MB/s Apr 12 18:14:35.048098 kernel: raid6: neonx1 gen() 10494 MB/s Apr 12 18:14:35.065093 kernel: raid6: neonx1 xor() 8682 MB/s Apr 12 18:14:35.082102 kernel: raid6: int64x8 gen() 5830 MB/s Apr 12 18:14:35.099089 kernel: raid6: int64x8 xor() 3510 MB/s Apr 12 18:14:35.116093 kernel: raid6: int64x4 gen() 7166 MB/s Apr 12 18:14:35.133090 kernel: raid6: int64x4 xor() 3835 MB/s Apr 12 18:14:35.150092 kernel: raid6: int64x2 gen() 6137 MB/s Apr 12 18:14:35.167098 kernel: raid6: int64x2 xor() 3285 MB/s Apr 12 18:14:35.184095 kernel: raid6: int64x1 gen() 5044 MB/s Apr 12 18:14:35.201244 kernel: raid6: int64x1 xor() 2635 MB/s Apr 12 18:14:35.201268 kernel: raid6: using algorithm neonx8 gen() 13763 MB/s Apr 12 18:14:35.201277 kernel: raid6: .... xor() 10779 MB/s, rmw enabled Apr 12 18:14:35.202341 kernel: raid6: using neon recovery algorithm Apr 12 18:14:35.213240 kernel: xor: measuring software checksum speed Apr 12 18:14:35.213252 kernel: 8regs : 17304 MB/sec Apr 12 18:14:35.214211 kernel: 32regs : 20755 MB/sec Apr 12 18:14:35.215649 kernel: arm64_neon : 27845 MB/sec Apr 12 18:14:35.215659 kernel: xor: using function: arm64_neon (27845 MB/sec) Apr 12 18:14:35.268131 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:14:35.278290 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:14:35.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:35.280147 systemd[1]: Starting systemd-udevd.service... Apr 12 18:14:35.284116 kernel: audit: type=1130 audit(1712945675.279:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:35.284136 kernel: audit: type=1334 audit(1712945675.279:10): prog-id=7 op=LOAD Apr 12 18:14:35.279000 audit: BPF prog-id=7 op=LOAD Apr 12 18:14:35.279000 audit: BPF prog-id=8 op=LOAD Apr 12 18:14:35.301052 systemd-udevd[452]: Using default interface naming scheme 'v252'. Apr 12 18:14:35.305475 systemd[1]: Started systemd-udevd.service. Apr 12 18:14:35.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:35.307976 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:14:35.319341 dracut-pre-trigger[460]: rd.md=0: removing MD RAID activation Apr 12 18:14:35.346571 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:14:35.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:35.348172 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:14:35.382136 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:14:35.382000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:35.413610 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:14:35.416632 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:14:35.416660 kernel: GPT:9289727 != 19775487 Apr 12 18:14:35.416670 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:14:35.416679 kernel: GPT:9289727 != 19775487 Apr 12 18:14:35.416691 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:14:35.416700 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:14:35.436091 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (514) Apr 12 18:14:35.438767 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:14:35.439811 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:14:35.446172 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:14:35.449405 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:14:35.454602 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:14:35.456238 systemd[1]: Starting disk-uuid.service... Apr 12 18:14:35.462161 disk-uuid[522]: Primary Header is updated. Apr 12 18:14:35.462161 disk-uuid[522]: Secondary Entries is updated. Apr 12 18:14:35.462161 disk-uuid[522]: Secondary Header is updated. Apr 12 18:14:35.467083 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:14:36.475083 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:14:36.475132 disk-uuid[523]: The operation has completed successfully. Apr 12 18:14:36.498847 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:14:36.499000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.499000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.498953 systemd[1]: Finished disk-uuid.service. Apr 12 18:14:36.503145 systemd[1]: Starting verity-setup.service... Apr 12 18:14:36.521179 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:14:36.539817 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:14:36.542099 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:14:36.543917 systemd[1]: Finished verity-setup.service. Apr 12 18:14:36.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.589079 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:14:36.589302 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:14:36.590104 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:14:36.590777 systemd[1]: Starting ignition-setup.service... Apr 12 18:14:36.592907 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:14:36.599339 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:14:36.599376 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:14:36.599386 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:14:36.606478 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:14:36.613000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.612831 systemd[1]: Finished ignition-setup.service. Apr 12 18:14:36.614302 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:14:36.685156 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:14:36.685000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.686000 audit: BPF prog-id=9 op=LOAD Apr 12 18:14:36.687245 systemd[1]: Starting systemd-networkd.service... Apr 12 18:14:36.692399 ignition[605]: Ignition 2.14.0 Apr 12 18:14:36.692408 ignition[605]: Stage: fetch-offline Apr 12 18:14:36.692443 ignition[605]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:36.692452 ignition[605]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:36.692576 ignition[605]: parsed url from cmdline: "" Apr 12 18:14:36.692579 ignition[605]: no config URL provided Apr 12 18:14:36.692584 ignition[605]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:14:36.692591 ignition[605]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:14:36.692609 ignition[605]: op(1): [started] loading QEMU firmware config module Apr 12 18:14:36.692613 ignition[605]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:14:36.696943 ignition[605]: op(1): [finished] loading QEMU firmware config module Apr 12 18:14:36.717645 systemd-networkd[698]: lo: Link UP Apr 12 18:14:36.717657 systemd-networkd[698]: lo: Gained carrier Apr 12 18:14:36.718000 systemd-networkd[698]: Enumeration completed Apr 12 18:14:36.718079 systemd[1]: Started systemd-networkd.service. Apr 12 18:14:36.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.718182 systemd-networkd[698]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:14:36.719468 systemd-networkd[698]: eth0: Link UP Apr 12 18:14:36.719471 systemd-networkd[698]: eth0: Gained carrier Apr 12 18:14:36.719546 systemd[1]: Reached target network.target. Apr 12 18:14:36.721617 systemd[1]: Starting iscsiuio.service... Apr 12 18:14:36.730048 systemd[1]: Started iscsiuio.service. Apr 12 18:14:36.730000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.731657 systemd[1]: Starting iscsid.service... Apr 12 18:14:36.734978 iscsid[706]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:14:36.734978 iscsid[706]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:14:36.734978 iscsid[706]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:14:36.734978 iscsid[706]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:14:36.734978 iscsid[706]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:14:36.734978 iscsid[706]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:14:36.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.737829 systemd[1]: Started iscsid.service. Apr 12 18:14:36.743425 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:14:36.745580 systemd-networkd[698]: eth0: DHCPv4 address 10.0.0.7/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:14:36.753281 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:14:36.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.754351 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:14:36.755899 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:14:36.757565 systemd[1]: Reached target remote-fs.target. Apr 12 18:14:36.759779 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:14:36.767133 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:14:36.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.796020 ignition[605]: parsing config with SHA512: 29026d63111912c3110825e003c70d67ced83c6110025b4460511d8dbba98c637cd4ba1225258fccb0a5f5edcbcdd80d7a5f7571d568417da9a200b962362e75 Apr 12 18:14:36.833796 unknown[605]: fetched base config from "system" Apr 12 18:14:36.833808 unknown[605]: fetched user config from "qemu" Apr 12 18:14:36.834345 ignition[605]: fetch-offline: fetch-offline passed Apr 12 18:14:36.834403 ignition[605]: Ignition finished successfully Apr 12 18:14:36.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.835970 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:14:36.837017 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:14:36.837788 systemd[1]: Starting ignition-kargs.service... Apr 12 18:14:36.846366 ignition[720]: Ignition 2.14.0 Apr 12 18:14:36.846376 ignition[720]: Stage: kargs Apr 12 18:14:36.846473 ignition[720]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:36.846483 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:36.847467 ignition[720]: kargs: kargs passed Apr 12 18:14:36.850000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.849441 systemd[1]: Finished ignition-kargs.service. Apr 12 18:14:36.847511 ignition[720]: Ignition finished successfully Apr 12 18:14:36.851840 systemd[1]: Starting ignition-disks.service... Apr 12 18:14:36.858314 ignition[726]: Ignition 2.14.0 Apr 12 18:14:36.858322 ignition[726]: Stage: disks Apr 12 18:14:36.858410 ignition[726]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:36.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.860604 systemd[1]: Finished ignition-disks.service. Apr 12 18:14:36.858419 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:36.861551 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:14:36.859509 ignition[726]: disks: disks passed Apr 12 18:14:36.862425 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:14:36.859560 ignition[726]: Ignition finished successfully Apr 12 18:14:36.863210 systemd[1]: Reached target local-fs.target. Apr 12 18:14:36.863951 systemd[1]: Reached target sysinit.target. Apr 12 18:14:36.864714 systemd[1]: Reached target basic.target. Apr 12 18:14:36.866947 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:14:36.878387 systemd-fsck[734]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:14:36.883587 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:14:36.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.885760 systemd[1]: Mounting sysroot.mount... Apr 12 18:14:36.892088 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:14:36.892132 systemd[1]: Mounted sysroot.mount. Apr 12 18:14:36.892875 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:14:36.896800 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:14:36.897696 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:14:36.897736 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:14:36.897759 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:14:36.899666 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:14:36.902939 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:14:36.907081 initrd-setup-root[744]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:14:36.911485 initrd-setup-root[752]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:14:36.915502 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:14:36.920648 initrd-setup-root[768]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:14:36.962991 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:14:36.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.964654 systemd[1]: Starting ignition-mount.service... Apr 12 18:14:36.965946 systemd[1]: Starting sysroot-boot.service... Apr 12 18:14:36.970262 bash[785]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:14:36.977725 ignition[787]: INFO : Ignition 2.14.0 Apr 12 18:14:36.977725 ignition[787]: INFO : Stage: mount Apr 12 18:14:36.979212 ignition[787]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:36.979212 ignition[787]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:36.979212 ignition[787]: INFO : mount: mount passed Apr 12 18:14:36.979212 ignition[787]: INFO : Ignition finished successfully Apr 12 18:14:36.980909 systemd[1]: Finished ignition-mount.service. Apr 12 18:14:36.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:36.988415 systemd[1]: Finished sysroot-boot.service. Apr 12 18:14:36.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:37.550676 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:14:37.556087 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (795) Apr 12 18:14:37.558166 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:14:37.558180 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:14:37.558189 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:14:37.561484 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:14:37.562978 systemd[1]: Starting ignition-files.service... Apr 12 18:14:37.576578 ignition[815]: INFO : Ignition 2.14.0 Apr 12 18:14:37.576578 ignition[815]: INFO : Stage: files Apr 12 18:14:37.578079 ignition[815]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:37.578079 ignition[815]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:37.578079 ignition[815]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:14:37.583978 ignition[815]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:14:37.583978 ignition[815]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:14:37.587706 ignition[815]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:14:37.589020 ignition[815]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:14:37.589020 ignition[815]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:14:37.589020 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:14:37.589020 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:14:37.588455 unknown[815]: wrote ssh authorized keys file for user: core Apr 12 18:14:37.953459 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:14:38.196131 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:14:38.198877 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:14:38.198877 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:14:38.198877 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:14:38.447212 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:14:38.568166 systemd-networkd[698]: eth0: Gained IPv6LL Apr 12 18:14:38.573930 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:14:38.576631 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:14:38.576631 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:14:38.576631 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:14:38.834358 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:14:38.887492 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:14:38.889425 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:14:38.889425 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:14:39.180834 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:14:42.690202 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Apr 12 18:14:42.693028 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:14:42.693028 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:14:42.693028 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:14:42.740133 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:14:50.517715 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Apr 12 18:14:50.520574 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:14:50.522104 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:14:50.522104 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:14:50.588721 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:14:53.590524 ignition[815]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:14:53.594116 ignition[815]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:14:53.594116 ignition[815]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:14:53.594116 ignition[815]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(18): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:14:53.628419 ignition[815]: INFO : files: op(18): op(19): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:14:53.660322 kernel: kauditd_printk_skb: 22 callbacks suppressed Apr 12 18:14:53.660345 kernel: audit: type=1130 audit(1712945693.652:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.652000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(18): op(19): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(18): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(1a): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(1a): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(1b): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: op(1b): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:14:53.660412 ignition[815]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:14:53.660412 ignition[815]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:14:53.660412 ignition[815]: INFO : files: files passed Apr 12 18:14:53.660412 ignition[815]: INFO : Ignition finished successfully Apr 12 18:14:53.682205 kernel: audit: type=1130 audit(1712945693.662:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.682235 kernel: audit: type=1131 audit(1712945693.662:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.682245 kernel: audit: type=1130 audit(1712945693.670:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.670000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.650417 systemd[1]: Finished ignition-files.service. Apr 12 18:14:53.653299 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:14:53.684146 initrd-setup-root-after-ignition[839]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:14:53.657275 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:14:53.687198 initrd-setup-root-after-ignition[842]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:14:53.657949 systemd[1]: Starting ignition-quench.service... Apr 12 18:14:53.689000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.661807 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:14:53.695830 kernel: audit: type=1130 audit(1712945693.689:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.695850 kernel: audit: type=1131 audit(1712945693.689:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.661887 systemd[1]: Finished ignition-quench.service. Apr 12 18:14:53.667497 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:14:53.670416 systemd[1]: Reached target ignition-complete.target. Apr 12 18:14:53.675282 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:14:53.687198 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:14:53.687278 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:14:53.689347 systemd[1]: Reached target initrd-fs.target. Apr 12 18:14:53.695044 systemd[1]: Reached target initrd.target. Apr 12 18:14:53.696517 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:14:53.697197 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:14:53.707183 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:14:53.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.708587 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:14:53.711997 kernel: audit: type=1130 audit(1712945693.707:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.716182 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:14:53.716981 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:14:53.718329 systemd[1]: Stopped target timers.target. Apr 12 18:14:53.719583 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:14:53.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.719690 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:14:53.724850 kernel: audit: type=1131 audit(1712945693.720:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.720919 systemd[1]: Stopped target initrd.target. Apr 12 18:14:53.724354 systemd[1]: Stopped target basic.target. Apr 12 18:14:53.725549 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:14:53.726811 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:14:53.728032 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:14:53.729416 systemd[1]: Stopped target remote-fs.target. Apr 12 18:14:53.730672 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:14:53.731990 systemd[1]: Stopped target sysinit.target. Apr 12 18:14:53.733184 systemd[1]: Stopped target local-fs.target. Apr 12 18:14:53.734423 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:14:53.735640 systemd[1]: Stopped target swap.target. Apr 12 18:14:53.737000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.736792 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:14:53.742166 kernel: audit: type=1131 audit(1712945693.737:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.736897 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:14:53.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.738192 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:14:53.746961 kernel: audit: type=1131 audit(1712945693.742:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.741463 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:14:53.741572 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:14:53.742929 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:14:53.743024 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:14:53.746533 systemd[1]: Stopped target paths.target. Apr 12 18:14:53.747687 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:14:53.753113 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:14:53.753989 systemd[1]: Stopped target slices.target. Apr 12 18:14:53.754793 systemd[1]: Stopped target sockets.target. Apr 12 18:14:53.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.755572 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:14:53.759000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.755645 systemd[1]: Closed iscsid.socket. Apr 12 18:14:53.756818 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:14:53.756918 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:14:53.758159 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:14:53.763000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.758254 systemd[1]: Stopped ignition-files.service. Apr 12 18:14:53.760121 systemd[1]: Stopping ignition-mount.service... Apr 12 18:14:53.761227 systemd[1]: Stopping iscsiuio.service... Apr 12 18:14:53.762564 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:14:53.767000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.768000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.762684 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:14:53.773289 ignition[855]: INFO : Ignition 2.14.0 Apr 12 18:14:53.773289 ignition[855]: INFO : Stage: umount Apr 12 18:14:53.773289 ignition[855]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:14:53.773289 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:14:53.773289 ignition[855]: INFO : umount: umount passed Apr 12 18:14:53.773289 ignition[855]: INFO : Ignition finished successfully Apr 12 18:14:53.779000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.764847 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:14:53.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.766033 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:14:53.766320 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:14:53.783000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.767510 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:14:53.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.767600 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:14:53.787000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.770252 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:14:53.788000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.770335 systemd[1]: Stopped iscsiuio.service. Apr 12 18:14:53.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.771465 systemd[1]: Stopped target network.target. Apr 12 18:14:53.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.772676 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:14:53.772708 systemd[1]: Closed iscsiuio.socket. Apr 12 18:14:53.793000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:14:53.793000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.774035 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:14:53.775948 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:14:53.777976 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:14:53.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.778444 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:14:53.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.778529 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:14:53.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.780122 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:14:53.780188 systemd[1]: Stopped ignition-mount.service. Apr 12 18:14:53.782278 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:14:53.782323 systemd[1]: Stopped ignition-disks.service. Apr 12 18:14:53.783116 systemd-networkd[698]: eth0: DHCPv6 lease lost Apr 12 18:14:53.804000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:14:53.783854 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:14:53.783907 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:14:53.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.785303 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:14:53.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.785340 systemd[1]: Stopped ignition-setup.service. Apr 12 18:14:53.787497 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:14:53.787607 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:14:53.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.788781 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:14:53.812000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.788863 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:14:53.814000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.790342 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:14:53.790420 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:14:53.791276 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:14:53.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.791313 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:14:53.792434 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:14:53.792472 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:14:53.794393 systemd[1]: Stopping network-cleanup.service... Apr 12 18:14:53.821000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:53.795643 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:14:53.795694 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:14:53.796997 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:14:53.797037 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:14:53.799125 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:14:53.799164 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:14:53.800150 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:14:53.802016 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:14:53.805286 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:14:53.805407 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:14:53.806872 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:14:53.806946 systemd[1]: Stopped network-cleanup.service. Apr 12 18:14:53.807909 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:14:53.807941 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:14:53.809262 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:14:53.809292 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:14:53.810473 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:14:53.810524 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:14:53.811876 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:14:53.811914 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:14:53.813135 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:14:53.813173 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:14:53.815228 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:14:53.816651 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:14:53.816702 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:14:53.820334 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:14:53.820416 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:14:53.822022 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:14:53.823923 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:14:53.830155 systemd[1]: Switching root. Apr 12 18:14:53.850840 iscsid[706]: iscsid shutting down. Apr 12 18:14:53.851500 systemd-journald[250]: Received SIGTERM from PID 1 (n/a). Apr 12 18:14:53.851546 systemd-journald[250]: Journal stopped Apr 12 18:14:55.830865 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:14:55.830916 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:14:55.830933 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:14:55.830945 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:14:55.830954 kernel: SELinux: policy capability open_perms=1 Apr 12 18:14:55.830968 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:14:55.830980 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:14:55.830989 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:14:55.830999 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:14:55.831012 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:14:55.831021 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:14:55.831032 systemd[1]: Successfully loaded SELinux policy in 34.224ms. Apr 12 18:14:55.831048 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.914ms. Apr 12 18:14:55.831060 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:14:55.831088 systemd[1]: Detected virtualization kvm. Apr 12 18:14:55.831114 systemd[1]: Detected architecture arm64. Apr 12 18:14:55.831126 systemd[1]: Detected first boot. Apr 12 18:14:55.831137 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:14:55.831151 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:14:55.831161 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:14:55.831172 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:14:55.831185 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:14:55.831197 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:14:55.831220 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:14:55.831232 systemd[1]: Stopped iscsid.service. Apr 12 18:14:55.831242 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:14:55.831252 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:14:55.831262 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:14:55.831277 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:14:55.831291 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:14:55.831302 systemd[1]: Created slice system-getty.slice. Apr 12 18:14:55.831312 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:14:55.831322 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:14:55.831333 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:14:55.831344 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:14:55.831355 systemd[1]: Created slice user.slice. Apr 12 18:14:55.831365 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:14:55.831375 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:14:55.831387 systemd[1]: Set up automount boot.automount. Apr 12 18:14:55.831397 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:14:55.831407 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:14:55.831418 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:14:55.831429 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:14:55.831440 systemd[1]: Reached target integritysetup.target. Apr 12 18:14:55.831450 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:14:55.831461 systemd[1]: Reached target remote-fs.target. Apr 12 18:14:55.831472 systemd[1]: Reached target slices.target. Apr 12 18:14:55.831489 systemd[1]: Reached target swap.target. Apr 12 18:14:55.831502 systemd[1]: Reached target torcx.target. Apr 12 18:14:55.831512 systemd[1]: Reached target veritysetup.target. Apr 12 18:14:55.831522 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:14:55.831533 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:14:55.831543 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:14:55.831554 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:14:55.831565 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:14:55.831577 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:14:55.831587 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:14:55.831597 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:14:55.831607 systemd[1]: Mounting media.mount... Apr 12 18:14:55.831618 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:14:55.831628 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:14:55.831637 systemd[1]: Mounting tmp.mount... Apr 12 18:14:55.831647 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:14:55.831659 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:14:55.831671 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:14:55.831681 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:14:55.831691 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:14:55.831702 systemd[1]: Starting modprobe@drm.service... Apr 12 18:14:55.831712 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:14:55.831722 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:14:55.831732 systemd[1]: Starting modprobe@loop.service... Apr 12 18:14:55.831742 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:14:55.831752 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:14:55.831764 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:14:55.831774 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:14:55.831785 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:14:55.831795 systemd[1]: Stopped systemd-journald.service. Apr 12 18:14:55.831805 kernel: loop: module loaded Apr 12 18:14:55.831815 systemd[1]: Starting systemd-journald.service... Apr 12 18:14:55.831825 kernel: fuse: init (API version 7.34) Apr 12 18:14:55.831837 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:14:55.831848 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:14:55.831859 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:14:55.831870 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:14:55.831882 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:14:55.831894 systemd[1]: Stopped verity-setup.service. Apr 12 18:14:55.831904 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:14:55.831914 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:14:55.831925 systemd[1]: Mounted media.mount. Apr 12 18:14:55.831935 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:14:55.831944 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:14:55.831954 systemd[1]: Mounted tmp.mount. Apr 12 18:14:55.831964 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:14:55.831974 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:14:55.831988 systemd-journald[951]: Journal started Apr 12 18:14:55.832030 systemd-journald[951]: Runtime Journal (/run/log/journal/616a97b3b27f485fb829beaa789b3765) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:14:53.919000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:14:53.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:14:53.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:14:53.957000 audit: BPF prog-id=10 op=LOAD Apr 12 18:14:53.957000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:14:53.957000 audit: BPF prog-id=11 op=LOAD Apr 12 18:14:53.957000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:14:54.008000 audit[889]: AVC avc: denied { associate } for pid=889 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:14:54.008000 audit[889]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001fb8dc a1=4000028e40 a2=4000027100 a3=32 items=0 ppid=872 pid=889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:14:54.008000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:14:54.010000 audit[889]: AVC avc: denied { associate } for pid=889 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:14:54.010000 audit[889]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001fb9b9 a2=1ed a3=0 items=2 ppid=872 pid=889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:14:54.010000 audit: CWD cwd="/" Apr 12 18:14:54.010000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:14:54.010000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:14:54.010000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:14:55.703000 audit: BPF prog-id=12 op=LOAD Apr 12 18:14:55.703000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:14:55.703000 audit: BPF prog-id=13 op=LOAD Apr 12 18:14:55.703000 audit: BPF prog-id=14 op=LOAD Apr 12 18:14:55.703000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:14:55.703000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:14:55.704000 audit: BPF prog-id=15 op=LOAD Apr 12 18:14:55.704000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:14:55.704000 audit: BPF prog-id=16 op=LOAD Apr 12 18:14:55.704000 audit: BPF prog-id=17 op=LOAD Apr 12 18:14:55.704000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:14:55.704000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:14:55.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.709000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.723000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:14:55.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.799000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.801000 audit: BPF prog-id=18 op=LOAD Apr 12 18:14:55.802000 audit: BPF prog-id=19 op=LOAD Apr 12 18:14:55.802000 audit: BPF prog-id=20 op=LOAD Apr 12 18:14:55.802000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:14:55.802000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:14:55.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.827000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:14:55.827000 audit[951]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffdbe556b0 a2=4000 a3=1 items=0 ppid=1 pid=951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:14:55.827000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:14:55.831000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.701485 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:14:54.006666 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:14:55.833300 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:14:55.701497 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:14:54.006914 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:14:55.704718 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:14:54.006932 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:14:54.006961 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:14:54.006996 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:14:54.007025 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:14:54.007037 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:14:54.007251 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:14:54.007507 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:14:54.007532 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:14:54.008298 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:14:54.008331 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:14:54.008349 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:14:54.008363 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:14:54.008380 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:14:55.834000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.834000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:54.008393 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:54Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:14:55.436593 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:14:55.436843 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:14:55.436937 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:14:55.437114 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:14:55.437162 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:14:55.437221 /usr/lib/systemd/system-generators/torcx-generator[889]: time="2024-04-12T18:14:55Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:14:55.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.836221 systemd[1]: Started systemd-journald.service. Apr 12 18:14:55.836601 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:14:55.836778 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:14:55.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.837000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.837803 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:14:55.837963 systemd[1]: Finished modprobe@drm.service. Apr 12 18:14:55.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.838949 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:14:55.839116 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:14:55.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.840162 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:14:55.840305 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:14:55.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.841397 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:14:55.841566 systemd[1]: Finished modprobe@loop.service. Apr 12 18:14:55.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.842000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.842744 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:14:55.843000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.843897 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:14:55.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.845124 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:14:55.845000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.846419 systemd[1]: Reached target network-pre.target. Apr 12 18:14:55.848391 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:14:55.850585 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:14:55.851473 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:14:55.852856 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:14:55.854937 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:14:55.855871 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:14:55.856925 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:14:55.857854 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:14:55.858899 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:14:55.863179 systemd-journald[951]: Time spent on flushing to /var/log/journal/616a97b3b27f485fb829beaa789b3765 is 15.754ms for 1019 entries. Apr 12 18:14:55.863179 systemd-journald[951]: System Journal (/var/log/journal/616a97b3b27f485fb829beaa789b3765) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:14:55.898253 systemd-journald[951]: Received client request to flush runtime journal. Apr 12 18:14:55.860000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.864000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:55.862203 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:14:55.863270 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:14:55.865217 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:14:55.898916 udevadm[989]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:14:55.866316 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:14:55.868081 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:14:55.869995 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:14:55.872331 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:14:55.873228 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:14:55.880380 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:14:55.889341 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:14:55.899353 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:14:55.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.216395 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:14:56.217000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.217000 audit: BPF prog-id=21 op=LOAD Apr 12 18:14:56.217000 audit: BPF prog-id=22 op=LOAD Apr 12 18:14:56.217000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:14:56.217000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:14:56.218565 systemd[1]: Starting systemd-udevd.service... Apr 12 18:14:56.233460 systemd-udevd[994]: Using default interface naming scheme 'v252'. Apr 12 18:14:56.247000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.246401 systemd[1]: Started systemd-udevd.service. Apr 12 18:14:56.248000 audit: BPF prog-id=23 op=LOAD Apr 12 18:14:56.248944 systemd[1]: Starting systemd-networkd.service... Apr 12 18:14:56.257000 audit: BPF prog-id=24 op=LOAD Apr 12 18:14:56.258000 audit: BPF prog-id=25 op=LOAD Apr 12 18:14:56.258000 audit: BPF prog-id=26 op=LOAD Apr 12 18:14:56.258726 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:14:56.266103 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:14:56.298314 systemd[1]: Started systemd-userdbd.service. Apr 12 18:14:56.299000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.332238 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:14:56.347233 systemd-networkd[1003]: lo: Link UP Apr 12 18:14:56.347512 systemd-networkd[1003]: lo: Gained carrier Apr 12 18:14:56.347914 systemd-networkd[1003]: Enumeration completed Apr 12 18:14:56.348091 systemd[1]: Started systemd-networkd.service. Apr 12 18:14:56.348303 systemd-networkd[1003]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:14:56.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.350000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.349263 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:14:56.351454 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:14:56.355463 systemd-networkd[1003]: eth0: Link UP Apr 12 18:14:56.355569 systemd-networkd[1003]: eth0: Gained carrier Apr 12 18:14:56.363327 lvm[1027]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:14:56.380209 systemd-networkd[1003]: eth0: DHCPv4 address 10.0.0.7/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:14:56.391888 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:14:56.392000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.392909 systemd[1]: Reached target cryptsetup.target. Apr 12 18:14:56.394854 systemd[1]: Starting lvm2-activation.service... Apr 12 18:14:56.398301 lvm[1028]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:14:56.428866 systemd[1]: Finished lvm2-activation.service. Apr 12 18:14:56.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.429807 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:14:56.430639 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:14:56.430666 systemd[1]: Reached target local-fs.target. Apr 12 18:14:56.431405 systemd[1]: Reached target machines.target. Apr 12 18:14:56.433290 systemd[1]: Starting ldconfig.service... Apr 12 18:14:56.434364 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:14:56.434436 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:14:56.435659 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:14:56.437809 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:14:56.440044 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:14:56.441036 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:14:56.441130 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:14:56.442098 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:14:56.445188 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1030 (bootctl) Apr 12 18:14:56.446270 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:14:56.453208 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:14:56.454000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.461995 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:14:56.465201 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:14:56.469324 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:14:56.477585 systemd-fsck[1038]: fsck.fat 4.2 (2021-01-31) Apr 12 18:14:56.477585 systemd-fsck[1038]: /dev/vda1: 236 files, 117047/258078 clusters Apr 12 18:14:56.479183 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:14:56.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.482040 systemd[1]: Mounting boot.mount... Apr 12 18:14:56.503210 systemd[1]: Mounted boot.mount. Apr 12 18:14:56.512945 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:14:56.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.866807 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:14:56.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.869362 systemd[1]: Starting audit-rules.service... Apr 12 18:14:56.870995 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:14:56.873003 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:14:56.874000 audit: BPF prog-id=27 op=LOAD Apr 12 18:14:56.875712 systemd[1]: Starting systemd-resolved.service... Apr 12 18:14:56.878000 audit: BPF prog-id=28 op=LOAD Apr 12 18:14:56.880470 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:14:56.882172 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:14:56.883345 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:14:56.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.884532 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:14:56.891000 audit[1052]: SYSTEM_BOOT pid=1052 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.894030 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:14:56.894000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.899678 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:14:56.900304 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:14:56.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.905967 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:14:56.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.925041 ldconfig[1029]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:14:56.934887 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:14:56.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:14:56.935953 systemd[1]: Reached target time-set.target. Apr 12 18:14:56.937461 systemd-timesyncd[1046]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:14:56.937726 systemd-timesyncd[1046]: Initial clock synchronization to Fri 2024-04-12 18:14:57.000434 UTC. Apr 12 18:14:56.938000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:14:56.938000 audit[1063]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd209fa80 a2=420 a3=0 items=0 ppid=1041 pid=1063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:14:56.938000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:14:56.938614 augenrules[1063]: No rules Apr 12 18:14:56.939356 systemd[1]: Finished ldconfig.service. Apr 12 18:14:56.940360 systemd[1]: Finished audit-rules.service. Apr 12 18:14:56.942426 systemd[1]: Starting systemd-update-done.service... Apr 12 18:14:56.945812 systemd-resolved[1045]: Positive Trust Anchors: Apr 12 18:14:56.945825 systemd-resolved[1045]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:14:56.945851 systemd-resolved[1045]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:14:56.948489 systemd[1]: Finished systemd-update-done.service. Apr 12 18:14:56.953932 systemd-resolved[1045]: Defaulting to hostname 'linux'. Apr 12 18:14:56.955294 systemd[1]: Started systemd-resolved.service. Apr 12 18:14:56.956117 systemd[1]: Reached target network.target. Apr 12 18:14:56.956840 systemd[1]: Reached target nss-lookup.target. Apr 12 18:14:56.957636 systemd[1]: Reached target sysinit.target. Apr 12 18:14:56.958483 systemd[1]: Started motdgen.path. Apr 12 18:14:56.959176 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:14:56.960338 systemd[1]: Started logrotate.timer. Apr 12 18:14:56.961128 systemd[1]: Started mdadm.timer. Apr 12 18:14:56.961765 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:14:56.962606 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:14:56.962644 systemd[1]: Reached target paths.target. Apr 12 18:14:56.963349 systemd[1]: Reached target timers.target. Apr 12 18:14:56.964433 systemd[1]: Listening on dbus.socket. Apr 12 18:14:56.966209 systemd[1]: Starting docker.socket... Apr 12 18:14:56.969132 systemd[1]: Listening on sshd.socket. Apr 12 18:14:56.969923 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:14:56.970351 systemd[1]: Listening on docker.socket. Apr 12 18:14:56.971172 systemd[1]: Reached target sockets.target. Apr 12 18:14:56.971897 systemd[1]: Reached target basic.target. Apr 12 18:14:56.972696 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:14:56.972728 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:14:56.973706 systemd[1]: Starting containerd.service... Apr 12 18:14:56.975352 systemd[1]: Starting dbus.service... Apr 12 18:14:56.977117 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:14:56.979001 systemd[1]: Starting extend-filesystems.service... Apr 12 18:14:56.982340 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:14:56.983441 systemd[1]: Starting motdgen.service... Apr 12 18:14:56.985229 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:14:56.987345 systemd[1]: Starting prepare-critools.service... Apr 12 18:14:56.989242 systemd[1]: Starting prepare-helm.service... Apr 12 18:14:56.991187 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:14:56.993233 systemd[1]: Starting sshd-keygen.service... Apr 12 18:14:56.996455 systemd[1]: Starting systemd-logind.service... Apr 12 18:14:56.997264 jq[1074]: false Apr 12 18:14:56.997276 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:14:56.997396 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:14:56.997788 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:14:56.999229 systemd[1]: Starting update-engine.service... Apr 12 18:14:57.001139 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:14:57.003510 jq[1094]: true Apr 12 18:14:57.004789 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:14:57.004964 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:14:57.005289 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:14:57.005480 systemd[1]: Finished motdgen.service. Apr 12 18:14:57.008424 dbus-daemon[1073]: [system] SELinux support is enabled Apr 12 18:14:57.011992 systemd[1]: Started dbus.service. Apr 12 18:14:57.015967 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:14:57.016162 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:14:57.019473 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:14:57.019508 systemd[1]: Reached target system-config.target. Apr 12 18:14:57.020751 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:14:57.020773 systemd[1]: Reached target user-config.target. Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda1 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda2 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda3 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found usr Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda4 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda6 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda7 Apr 12 18:14:57.024275 extend-filesystems[1075]: Found vda9 Apr 12 18:14:57.024275 extend-filesystems[1075]: Checking size of /dev/vda9 Apr 12 18:14:57.038542 tar[1097]: ./ Apr 12 18:14:57.038542 tar[1097]: ./loopback Apr 12 18:14:57.038803 tar[1099]: linux-arm64/helm Apr 12 18:14:57.038930 jq[1100]: true Apr 12 18:14:57.038984 tar[1098]: crictl Apr 12 18:14:57.075460 systemd-logind[1089]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:14:57.075667 systemd-logind[1089]: New seat seat0. Apr 12 18:14:57.086674 systemd[1]: Started systemd-logind.service. Apr 12 18:14:57.092259 extend-filesystems[1075]: Resized partition /dev/vda9 Apr 12 18:14:57.096525 extend-filesystems[1129]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:14:57.113315 bash[1126]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:14:57.114213 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:14:57.125260 tar[1097]: ./bandwidth Apr 12 18:14:57.127120 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:14:57.129809 update_engine[1091]: I0412 18:14:57.129196 1091 main.cc:92] Flatcar Update Engine starting Apr 12 18:14:57.139000 env[1102]: time="2024-04-12T18:14:57.138947342Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:14:57.142413 systemd[1]: Started update-engine.service. Apr 12 18:14:57.146061 systemd[1]: Started locksmithd.service. Apr 12 18:14:57.153083 update_engine[1091]: I0412 18:14:57.150130 1091 update_check_scheduler.cc:74] Next update check in 6m5s Apr 12 18:14:57.156089 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:14:57.171155 extend-filesystems[1129]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:14:57.171155 extend-filesystems[1129]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:14:57.171155 extend-filesystems[1129]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:14:57.175105 extend-filesystems[1075]: Resized filesystem in /dev/vda9 Apr 12 18:14:57.172018 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:14:57.172198 systemd[1]: Finished extend-filesystems.service. Apr 12 18:14:57.179338 env[1102]: time="2024-04-12T18:14:57.179058310Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:14:57.179481 env[1102]: time="2024-04-12T18:14:57.179456504Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183519 env[1102]: time="2024-04-12T18:14:57.183474442Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183519 env[1102]: time="2024-04-12T18:14:57.183513104Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183763 env[1102]: time="2024-04-12T18:14:57.183731452Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183763 env[1102]: time="2024-04-12T18:14:57.183757979Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183818 env[1102]: time="2024-04-12T18:14:57.183771525Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:14:57.183818 env[1102]: time="2024-04-12T18:14:57.183781765Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.183873 env[1102]: time="2024-04-12T18:14:57.183853446Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.184265 env[1102]: time="2024-04-12T18:14:57.184232127Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:14:57.184399 env[1102]: time="2024-04-12T18:14:57.184374964Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:14:57.184399 env[1102]: time="2024-04-12T18:14:57.184395968Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:14:57.184477 env[1102]: time="2024-04-12T18:14:57.184456884Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:14:57.184477 env[1102]: time="2024-04-12T18:14:57.184475711Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:14:57.187954 env[1102]: time="2024-04-12T18:14:57.187912102Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:14:57.187954 env[1102]: time="2024-04-12T18:14:57.187948386Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:14:57.188044 env[1102]: time="2024-04-12T18:14:57.187963786Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:14:57.188044 env[1102]: time="2024-04-12T18:14:57.187996119Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188044 env[1102]: time="2024-04-12T18:14:57.188013697Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188044 env[1102]: time="2024-04-12T18:14:57.188029621Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188044 env[1102]: time="2024-04-12T18:14:57.188041917Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188675 env[1102]: time="2024-04-12T18:14:57.188474984Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188712 env[1102]: time="2024-04-12T18:14:57.188679705Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188712 env[1102]: time="2024-04-12T18:14:57.188694420Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188712 env[1102]: time="2024-04-12T18:14:57.188708490Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.188776 env[1102]: time="2024-04-12T18:14:57.188723205Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:14:57.188855 env[1102]: time="2024-04-12T18:14:57.188822743Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:14:57.188947 env[1102]: time="2024-04-12T18:14:57.188927240Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:14:57.189261 env[1102]: time="2024-04-12T18:14:57.189239966Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:14:57.189296 env[1102]: time="2024-04-12T18:14:57.189274637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189296 env[1102]: time="2024-04-12T18:14:57.189290360Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:14:57.189483 env[1102]: time="2024-04-12T18:14:57.189399453Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189522 env[1102]: time="2024-04-12T18:14:57.189486010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189522 env[1102]: time="2024-04-12T18:14:57.189500120Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189522 env[1102]: time="2024-04-12T18:14:57.189511327Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189581 env[1102]: time="2024-04-12T18:14:57.189522979Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189581 env[1102]: time="2024-04-12T18:14:57.189535638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189581 env[1102]: time="2024-04-12T18:14:57.189546926Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189581 env[1102]: time="2024-04-12T18:14:57.189560472Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189581 env[1102]: time="2024-04-12T18:14:57.189573615Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:14:57.189708 env[1102]: time="2024-04-12T18:14:57.189687424Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189746 env[1102]: time="2024-04-12T18:14:57.189710082Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189746 env[1102]: time="2024-04-12T18:14:57.189723910Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.189746 env[1102]: time="2024-04-12T18:14:57.189735642Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:14:57.189811 env[1102]: time="2024-04-12T18:14:57.189748583Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:14:57.189811 env[1102]: time="2024-04-12T18:14:57.189760637Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:14:57.189811 env[1102]: time="2024-04-12T18:14:57.189777973Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:14:57.189872 env[1102]: time="2024-04-12T18:14:57.189810749Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:14:57.190055 env[1102]: time="2024-04-12T18:14:57.189999142Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.190059131Z" level=info msg="Connect containerd service" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.190104607Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.190690750Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.191058264Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.191122929Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.191164938Z" level=info msg="containerd successfully booted in 0.053329s" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192534326Z" level=info msg="Start subscribing containerd event" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192583833Z" level=info msg="Start recovering state" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192643983Z" level=info msg="Start event monitor" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192658618Z" level=info msg="Start snapshots syncer" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192668334Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:14:57.192786 env[1102]: time="2024-04-12T18:14:57.192676316Z" level=info msg="Start streaming server" Apr 12 18:14:57.191242 systemd[1]: Started containerd.service. Apr 12 18:14:57.212645 tar[1097]: ./ptp Apr 12 18:14:57.285237 tar[1097]: ./vlan Apr 12 18:14:57.337682 tar[1097]: ./host-device Apr 12 18:14:57.387447 tar[1097]: ./tuning Apr 12 18:14:57.426564 tar[1097]: ./vrf Apr 12 18:14:57.449129 tar[1099]: linux-arm64/LICENSE Apr 12 18:14:57.449236 tar[1099]: linux-arm64/README.md Apr 12 18:14:57.453486 systemd[1]: Finished prepare-helm.service. Apr 12 18:14:57.466058 locksmithd[1134]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:14:57.470097 tar[1097]: ./sbr Apr 12 18:14:57.509990 tar[1097]: ./tap Apr 12 18:14:57.550398 systemd[1]: Finished prepare-critools.service. Apr 12 18:14:57.557033 tar[1097]: ./dhcp Apr 12 18:14:57.633283 tar[1097]: ./static Apr 12 18:14:57.654640 tar[1097]: ./firewall Apr 12 18:14:57.686762 tar[1097]: ./macvlan Apr 12 18:14:57.716000 tar[1097]: ./dummy Apr 12 18:14:57.744780 tar[1097]: ./bridge Apr 12 18:14:57.776137 tar[1097]: ./ipvlan Apr 12 18:14:57.804919 tar[1097]: ./portmap Apr 12 18:14:57.832288 tar[1097]: ./host-local Apr 12 18:14:57.868454 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:14:57.960314 systemd-networkd[1003]: eth0: Gained IPv6LL Apr 12 18:14:58.268987 sshd_keygen[1096]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:14:58.286179 systemd[1]: Finished sshd-keygen.service. Apr 12 18:14:58.288425 systemd[1]: Starting issuegen.service... Apr 12 18:14:58.292897 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:14:58.293039 systemd[1]: Finished issuegen.service. Apr 12 18:14:58.295186 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:14:58.301361 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:14:58.303501 systemd[1]: Started getty@tty1.service. Apr 12 18:14:58.305368 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:14:58.306442 systemd[1]: Reached target getty.target. Apr 12 18:14:58.307246 systemd[1]: Reached target multi-user.target. Apr 12 18:14:58.309170 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:14:58.315255 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:14:58.315400 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:14:58.316404 systemd[1]: Startup finished in 574ms (kernel) + 19.310s (initrd) + 4.437s (userspace) = 24.323s. Apr 12 18:15:06.835432 systemd[1]: Created slice system-sshd.slice. Apr 12 18:15:06.836478 systemd[1]: Started sshd@0-10.0.0.7:22-10.0.0.1:44360.service. Apr 12 18:15:06.885926 sshd[1162]: Accepted publickey for core from 10.0.0.1 port 44360 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:06.887933 sshd[1162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:06.900246 systemd-logind[1089]: New session 1 of user core. Apr 12 18:15:06.901154 systemd[1]: Created slice user-500.slice. Apr 12 18:15:06.902211 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:15:06.909906 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:15:06.911224 systemd[1]: Starting user@500.service... Apr 12 18:15:06.913783 (systemd)[1165]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:06.974887 systemd[1165]: Queued start job for default target default.target. Apr 12 18:15:06.975437 systemd[1165]: Reached target paths.target. Apr 12 18:15:06.975457 systemd[1165]: Reached target sockets.target. Apr 12 18:15:06.975468 systemd[1165]: Reached target timers.target. Apr 12 18:15:06.975478 systemd[1165]: Reached target basic.target. Apr 12 18:15:06.975528 systemd[1165]: Reached target default.target. Apr 12 18:15:06.975551 systemd[1165]: Startup finished in 54ms. Apr 12 18:15:06.975693 systemd[1]: Started user@500.service. Apr 12 18:15:06.976636 systemd[1]: Started session-1.scope. Apr 12 18:15:07.028870 systemd[1]: Started sshd@1-10.0.0.7:22-10.0.0.1:44364.service. Apr 12 18:15:07.080856 sshd[1174]: Accepted publickey for core from 10.0.0.1 port 44364 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.082037 sshd[1174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.085463 systemd-logind[1089]: New session 2 of user core. Apr 12 18:15:07.086269 systemd[1]: Started session-2.scope. Apr 12 18:15:07.140526 sshd[1174]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:07.142984 systemd[1]: sshd@1-10.0.0.7:22-10.0.0.1:44364.service: Deactivated successfully. Apr 12 18:15:07.143542 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:15:07.144105 systemd-logind[1089]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:15:07.145430 systemd[1]: Started sshd@2-10.0.0.7:22-10.0.0.1:44380.service. Apr 12 18:15:07.146057 systemd-logind[1089]: Removed session 2. Apr 12 18:15:07.185621 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 44380 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.186702 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.189816 systemd-logind[1089]: New session 3 of user core. Apr 12 18:15:07.190612 systemd[1]: Started session-3.scope. Apr 12 18:15:07.239807 sshd[1180]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:07.243245 systemd[1]: sshd@2-10.0.0.7:22-10.0.0.1:44380.service: Deactivated successfully. Apr 12 18:15:07.243795 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:15:07.244351 systemd-logind[1089]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:15:07.245404 systemd[1]: Started sshd@3-10.0.0.7:22-10.0.0.1:44390.service. Apr 12 18:15:07.246097 systemd-logind[1089]: Removed session 3. Apr 12 18:15:07.285378 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 44390 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.286802 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.289906 systemd-logind[1089]: New session 4 of user core. Apr 12 18:15:07.290674 systemd[1]: Started session-4.scope. Apr 12 18:15:07.343778 sshd[1186]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:07.346169 systemd[1]: sshd@3-10.0.0.7:22-10.0.0.1:44390.service: Deactivated successfully. Apr 12 18:15:07.346686 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:15:07.347231 systemd-logind[1089]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:15:07.348165 systemd[1]: Started sshd@4-10.0.0.7:22-10.0.0.1:44404.service. Apr 12 18:15:07.348861 systemd-logind[1089]: Removed session 4. Apr 12 18:15:07.388220 sshd[1192]: Accepted publickey for core from 10.0.0.1 port 44404 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.389627 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.392711 systemd-logind[1089]: New session 5 of user core. Apr 12 18:15:07.393487 systemd[1]: Started session-5.scope. Apr 12 18:15:07.449550 sudo[1195]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:15:07.449769 sudo[1195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:15:07.463891 dbus-daemon[1073]: avc: received setenforce notice (enforcing=1) Apr 12 18:15:07.464047 sudo[1195]: pam_unix(sudo:session): session closed for user root Apr 12 18:15:07.466033 sshd[1192]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:07.469975 systemd[1]: sshd@4-10.0.0.7:22-10.0.0.1:44404.service: Deactivated successfully. Apr 12 18:15:07.470548 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:15:07.471119 systemd-logind[1089]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:15:07.472182 systemd[1]: Started sshd@5-10.0.0.7:22-10.0.0.1:44408.service. Apr 12 18:15:07.472846 systemd-logind[1089]: Removed session 5. Apr 12 18:15:07.512228 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 44408 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.513661 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.516918 systemd-logind[1089]: New session 6 of user core. Apr 12 18:15:07.517681 systemd[1]: Started session-6.scope. Apr 12 18:15:07.570380 sudo[1203]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:15:07.570582 sudo[1203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:15:07.573211 sudo[1203]: pam_unix(sudo:session): session closed for user root Apr 12 18:15:07.577629 sudo[1202]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:15:07.577854 sudo[1202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:15:07.585746 systemd[1]: Stopping audit-rules.service... Apr 12 18:15:07.585000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:15:07.587054 auditctl[1206]: No rules Apr 12 18:15:07.587273 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:15:07.587421 systemd[1]: Stopped audit-rules.service. Apr 12 18:15:07.587515 kernel: kauditd_printk_skb: 129 callbacks suppressed Apr 12 18:15:07.587554 kernel: audit: type=1305 audit(1712945707.585:161): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:15:07.588747 systemd[1]: Starting audit-rules.service... Apr 12 18:15:07.585000 audit[1206]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdae2dcb0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:07.592488 kernel: audit: type=1300 audit(1712945707.585:161): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdae2dcb0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:07.585000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:15:07.593880 kernel: audit: type=1327 audit(1712945707.585:161): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:15:07.593935 kernel: audit: type=1131 audit(1712945707.586:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.604640 augenrules[1223]: No rules Apr 12 18:15:07.605289 systemd[1]: Finished audit-rules.service. Apr 12 18:15:07.604000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.606379 sudo[1202]: pam_unix(sudo:session): session closed for user root Apr 12 18:15:07.607839 sshd[1199]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:07.605000 audit[1202]: USER_END pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.611154 kernel: audit: type=1130 audit(1712945707.604:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.611228 kernel: audit: type=1106 audit(1712945707.605:164): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.611247 kernel: audit: type=1104 audit(1712945707.605:165): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.605000 audit[1202]: CRED_DISP pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.610957 systemd[1]: Started sshd@6-10.0.0.7:22-10.0.0.1:44418.service. Apr 12 18:15:07.613498 kernel: audit: type=1130 audit(1712945707.610:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:44418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.610000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:44418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.613440 systemd[1]: sshd@5-10.0.0.7:22-10.0.0.1:44408.service: Deactivated successfully. Apr 12 18:15:07.614010 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:15:07.614617 systemd-logind[1089]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:15:07.615662 systemd-logind[1089]: Removed session 6. Apr 12 18:15:07.616011 kernel: audit: type=1106 audit(1712945707.610:167): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.610000 audit[1199]: USER_END pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.611000 audit[1199]: CRED_DISP pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.621721 kernel: audit: type=1104 audit(1712945707.611:168): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.612000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.7:22-10.0.0.1:44408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.651000 audit[1228]: USER_ACCT pid=1228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.652784 sshd[1228]: Accepted publickey for core from 10.0.0.1 port 44418 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:15:07.652000 audit[1228]: CRED_ACQ pid=1228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.652000 audit[1228]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffec114430 a2=3 a3=1 items=0 ppid=1 pid=1228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:07.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:15:07.654310 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:15:07.657777 systemd-logind[1089]: New session 7 of user core. Apr 12 18:15:07.658178 systemd[1]: Started session-7.scope. Apr 12 18:15:07.660000 audit[1228]: USER_START pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.662000 audit[1232]: CRED_ACQ pid=1232 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:07.709000 audit[1233]: USER_ACCT pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.711149 sudo[1233]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:15:07.711366 sudo[1233]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:15:07.710000 audit[1233]: CRED_REFR pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:07.711000 audit[1233]: USER_START pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:08.471825 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:15:08.477488 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:15:08.477808 systemd[1]: Reached target network-online.target. Apr 12 18:15:08.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:08.478958 systemd[1]: Starting docker.service... Apr 12 18:15:08.558532 env[1251]: time="2024-04-12T18:15:08.558474514Z" level=info msg="Starting up" Apr 12 18:15:08.560118 env[1251]: time="2024-04-12T18:15:08.560091242Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:15:08.560118 env[1251]: time="2024-04-12T18:15:08.560112881Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:15:08.560194 env[1251]: time="2024-04-12T18:15:08.560132316Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:15:08.560194 env[1251]: time="2024-04-12T18:15:08.560143056Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:15:08.564243 env[1251]: time="2024-04-12T18:15:08.564213867Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:15:08.564243 env[1251]: time="2024-04-12T18:15:08.564236068Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:15:08.564340 env[1251]: time="2024-04-12T18:15:08.564249813Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:15:08.564340 env[1251]: time="2024-04-12T18:15:08.564260352Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:15:08.585515 env[1251]: time="2024-04-12T18:15:08.585480739Z" level=info msg="Loading containers: start." Apr 12 18:15:08.628000 audit[1285]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.628000 audit[1285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffdf62c0a0 a2=0 a3=1 items=0 ppid=1251 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.628000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:15:08.630000 audit[1287]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.630000 audit[1287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffe2f997b0 a2=0 a3=1 items=0 ppid=1251 pid=1287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.630000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:15:08.631000 audit[1289]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.631000 audit[1289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcae7e340 a2=0 a3=1 items=0 ppid=1251 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.631000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:15:08.633000 audit[1291]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.633000 audit[1291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe08aedb0 a2=0 a3=1 items=0 ppid=1251 pid=1291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.633000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:15:08.637000 audit[1293]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.637000 audit[1293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff17e7990 a2=0 a3=1 items=0 ppid=1251 pid=1293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.637000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:15:08.660000 audit[1298]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.660000 audit[1298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc24693b0 a2=0 a3=1 items=0 ppid=1251 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:15:08.666000 audit[1300]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.666000 audit[1300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc4d900c0 a2=0 a3=1 items=0 ppid=1251 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.666000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:15:08.667000 audit[1302]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.667000 audit[1302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff1038b90 a2=0 a3=1 items=0 ppid=1251 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.667000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:15:08.669000 audit[1304]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.669000 audit[1304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffffe099a00 a2=0 a3=1 items=0 ppid=1251 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:15:08.675000 audit[1308]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.675000 audit[1308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffe2bab8d0 a2=0 a3=1 items=0 ppid=1251 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:15:08.675000 audit[1309]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.675000 audit[1309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd6f9c9c0 a2=0 a3=1 items=0 ppid=1251 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:15:08.688384 kernel: Initializing XFRM netlink socket Apr 12 18:15:08.710674 env[1251]: time="2024-04-12T18:15:08.710631653Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:15:08.724000 audit[1317]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.724000 audit[1317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffd0626fa0 a2=0 a3=1 items=0 ppid=1251 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.724000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:15:08.738000 audit[1320]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.738000 audit[1320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffffc8fbe60 a2=0 a3=1 items=0 ppid=1251 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:15:08.740000 audit[1323]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.740000 audit[1323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc83db8d0 a2=0 a3=1 items=0 ppid=1251 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.740000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:15:08.742000 audit[1325]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.742000 audit[1325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe5b43f40 a2=0 a3=1 items=0 ppid=1251 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:15:08.743000 audit[1327]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.743000 audit[1327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff25d2ae0 a2=0 a3=1 items=0 ppid=1251 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.743000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:15:08.745000 audit[1329]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.745000 audit[1329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffed62e510 a2=0 a3=1 items=0 ppid=1251 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:15:08.746000 audit[1331]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.746000 audit[1331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffcdd24bd0 a2=0 a3=1 items=0 ppid=1251 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.746000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:15:08.754000 audit[1334]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.754000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdfb21b10 a2=0 a3=1 items=0 ppid=1251 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.754000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:15:08.756000 audit[1336]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.756000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffd83fa0f0 a2=0 a3=1 items=0 ppid=1251 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.756000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:15:08.757000 audit[1338]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.757000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe6134d70 a2=0 a3=1 items=0 ppid=1251 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.757000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:15:08.759000 audit[1340]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.759000 audit[1340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffeb3b2450 a2=0 a3=1 items=0 ppid=1251 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.759000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:15:08.761004 systemd-networkd[1003]: docker0: Link UP Apr 12 18:15:08.766000 audit[1344]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.766000 audit[1344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffda9b7640 a2=0 a3=1 items=0 ppid=1251 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:15:08.767000 audit[1345]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:08.767000 audit[1345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffce8ef230 a2=0 a3=1 items=0 ppid=1251 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:08.767000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:15:08.768662 env[1251]: time="2024-04-12T18:15:08.768622988Z" level=info msg="Loading containers: done." Apr 12 18:15:08.791567 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2265167537-merged.mount: Deactivated successfully. Apr 12 18:15:08.797537 env[1251]: time="2024-04-12T18:15:08.797496956Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:15:08.797861 env[1251]: time="2024-04-12T18:15:08.797841780Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:15:08.798022 env[1251]: time="2024-04-12T18:15:08.798004515Z" level=info msg="Daemon has completed initialization" Apr 12 18:15:08.814185 systemd[1]: Started docker.service. Apr 12 18:15:08.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:08.820733 env[1251]: time="2024-04-12T18:15:08.820619588Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:15:08.839811 systemd[1]: Reloading. Apr 12 18:15:08.887663 /usr/lib/systemd/system-generators/torcx-generator[1394]: time="2024-04-12T18:15:08Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:15:08.887695 /usr/lib/systemd/system-generators/torcx-generator[1394]: time="2024-04-12T18:15:08Z" level=info msg="torcx already run" Apr 12 18:15:08.940881 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:15:08.940902 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:15:08.956390 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.005000 audit: BPF prog-id=34 op=LOAD Apr 12 18:15:09.005000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit: BPF prog-id=35 op=LOAD Apr 12 18:15:09.006000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit: BPF prog-id=36 op=LOAD Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.006000 audit: BPF prog-id=37 op=LOAD Apr 12 18:15:09.006000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:15:09.006000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.007000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.009000 audit: BPF prog-id=38 op=LOAD Apr 12 18:15:09.009000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit: BPF prog-id=39 op=LOAD Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.010000 audit: BPF prog-id=40 op=LOAD Apr 12 18:15:09.010000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:15:09.010000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.011000 audit: BPF prog-id=41 op=LOAD Apr 12 18:15:09.011000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit: BPF prog-id=42 op=LOAD Apr 12 18:15:09.012000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit: BPF prog-id=43 op=LOAD Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit: BPF prog-id=44 op=LOAD Apr 12 18:15:09.012000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:15:09.012000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit: BPF prog-id=45 op=LOAD Apr 12 18:15:09.013000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.013000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit: BPF prog-id=46 op=LOAD Apr 12 18:15:09.014000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit: BPF prog-id=47 op=LOAD Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:09.014000 audit: BPF prog-id=48 op=LOAD Apr 12 18:15:09.014000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:15:09.014000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:15:09.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:09.021468 systemd[1]: Started kubelet.service. Apr 12 18:15:09.164439 kubelet[1431]: E0412 18:15:09.164370 1431 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:15:09.166320 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:15:09.166447 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:15:09.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:15:09.459131 env[1102]: time="2024-04-12T18:15:09.458971362Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\"" Apr 12 18:15:10.077946 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2965545290.mount: Deactivated successfully. Apr 12 18:15:12.854369 env[1102]: time="2024-04-12T18:15:12.854312193Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:12.855519 env[1102]: time="2024-04-12T18:15:12.855488202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d4d4d261fc80c6c87ea30cb7d2b1a53b684be80fb7af5e16a2c97371e669f19f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:12.857145 env[1102]: time="2024-04-12T18:15:12.857114049Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:12.859618 env[1102]: time="2024-04-12T18:15:12.859589639Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cf0c29f585316888225cf254949988bdbedc7ba6238bc9a24bf6f0c508c42b6c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:12.860361 env[1102]: time="2024-04-12T18:15:12.860333109Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.12\" returns image reference \"sha256:d4d4d261fc80c6c87ea30cb7d2b1a53b684be80fb7af5e16a2c97371e669f19f\"" Apr 12 18:15:12.871984 env[1102]: time="2024-04-12T18:15:12.871945004Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\"" Apr 12 18:15:15.700002 env[1102]: time="2024-04-12T18:15:15.699949787Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:15.701634 env[1102]: time="2024-04-12T18:15:15.701603484Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a4a7509f59f7f027d7c434948b3b8e5463b835d28675c76c6d1ff21d2c4e8f18,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:15.703286 env[1102]: time="2024-04-12T18:15:15.703260464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:15.705007 env[1102]: time="2024-04-12T18:15:15.704972603Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:6caa3a4278e87169371d031861e49db21742bcbd8df650d7fe519a1a7f6764af,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:15.706430 env[1102]: time="2024-04-12T18:15:15.706390052Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.12\" returns image reference \"sha256:a4a7509f59f7f027d7c434948b3b8e5463b835d28675c76c6d1ff21d2c4e8f18\"" Apr 12 18:15:15.715710 env[1102]: time="2024-04-12T18:15:15.715677384Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\"" Apr 12 18:15:17.123865 env[1102]: time="2024-04-12T18:15:17.123807412Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:17.125019 env[1102]: time="2024-04-12T18:15:17.124991257Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5de6108d9220f19bcc35bf81a2879e5ff2f6506c08af260c116b803579db675b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:17.126621 env[1102]: time="2024-04-12T18:15:17.126599294Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:17.128212 env[1102]: time="2024-04-12T18:15:17.128182237Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b8bb7b17a4f915419575ceb885e128d0bb5ea8e67cb88dbde257988b770a4dce,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:17.129093 env[1102]: time="2024-04-12T18:15:17.129053312Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.12\" returns image reference \"sha256:5de6108d9220f19bcc35bf81a2879e5ff2f6506c08af260c116b803579db675b\"" Apr 12 18:15:17.137763 env[1102]: time="2024-04-12T18:15:17.137732723Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\"" Apr 12 18:15:18.362332 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1435417743.mount: Deactivated successfully. Apr 12 18:15:18.741438 env[1102]: time="2024-04-12T18:15:18.741334588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:18.742802 env[1102]: time="2024-04-12T18:15:18.742761229Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:18.744143 env[1102]: time="2024-04-12T18:15:18.744109352Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:18.745286 env[1102]: time="2024-04-12T18:15:18.745258860Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:b0539f35b586abc54ca7660f9bb8a539d010b9e07d20e9e3d529cf0ca35d4ddf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:18.745686 env[1102]: time="2024-04-12T18:15:18.745665134Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.12\" returns image reference \"sha256:7daec180765068529c26cc4c7c989513bebbe614cbbc58beebe1db17ae177e06\"" Apr 12 18:15:18.754352 env[1102]: time="2024-04-12T18:15:18.754298853Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:15:19.174096 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:15:19.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.174224 systemd[1]: Stopped kubelet.service. Apr 12 18:15:19.175600 systemd[1]: Started kubelet.service. Apr 12 18:15:19.179235 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:15:19.179327 kernel: audit: type=1130 audit(1712945719.173:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.179357 kernel: audit: type=1131 audit(1712945719.173:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.173000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.179429 kernel: audit: type=1130 audit(1712945719.174:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:19.181878 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2616319719.mount: Deactivated successfully. Apr 12 18:15:19.191581 env[1102]: time="2024-04-12T18:15:19.191533353Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:19.192872 env[1102]: time="2024-04-12T18:15:19.192835897Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:19.195308 env[1102]: time="2024-04-12T18:15:19.195271393Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:19.197012 env[1102]: time="2024-04-12T18:15:19.196980347Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:19.197408 env[1102]: time="2024-04-12T18:15:19.197380994Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:15:19.206920 env[1102]: time="2024-04-12T18:15:19.206890123Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Apr 12 18:15:19.226277 kubelet[1479]: E0412 18:15:19.226227 1479 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Apr 12 18:15:19.228877 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:15:19.229014 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:15:19.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:15:19.232090 kernel: audit: type=1131 audit(1712945719.228:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:15:19.937961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2098989506.mount: Deactivated successfully. Apr 12 18:15:22.099019 env[1102]: time="2024-04-12T18:15:22.098969234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:22.101089 env[1102]: time="2024-04-12T18:15:22.101045694Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:22.103437 env[1102]: time="2024-04-12T18:15:22.103396432Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:22.105136 env[1102]: time="2024-04-12T18:15:22.105107631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:22.105771 env[1102]: time="2024-04-12T18:15:22.105741488Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Apr 12 18:15:22.114956 env[1102]: time="2024-04-12T18:15:22.114916294Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:15:22.835267 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3292602278.mount: Deactivated successfully. Apr 12 18:15:24.241464 env[1102]: time="2024-04-12T18:15:24.241410661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:24.245480 env[1102]: time="2024-04-12T18:15:24.245438763Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:24.247819 env[1102]: time="2024-04-12T18:15:24.247785866Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:24.249644 env[1102]: time="2024-04-12T18:15:24.249610737Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:24.250225 env[1102]: time="2024-04-12T18:15:24.250201143Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 18:15:29.041120 systemd[1]: Stopped kubelet.service. Apr 12 18:15:29.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:29.040000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:29.046446 kernel: audit: type=1130 audit(1712945729.040:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:29.046542 kernel: audit: type=1131 audit(1712945729.040:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:29.056833 systemd[1]: Reloading. Apr 12 18:15:29.102832 /usr/lib/systemd/system-generators/torcx-generator[1593]: time="2024-04-12T18:15:29Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:15:29.102870 /usr/lib/systemd/system-generators/torcx-generator[1593]: time="2024-04-12T18:15:29Z" level=info msg="torcx already run" Apr 12 18:15:29.157854 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:15:29.157877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:15:29.173223 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:15:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.228468 kernel: audit: type=1400 audit(1712945729.222:384): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.228511 kernel: audit: type=1400 audit(1712945729.222:385): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.228531 kernel: audit: type=1400 audit(1712945729.223:386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232790 kernel: audit: type=1400 audit(1712945729.223:387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232824 kernel: audit: type=1400 audit(1712945729.223:388): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.237334 kernel: audit: type=1400 audit(1712945729.223:389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.237370 kernel: audit: type=1400 audit(1712945729.223:390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.237396 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.225000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.225000 audit: BPF prog-id=49 op=LOAD Apr 12 18:15:29.225000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.226000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit: BPF prog-id=50 op=LOAD Apr 12 18:15:29.227000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.227000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit: BPF prog-id=51 op=LOAD Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.229000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.231000 audit: BPF prog-id=52 op=LOAD Apr 12 18:15:29.231000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:15:29.231000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.232000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.233000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.233000 audit: BPF prog-id=53 op=LOAD Apr 12 18:15:29.233000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.236000 audit: BPF prog-id=54 op=LOAD Apr 12 18:15:29.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.236000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.236000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit: BPF prog-id=55 op=LOAD Apr 12 18:15:29.239000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:15:29.239000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.239000 audit: BPF prog-id=56 op=LOAD Apr 12 18:15:29.239000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.240000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit: BPF prog-id=57 op=LOAD Apr 12 18:15:29.241000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit: BPF prog-id=58 op=LOAD Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit: BPF prog-id=59 op=LOAD Apr 12 18:15:29.241000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:15:29.241000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.241000 audit: BPF prog-id=60 op=LOAD Apr 12 18:15:29.241000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit: BPF prog-id=61 op=LOAD Apr 12 18:15:29.242000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit: BPF prog-id=62 op=LOAD Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.242000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.243000 audit: BPF prog-id=63 op=LOAD Apr 12 18:15:29.243000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:15:29.243000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:15:29.262724 systemd[1]: Started kubelet.service. Apr 12 18:15:29.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:29.302801 kubelet[1631]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:15:29.302801 kubelet[1631]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:15:29.302801 kubelet[1631]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:15:29.302801 kubelet[1631]: I0412 18:15:29.302781 1631 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:15:29.866489 kubelet[1631]: I0412 18:15:29.866443 1631 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:15:29.866489 kubelet[1631]: I0412 18:15:29.866476 1631 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:15:29.866700 kubelet[1631]: I0412 18:15:29.866684 1631 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:15:29.871917 kubelet[1631]: I0412 18:15:29.871895 1631 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:15:29.872235 kubelet[1631]: E0412 18:15:29.872193 1631 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.7:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.873415 kubelet[1631]: W0412 18:15:29.873389 1631 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:15:29.874059 kubelet[1631]: I0412 18:15:29.874035 1631 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:15:29.874277 kubelet[1631]: I0412 18:15:29.874254 1631 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:15:29.874346 kubelet[1631]: I0412 18:15:29.874320 1631 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:15:29.874346 kubelet[1631]: I0412 18:15:29.874345 1631 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:15:29.874456 kubelet[1631]: I0412 18:15:29.874357 1631 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:15:29.874487 kubelet[1631]: I0412 18:15:29.874463 1631 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:15:29.877669 kubelet[1631]: I0412 18:15:29.877644 1631 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:15:29.877790 kubelet[1631]: I0412 18:15:29.877776 1631 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:15:29.877886 kubelet[1631]: I0412 18:15:29.877874 1631 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:15:29.877952 kubelet[1631]: I0412 18:15:29.877942 1631 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:15:29.878244 kubelet[1631]: W0412 18:15:29.878144 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.878244 kubelet[1631]: E0412 18:15:29.878198 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.878515 kubelet[1631]: W0412 18:15:29.878477 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.878567 kubelet[1631]: E0412 18:15:29.878517 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.878927 kubelet[1631]: I0412 18:15:29.878873 1631 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:15:29.879548 kubelet[1631]: W0412 18:15:29.879526 1631 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:15:29.880363 kubelet[1631]: I0412 18:15:29.880341 1631 server.go:1168] "Started kubelet" Apr 12 18:15:29.881333 kubelet[1631]: I0412 18:15:29.881243 1631 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:15:29.881641 kubelet[1631]: I0412 18:15:29.881604 1631 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:15:29.882000 audit[1631]: AVC avc: denied { mac_admin } for pid=1631 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.882000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:29.882000 audit[1631]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007356e0 a1=400086d6c8 a2=40007356b0 a3=25 items=0 ppid=1 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.882000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:29.882000 audit[1631]: AVC avc: denied { mac_admin } for pid=1631 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.882000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:29.882000 audit[1631]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ede020 a1=400086d6e0 a2=4000735770 a3=25 items=0 ppid=1 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.882000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:29.883102 kubelet[1631]: I0412 18:15:29.882695 1631 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:15:29.883102 kubelet[1631]: I0412 18:15:29.882743 1631 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:15:29.883102 kubelet[1631]: I0412 18:15:29.882745 1631 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:15:29.883102 kubelet[1631]: I0412 18:15:29.882811 1631 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:15:29.883379 kubelet[1631]: E0412 18:15:29.883267 1631 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17c59b10d509cc7d", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 15, 29, 880312957, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 15, 29, 880312957, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.0.0.7:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.7:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:15:29.883984 kubelet[1631]: E0412 18:15:29.883956 1631 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:15:29.884123 kubelet[1631]: E0412 18:15:29.884109 1631 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:15:29.884380 kubelet[1631]: I0412 18:15:29.884259 1631 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:15:29.884458 kubelet[1631]: I0412 18:15:29.884339 1631 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:15:29.884727 kubelet[1631]: W0412 18:15:29.884669 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.884789 kubelet[1631]: E0412 18:15:29.884721 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.7:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.885399 kubelet[1631]: E0412 18:15:29.885135 1631 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="200ms" Apr 12 18:15:29.889000 audit[1644]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1644 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.889000 audit[1644]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe58a5b90 a2=0 a3=1 items=0 ppid=1631 pid=1644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.889000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:15:29.890000 audit[1645]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1645 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.890000 audit[1645]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff8187220 a2=0 a3=1 items=0 ppid=1631 pid=1645 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:15:29.892000 audit[1647]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.892000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd7912220 a2=0 a3=1 items=0 ppid=1631 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.892000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:15:29.894000 audit[1649]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.894000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc4b11dc0 a2=0 a3=1 items=0 ppid=1631 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:15:29.903193 kubelet[1631]: I0412 18:15:29.903172 1631 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:15:29.903300 kubelet[1631]: I0412 18:15:29.903289 1631 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:15:29.903368 kubelet[1631]: I0412 18:15:29.903359 1631 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:15:29.903000 audit[1657]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.903000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffff46c8a0 a2=0 a3=1 items=0 ppid=1631 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:15:29.904318 kubelet[1631]: I0412 18:15:29.904297 1631 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:15:29.904000 audit[1658]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:29.904000 audit[1658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc43bf390 a2=0 a3=1 items=0 ppid=1631 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.905000 audit[1659]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.905000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5f41160 a2=0 a3=1 items=0 ppid=1631 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.905000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:15:29.904000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:15:29.905539 kubelet[1631]: I0412 18:15:29.905522 1631 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:15:29.905615 kubelet[1631]: I0412 18:15:29.905547 1631 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:15:29.905615 kubelet[1631]: I0412 18:15:29.905563 1631 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:15:29.905615 kubelet[1631]: E0412 18:15:29.905603 1631 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:15:29.906130 kubelet[1631]: W0412 18:15:29.906007 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.906130 kubelet[1631]: E0412 18:15:29.906039 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:29.906000 audit[1660]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.906000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe5361ab0 a2=0 a3=1 items=0 ppid=1631 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:15:29.906000 audit[1661]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:29.906000 audit[1661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffccc7e070 a2=0 a3=1 items=0 ppid=1631 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.906000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:15:29.907000 audit[1662]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:29.907000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd6b91450 a2=0 a3=1 items=0 ppid=1631 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:15:29.907000 audit[1663]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1663 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:29.907000 audit[1663]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffef856860 a2=0 a3=1 items=0 ppid=1631 pid=1663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.907000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:15:29.908000 audit[1664]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1664 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:29.908000 audit[1664]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffc8cc5530 a2=0 a3=1 items=0 ppid=1631 pid=1664 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.908000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:15:29.909248 kubelet[1631]: I0412 18:15:29.909226 1631 policy_none.go:49] "None policy: Start" Apr 12 18:15:29.909819 kubelet[1631]: I0412 18:15:29.909794 1631 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:15:29.909819 kubelet[1631]: I0412 18:15:29.909819 1631 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:15:29.914108 systemd[1]: Created slice kubepods.slice. Apr 12 18:15:29.917591 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:15:29.919787 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:15:29.934740 kubelet[1631]: I0412 18:15:29.934713 1631 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:15:29.934000 audit[1631]: AVC avc: denied { mac_admin } for pid=1631 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:29.934000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:29.934000 audit[1631]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c985a0 a1=4000b637a0 a2=4000c98570 a3=25 items=0 ppid=1 pid=1631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:29.934000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:29.935155 kubelet[1631]: I0412 18:15:29.935138 1631 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:15:29.935851 kubelet[1631]: I0412 18:15:29.935823 1631 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:15:29.935989 kubelet[1631]: E0412 18:15:29.935972 1631 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:15:29.985920 kubelet[1631]: I0412 18:15:29.985894 1631 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:15:29.986367 kubelet[1631]: E0412 18:15:29.986350 1631 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" Apr 12 18:15:30.006442 kubelet[1631]: I0412 18:15:30.006418 1631 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:30.007493 kubelet[1631]: I0412 18:15:30.007472 1631 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:30.008212 kubelet[1631]: I0412 18:15:30.008193 1631 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:30.012857 systemd[1]: Created slice kubepods-burstable-podea8eeb5651033a0389a42a5ba0c1960e.slice. Apr 12 18:15:30.029884 systemd[1]: Created slice kubepods-burstable-podb23ea803843027eb81926493bf073366.slice. Apr 12 18:15:30.033000 systemd[1]: Created slice kubepods-burstable-pod2f7d78630cba827a770c684e2dbe6ce6.slice. Apr 12 18:15:30.086276 kubelet[1631]: I0412 18:15:30.086245 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:30.086401 kubelet[1631]: E0412 18:15:30.086250 1631 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="400ms" Apr 12 18:15:30.086401 kubelet[1631]: I0412 18:15:30.086290 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:30.086401 kubelet[1631]: I0412 18:15:30.086326 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:30.086401 kubelet[1631]: I0412 18:15:30.086355 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:30.086401 kubelet[1631]: I0412 18:15:30.086372 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:30.086527 kubelet[1631]: I0412 18:15:30.086393 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:30.086527 kubelet[1631]: I0412 18:15:30.086412 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:30.086527 kubelet[1631]: I0412 18:15:30.086432 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:30.086527 kubelet[1631]: I0412 18:15:30.086451 1631 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2f7d78630cba827a770c684e2dbe6ce6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2f7d78630cba827a770c684e2dbe6ce6\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:15:30.190591 kubelet[1631]: I0412 18:15:30.187923 1631 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:15:30.190591 kubelet[1631]: E0412 18:15:30.188247 1631 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" Apr 12 18:15:30.328989 kubelet[1631]: E0412 18:15:30.328944 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.329695 env[1102]: time="2024-04-12T18:15:30.329628903Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ea8eeb5651033a0389a42a5ba0c1960e,Namespace:kube-system,Attempt:0,}" Apr 12 18:15:30.332288 kubelet[1631]: E0412 18:15:30.332268 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.332849 env[1102]: time="2024-04-12T18:15:30.332623476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b23ea803843027eb81926493bf073366,Namespace:kube-system,Attempt:0,}" Apr 12 18:15:30.335276 kubelet[1631]: E0412 18:15:30.335256 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.335600 env[1102]: time="2024-04-12T18:15:30.335560765Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2f7d78630cba827a770c684e2dbe6ce6,Namespace:kube-system,Attempt:0,}" Apr 12 18:15:30.487407 kubelet[1631]: E0412 18:15:30.486898 1631 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.7:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.7:6443: connect: connection refused" interval="800ms" Apr 12 18:15:30.590245 kubelet[1631]: I0412 18:15:30.590214 1631 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:15:30.590690 kubelet[1631]: E0412 18:15:30.590651 1631 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.7:6443/api/v1/nodes\": dial tcp 10.0.0.7:6443: connect: connection refused" node="localhost" Apr 12 18:15:30.719458 kubelet[1631]: W0412 18:15:30.719386 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.719458 kubelet[1631]: E0412 18:15:30.719446 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.7:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.790375 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1605270458.mount: Deactivated successfully. Apr 12 18:15:30.795230 kubelet[1631]: W0412 18:15:30.795171 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.795230 kubelet[1631]: E0412 18:15:30.795234 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.7:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.799103 env[1102]: time="2024-04-12T18:15:30.799042903Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.801669 env[1102]: time="2024-04-12T18:15:30.801593519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.803219 env[1102]: time="2024-04-12T18:15:30.803191574Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.803981 env[1102]: time="2024-04-12T18:15:30.803954558Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.805249 env[1102]: time="2024-04-12T18:15:30.805205864Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.806058 env[1102]: time="2024-04-12T18:15:30.806030694Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.807652 env[1102]: time="2024-04-12T18:15:30.807624829Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.809748 env[1102]: time="2024-04-12T18:15:30.809717846Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.810530 env[1102]: time="2024-04-12T18:15:30.810490591Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.811800 env[1102]: time="2024-04-12T18:15:30.811774340Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.813106 env[1102]: time="2024-04-12T18:15:30.813061529Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.814858 env[1102]: time="2024-04-12T18:15:30.814816557Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:30.839343 env[1102]: time="2024-04-12T18:15:30.838894875Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:30.839343 env[1102]: time="2024-04-12T18:15:30.839214302Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:30.839343 env[1102]: time="2024-04-12T18:15:30.839242064Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:30.839684 env[1102]: time="2024-04-12T18:15:30.839631897Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/34ddbc6e3f7d431fcc2a0a957e309493adfca2338afbdf16f93d80d0b23c434f pid=1677 runtime=io.containerd.runc.v2 Apr 12 18:15:30.839985 env[1102]: time="2024-04-12T18:15:30.839910081Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:30.839985 env[1102]: time="2024-04-12T18:15:30.839943364Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:30.839985 env[1102]: time="2024-04-12T18:15:30.839953644Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:30.840298 env[1102]: time="2024-04-12T18:15:30.840237268Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f06eb886ff82ec46bbc5b040f3708fb1da6f46f52de2ac43b0c182855736d44 pid=1683 runtime=io.containerd.runc.v2 Apr 12 18:15:30.843785 env[1102]: time="2024-04-12T18:15:30.843708802Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:30.843923 env[1102]: time="2024-04-12T18:15:30.843792769Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:30.843923 env[1102]: time="2024-04-12T18:15:30.843823172Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:30.844159 env[1102]: time="2024-04-12T18:15:30.844055392Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c54d9df19b58c42ebef80b88a39f4eca39b2b0f0aa59965a9231616beffef1c0 pid=1704 runtime=io.containerd.runc.v2 Apr 12 18:15:30.846645 kubelet[1631]: W0412 18:15:30.846595 1631 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.846645 kubelet[1631]: E0412 18:15:30.846642 1631 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.7:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.7:6443: connect: connection refused Apr 12 18:15:30.851812 systemd[1]: Started cri-containerd-34ddbc6e3f7d431fcc2a0a957e309493adfca2338afbdf16f93d80d0b23c434f.scope. Apr 12 18:15:30.856176 systemd[1]: Started cri-containerd-7f06eb886ff82ec46bbc5b040f3708fb1da6f46f52de2ac43b0c182855736d44.scope. Apr 12 18:15:30.869158 systemd[1]: Started cri-containerd-c54d9df19b58c42ebef80b88a39f4eca39b2b0f0aa59965a9231616beffef1c0.scope. Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.894000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit: BPF prog-id=64 op=LOAD Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1683 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303665623838366666383265633436626263356230343066333730 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1683 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303665623838366666383265633436626263356230343066333730 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit: BPF prog-id=65 op=LOAD Apr 12 18:15:30.898000 audit[1715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1683 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303665623838366666383265633436626263356230343066333730 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.898000 audit: BPF prog-id=66 op=LOAD Apr 12 18:15:30.898000 audit[1715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1683 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.898000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303665623838366666383265633436626263356230343066333730 Apr 12 18:15:30.898000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:15:30.898000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { perfmon } for pid=1715 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit[1715]: AVC avc: denied { bpf } for pid=1715 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.899000 audit: BPF prog-id=67 op=LOAD Apr 12 18:15:30.899000 audit[1715]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1683 pid=1715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766303665623838366666383265633436626263356230343066333730 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit: BPF prog-id=68 op=LOAD Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1704 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346439646631396235386334326562656638306238386133396634 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1704 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346439646631396235386334326562656638306238386133396634 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit: BPF prog-id=69 op=LOAD Apr 12 18:15:30.918000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1704 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346439646631396235386334326562656638306238386133396634 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.918000 audit: BPF prog-id=70 op=LOAD Apr 12 18:15:30.918000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1704 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346439646631396235386334326562656638306238386133396634 Apr 12 18:15:30.918000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:15:30.918000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { perfmon } for pid=1724 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1724]: AVC avc: denied { bpf } for pid=1724 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit: BPF prog-id=71 op=LOAD Apr 12 18:15:30.919000 audit[1724]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1704 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335346439646631396235386334326562656638306238386133396634 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit: BPF prog-id=72 op=LOAD Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646462633665336637643433316663633261306139353765333039 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646462633665336637643433316663633261306139353765333039 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.919000 audit: BPF prog-id=73 op=LOAD Apr 12 18:15:30.919000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646462633665336637643433316663633261306139353765333039 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit: BPF prog-id=74 op=LOAD Apr 12 18:15:30.920000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646462633665336637643433316663633261306139353765333039 Apr 12 18:15:30.920000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:15:30.920000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { perfmon } for pid=1710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit[1710]: AVC avc: denied { bpf } for pid=1710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:30.920000 audit: BPF prog-id=75 op=LOAD Apr 12 18:15:30.920000 audit[1710]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1677 pid=1710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:30.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3334646462633665336637643433316663633261306139353765333039 Apr 12 18:15:30.930510 env[1102]: time="2024-04-12T18:15:30.930465543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:b23ea803843027eb81926493bf073366,Namespace:kube-system,Attempt:0,} returns sandbox id \"7f06eb886ff82ec46bbc5b040f3708fb1da6f46f52de2ac43b0c182855736d44\"" Apr 12 18:15:30.931648 kubelet[1631]: E0412 18:15:30.931624 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.936311 env[1102]: time="2024-04-12T18:15:30.936272195Z" level=info msg="CreateContainer within sandbox \"7f06eb886ff82ec46bbc5b040f3708fb1da6f46f52de2ac43b0c182855736d44\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:15:30.943931 env[1102]: time="2024-04-12T18:15:30.943896000Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:ea8eeb5651033a0389a42a5ba0c1960e,Namespace:kube-system,Attempt:0,} returns sandbox id \"34ddbc6e3f7d431fcc2a0a957e309493adfca2338afbdf16f93d80d0b23c434f\"" Apr 12 18:15:30.944725 kubelet[1631]: E0412 18:15:30.944702 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.947181 env[1102]: time="2024-04-12T18:15:30.947144075Z" level=info msg="CreateContainer within sandbox \"34ddbc6e3f7d431fcc2a0a957e309493adfca2338afbdf16f93d80d0b23c434f\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:15:30.952682 env[1102]: time="2024-04-12T18:15:30.952631739Z" level=info msg="CreateContainer within sandbox \"7f06eb886ff82ec46bbc5b040f3708fb1da6f46f52de2ac43b0c182855736d44\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"fb753eb2995ffaf2d2c9b9a792caa8b4296ee73c58171380febe7991c5e0dd80\"" Apr 12 18:15:30.953243 env[1102]: time="2024-04-12T18:15:30.953214468Z" level=info msg="StartContainer for \"fb753eb2995ffaf2d2c9b9a792caa8b4296ee73c58171380febe7991c5e0dd80\"" Apr 12 18:15:30.954021 env[1102]: time="2024-04-12T18:15:30.953985773Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:2f7d78630cba827a770c684e2dbe6ce6,Namespace:kube-system,Attempt:0,} returns sandbox id \"c54d9df19b58c42ebef80b88a39f4eca39b2b0f0aa59965a9231616beffef1c0\"" Apr 12 18:15:30.954718 kubelet[1631]: E0412 18:15:30.954695 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:30.956683 env[1102]: time="2024-04-12T18:15:30.956646359Z" level=info msg="CreateContainer within sandbox \"c54d9df19b58c42ebef80b88a39f4eca39b2b0f0aa59965a9231616beffef1c0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:15:30.966369 env[1102]: time="2024-04-12T18:15:30.966322137Z" level=info msg="CreateContainer within sandbox \"34ddbc6e3f7d431fcc2a0a957e309493adfca2338afbdf16f93d80d0b23c434f\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"07ea65d8d471d40c0aae1dcf332b7ef111c8506eb539fc3c1c16b3f8f0a743ad\"" Apr 12 18:15:30.967193 env[1102]: time="2024-04-12T18:15:30.967161008Z" level=info msg="StartContainer for \"07ea65d8d471d40c0aae1dcf332b7ef111c8506eb539fc3c1c16b3f8f0a743ad\"" Apr 12 18:15:30.971662 systemd[1]: Started cri-containerd-fb753eb2995ffaf2d2c9b9a792caa8b4296ee73c58171380febe7991c5e0dd80.scope. Apr 12 18:15:30.973112 env[1102]: time="2024-04-12T18:15:30.973079189Z" level=info msg="CreateContainer within sandbox \"c54d9df19b58c42ebef80b88a39f4eca39b2b0f0aa59965a9231616beffef1c0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"801876dc5f41b0b9c1903b9bded0cfe5e41964200391138b1c8eedfdc3d35f2a\"" Apr 12 18:15:30.973528 env[1102]: time="2024-04-12T18:15:30.973500345Z" level=info msg="StartContainer for \"801876dc5f41b0b9c1903b9bded0cfe5e41964200391138b1c8eedfdc3d35f2a\"" Apr 12 18:15:30.986419 systemd[1]: Started cri-containerd-07ea65d8d471d40c0aae1dcf332b7ef111c8506eb539fc3c1c16b3f8f0a743ad.scope. Apr 12 18:15:30.995608 systemd[1]: Started cri-containerd-801876dc5f41b0b9c1903b9bded0cfe5e41964200391138b1c8eedfdc3d35f2a.scope. Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.023000 audit: BPF prog-id=76 op=LOAD Apr 12 18:15:31.024000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.024000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1677 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136356438643437316434306330616165316463663333326237 Apr 12 18:15:31.024000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.024000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1677 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.024000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136356438643437316434306330616165316463663333326237 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit: BPF prog-id=77 op=LOAD Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.025000 audit: BPF prog-id=78 op=LOAD Apr 12 18:15:31.025000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1677 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136356438643437316434306330616165316463663333326237 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.026000 audit: BPF prog-id=79 op=LOAD Apr 12 18:15:31.026000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1677 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.026000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136356438643437316434306330616165316463663333326237 Apr 12 18:15:31.026000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:15:31.027000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { perfmon } for pid=1822 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit[1822]: AVC avc: denied { bpf } for pid=1822 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.027000 audit: BPF prog-id=80 op=LOAD Apr 12 18:15:31.027000 audit[1822]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1677 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.027000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3037656136356438643437316434306330616165316463663333326237 Apr 12 18:15:31.028000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.028000 audit[1840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=1704 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.028000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313837366463356634316230623963313930336239626465643063 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=1704 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313837366463356634316230623963313930336239626465643063 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit: BPF prog-id=81 op=LOAD Apr 12 18:15:31.029000 audit[1840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=1704 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313837366463356634316230623963313930336239626465643063 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit: BPF prog-id=82 op=LOAD Apr 12 18:15:31.029000 audit[1840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=1704 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313837366463356634316230623963313930336239626465643063 Apr 12 18:15:31.029000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:15:31.029000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { perfmon } for pid=1840 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit[1840]: AVC avc: denied { bpf } for pid=1840 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.029000 audit: BPF prog-id=83 op=LOAD Apr 12 18:15:31.029000 audit[1840]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=1704 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830313837366463356634316230623963313930336239626465643063 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit: BPF prog-id=84 op=LOAD Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1683 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373533656232393935666661663264326339623961373932636161 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1683 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373533656232393935666661663264326339623961373932636161 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.034000 audit: BPF prog-id=85 op=LOAD Apr 12 18:15:31.034000 audit[1804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1683 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.034000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373533656232393935666661663264326339623961373932636161 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit: BPF prog-id=86 op=LOAD Apr 12 18:15:31.035000 audit[1804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1683 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373533656232393935666661663264326339623961373932636161 Apr 12 18:15:31.035000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:15:31.035000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { perfmon } for pid=1804 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit[1804]: AVC avc: denied { bpf } for pid=1804 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:31.035000 audit: BPF prog-id=87 op=LOAD Apr 12 18:15:31.035000 audit[1804]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1683 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:31.035000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662373533656232393935666661663264326339623961373932636161 Apr 12 18:15:31.070106 env[1102]: time="2024-04-12T18:15:31.054793417Z" level=info msg="StartContainer for \"801876dc5f41b0b9c1903b9bded0cfe5e41964200391138b1c8eedfdc3d35f2a\" returns successfully" Apr 12 18:15:31.070106 env[1102]: time="2024-04-12T18:15:31.068938907Z" level=info msg="StartContainer for \"07ea65d8d471d40c0aae1dcf332b7ef111c8506eb539fc3c1c16b3f8f0a743ad\" returns successfully" Apr 12 18:15:31.075306 env[1102]: time="2024-04-12T18:15:31.073961389Z" level=info msg="StartContainer for \"fb753eb2995ffaf2d2c9b9a792caa8b4296ee73c58171380febe7991c5e0dd80\" returns successfully" Apr 12 18:15:31.391938 kubelet[1631]: I0412 18:15:31.391910 1631 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:15:31.915408 kubelet[1631]: E0412 18:15:31.915376 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:31.917017 kubelet[1631]: E0412 18:15:31.916994 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:31.918121 kubelet[1631]: E0412 18:15:31.918102 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:32.632000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.632000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4003efc000 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.632000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.632000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=40064da040 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.632000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.632000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4003fec000 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.633000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.633000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=3e a1=4003efc4e0 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.633000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.674000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.674000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=53 a1=40000e7fa0 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.674000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:32.674000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=53 a1=40044a8150 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:15:32.674000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:15:32.723004 kubelet[1631]: E0412 18:15:32.722970 1631 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:15:32.811640 kubelet[1631]: I0412 18:15:32.811604 1631 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:15:32.821734 kubelet[1631]: E0412 18:15:32.821701 1631 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:15:32.920093 kubelet[1631]: E0412 18:15:32.919991 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:32.922702 kubelet[1631]: E0412 18:15:32.922682 1631 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:15:33.023005 kubelet[1631]: E0412 18:15:33.022968 1631 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:15:33.123261 kubelet[1631]: E0412 18:15:33.123232 1631 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:15:33.771000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:33.771000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40001d8b20 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:33.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:33.771000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:33.771000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000589140 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:33.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:33.880795 kubelet[1631]: I0412 18:15:33.880762 1631 apiserver.go:52] "Watching apiserver" Apr 12 18:15:33.885141 kubelet[1631]: I0412 18:15:33.885117 1631 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:15:33.909551 kubelet[1631]: I0412 18:15:33.909522 1631 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:15:35.015184 kubelet[1631]: E0412 18:15:35.015095 1631 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:35.339912 systemd[1]: Reloading. Apr 12 18:15:35.393105 /usr/lib/systemd/system-generators/torcx-generator[1932]: time="2024-04-12T18:15:35Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:15:35.393136 /usr/lib/systemd/system-generators/torcx-generator[1932]: time="2024-04-12T18:15:35Z" level=info msg="torcx already run" Apr 12 18:15:35.447147 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:15:35.447168 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:15:35.462713 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526321 kernel: kauditd_printk_skb: 581 callbacks suppressed Apr 12 18:15:35.526389 kernel: audit: type=1400 audit(1712945735.524:687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.530995 kernel: audit: type=1400 audit(1712945735.524:688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.531038 kernel: audit: type=1400 audit(1712945735.524:689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535729 kernel: audit: type=1400 audit(1712945735.524:690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.538087 kernel: audit: type=1400 audit(1712945735.524:691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.538132 kernel: audit: type=1400 audit(1712945735.524:692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.540386 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:15:35.540444 kernel: audit: type=1400 audit(1712945735.524:693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.543323 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:15:35.543365 kernel: audit: type=1400 audit(1712945735.524:694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.524000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.525000 audit: BPF prog-id=88 op=LOAD Apr 12 18:15:35.525000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit: BPF prog-id=89 op=LOAD Apr 12 18:15:35.527000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.527000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit: BPF prog-id=90 op=LOAD Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.532000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.532000 audit: BPF prog-id=91 op=LOAD Apr 12 18:15:35.532000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:15:35.532000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.534000 audit: BPF prog-id=92 op=LOAD Apr 12 18:15:35.534000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.537000 audit: BPF prog-id=93 op=LOAD Apr 12 18:15:35.537000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:15:35.537000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.542000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.542000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.545000 audit: BPF prog-id=95 op=LOAD Apr 12 18:15:35.545000 audit: BPF prog-id=68 op=UNLOAD Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.546000 audit: BPF prog-id=96 op=LOAD Apr 12 18:15:35.546000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit: BPF prog-id=97 op=LOAD Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.547000 audit: BPF prog-id=98 op=LOAD Apr 12 18:15:35.547000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:15:35.547000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.548000 audit: BPF prog-id=99 op=LOAD Apr 12 18:15:35.548000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit: BPF prog-id=100 op=LOAD Apr 12 18:15:35.549000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit: BPF prog-id=101 op=LOAD Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.549000 audit: BPF prog-id=102 op=LOAD Apr 12 18:15:35.549000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:15:35.549000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit: BPF prog-id=103 op=LOAD Apr 12 18:15:35.550000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.550000 audit: BPF prog-id=104 op=LOAD Apr 12 18:15:35.550000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit: BPF prog-id=105 op=LOAD Apr 12 18:15:35.551000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.551000 audit: BPF prog-id=106 op=LOAD Apr 12 18:15:35.551000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit: BPF prog-id=107 op=LOAD Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.552000 audit: BPF prog-id=108 op=LOAD Apr 12 18:15:35.552000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:15:35.552000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:15:35.569141 kubelet[1631]: I0412 18:15:35.569106 1631 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:15:35.570255 systemd[1]: Stopping kubelet.service... Apr 12 18:15:35.589447 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:15:35.589658 systemd[1]: Stopped kubelet.service. Apr 12 18:15:35.588000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:35.591430 systemd[1]: Started kubelet.service. Apr 12 18:15:35.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:35.652274 kubelet[1970]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:15:35.652630 kubelet[1970]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:15:35.652690 kubelet[1970]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:15:35.652820 kubelet[1970]: I0412 18:15:35.652786 1970 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:15:35.660720 kubelet[1970]: I0412 18:15:35.660691 1970 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Apr 12 18:15:35.660956 kubelet[1970]: I0412 18:15:35.660941 1970 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:15:35.661237 kubelet[1970]: I0412 18:15:35.661218 1970 server.go:837] "Client rotation is on, will bootstrap in background" Apr 12 18:15:35.662825 kubelet[1970]: I0412 18:15:35.662802 1970 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:15:35.663925 kubelet[1970]: I0412 18:15:35.663889 1970 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:15:35.665827 kubelet[1970]: W0412 18:15:35.665813 1970 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:15:35.666836 kubelet[1970]: I0412 18:15:35.666816 1970 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:15:35.667169 kubelet[1970]: I0412 18:15:35.667157 1970 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:15:35.667316 kubelet[1970]: I0412 18:15:35.667302 1970 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Apr 12 18:15:35.667447 kubelet[1970]: I0412 18:15:35.667434 1970 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Apr 12 18:15:35.667511 kubelet[1970]: I0412 18:15:35.667501 1970 container_manager_linux.go:302] "Creating device plugin manager" Apr 12 18:15:35.667591 kubelet[1970]: I0412 18:15:35.667580 1970 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:15:35.670441 kubelet[1970]: I0412 18:15:35.670423 1970 kubelet.go:405] "Attempting to sync node with API server" Apr 12 18:15:35.670510 kubelet[1970]: I0412 18:15:35.670445 1970 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:15:35.670510 kubelet[1970]: I0412 18:15:35.670467 1970 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:15:35.670510 kubelet[1970]: I0412 18:15:35.670481 1970 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:15:35.671270 kubelet[1970]: I0412 18:15:35.671240 1970 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:15:35.671722 kubelet[1970]: I0412 18:15:35.671688 1970 server.go:1168] "Started kubelet" Apr 12 18:15:35.672950 kubelet[1970]: E0412 18:15:35.672912 1970 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:15:35.672950 kubelet[1970]: E0412 18:15:35.672943 1970 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:15:35.672000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.672000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:35.672000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000501d40 a1=4000d72360 a2=4000501d10 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:35.672000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:35.672000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.672000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:35.672000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000585b40 a1=4000d72378 a2=4000501dd0 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:35.672000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:35.673584 kubelet[1970]: I0412 18:15:35.673364 1970 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:15:35.673584 kubelet[1970]: I0412 18:15:35.673408 1970 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:15:35.673584 kubelet[1970]: I0412 18:15:35.673435 1970 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:15:35.675002 kubelet[1970]: I0412 18:15:35.674962 1970 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:15:35.675827 kubelet[1970]: I0412 18:15:35.675738 1970 volume_manager.go:284] "Starting Kubelet Volume Manager" Apr 12 18:15:35.676036 kubelet[1970]: I0412 18:15:35.676019 1970 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Apr 12 18:15:35.676184 kubelet[1970]: I0412 18:15:35.675756 1970 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:15:35.677105 kubelet[1970]: I0412 18:15:35.675883 1970 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:15:35.701294 kubelet[1970]: I0412 18:15:35.701271 1970 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Apr 12 18:15:35.702257 kubelet[1970]: I0412 18:15:35.702240 1970 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Apr 12 18:15:35.702344 kubelet[1970]: I0412 18:15:35.702333 1970 status_manager.go:207] "Starting to sync pod status with apiserver" Apr 12 18:15:35.702412 kubelet[1970]: I0412 18:15:35.702402 1970 kubelet.go:2257] "Starting kubelet main sync loop" Apr 12 18:15:35.702539 kubelet[1970]: E0412 18:15:35.702524 1970 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:15:35.741365 kubelet[1970]: I0412 18:15:35.741335 1970 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:15:35.741535 kubelet[1970]: I0412 18:15:35.741522 1970 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:15:35.741627 kubelet[1970]: I0412 18:15:35.741617 1970 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:15:35.741838 kubelet[1970]: I0412 18:15:35.741824 1970 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:15:35.741935 kubelet[1970]: I0412 18:15:35.741923 1970 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Apr 12 18:15:35.741990 kubelet[1970]: I0412 18:15:35.741980 1970 policy_none.go:49] "None policy: Start" Apr 12 18:15:35.743642 kubelet[1970]: I0412 18:15:35.743626 1970 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:15:35.743742 kubelet[1970]: I0412 18:15:35.743730 1970 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:15:35.744200 kubelet[1970]: I0412 18:15:35.744178 1970 state_mem.go:75] "Updated machine memory state" Apr 12 18:15:35.749524 kubelet[1970]: I0412 18:15:35.749497 1970 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:15:35.748000 audit[1970]: AVC avc: denied { mac_admin } for pid=1970 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:35.748000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:15:35.748000 audit[1970]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40013a9320 a1=4001431128 a2=40013a92f0 a3=25 items=0 ppid=1 pid=1970 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:35.748000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:15:35.749801 kubelet[1970]: I0412 18:15:35.749563 1970 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:15:35.749801 kubelet[1970]: I0412 18:15:35.749754 1970 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:15:35.779123 kubelet[1970]: I0412 18:15:35.779096 1970 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:15:35.786001 kubelet[1970]: I0412 18:15:35.785975 1970 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Apr 12 18:15:35.786086 kubelet[1970]: I0412 18:15:35.786053 1970 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:15:35.803391 kubelet[1970]: I0412 18:15:35.803361 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:35.803484 kubelet[1970]: I0412 18:15:35.803442 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:35.803573 kubelet[1970]: I0412 18:15:35.803543 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:35.812062 kubelet[1970]: E0412 18:15:35.812035 1970 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Apr 12 18:15:35.878630 kubelet[1970]: I0412 18:15:35.878503 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:35.878630 kubelet[1970]: I0412 18:15:35.878593 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:35.879333 kubelet[1970]: I0412 18:15:35.879215 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:35.879333 kubelet[1970]: I0412 18:15:35.879289 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2f7d78630cba827a770c684e2dbe6ce6-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"2f7d78630cba827a770c684e2dbe6ce6\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:15:35.879333 kubelet[1970]: I0412 18:15:35.879326 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:35.879333 kubelet[1970]: I0412 18:15:35.879377 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:35.879583 kubelet[1970]: I0412 18:15:35.879399 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/ea8eeb5651033a0389a42a5ba0c1960e-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"ea8eeb5651033a0389a42a5ba0c1960e\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:35.879583 kubelet[1970]: I0412 18:15:35.879442 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:35.879583 kubelet[1970]: I0412 18:15:35.879476 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b23ea803843027eb81926493bf073366-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"b23ea803843027eb81926493bf073366\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:36.111861 kubelet[1970]: E0412 18:15:36.111829 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.111991 kubelet[1970]: E0412 18:15:36.111927 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.113356 kubelet[1970]: E0412 18:15:36.113339 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.671365 kubelet[1970]: I0412 18:15:36.671335 1970 apiserver.go:52] "Watching apiserver" Apr 12 18:15:36.677355 kubelet[1970]: I0412 18:15:36.677115 1970 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Apr 12 18:15:36.685312 kubelet[1970]: I0412 18:15:36.685284 1970 reconciler.go:41] "Reconciler: start to sync state" Apr 12 18:15:36.719503 kubelet[1970]: E0412 18:15:36.719474 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.725808 kubelet[1970]: E0412 18:15:36.725736 1970 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:15:36.726264 kubelet[1970]: E0412 18:15:36.726239 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.727643 kubelet[1970]: E0412 18:15:36.727609 1970 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Apr 12 18:15:36.728025 kubelet[1970]: E0412 18:15:36.727997 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:36.756711 kubelet[1970]: I0412 18:15:36.756675 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.756627483 podCreationTimestamp="2024-04-12 18:15:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:15:36.741839029 +0000 UTC m=+1.143781936" watchObservedRunningTime="2024-04-12 18:15:36.756627483 +0000 UTC m=+1.158570430" Apr 12 18:15:36.763434 kubelet[1970]: I0412 18:15:36.763395 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=1.763364131 podCreationTimestamp="2024-04-12 18:15:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:15:36.757442413 +0000 UTC m=+1.159385360" watchObservedRunningTime="2024-04-12 18:15:36.763364131 +0000 UTC m=+1.165307078" Apr 12 18:15:36.772741 kubelet[1970]: I0412 18:15:36.772700 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.772668973 podCreationTimestamp="2024-04-12 18:15:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:15:36.763737993 +0000 UTC m=+1.165680940" watchObservedRunningTime="2024-04-12 18:15:36.772668973 +0000 UTC m=+1.174611920" Apr 12 18:15:37.721271 kubelet[1970]: E0412 18:15:37.721225 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:37.722118 kubelet[1970]: E0412 18:15:37.722098 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:39.055383 kubelet[1970]: E0412 18:15:39.055346 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:39.468599 kubelet[1970]: E0412 18:15:39.468560 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:40.594677 sudo[1233]: pam_unix(sudo:session): session closed for user root Apr 12 18:15:40.593000 audit[1233]: USER_END pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.595726 kernel: kauditd_printk_skb: 264 callbacks suppressed Apr 12 18:15:40.595774 kernel: audit: type=1106 audit(1712945740.593:928): pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.596602 sshd[1228]: pam_unix(sshd:session): session closed for user core Apr 12 18:15:40.594000 audit[1233]: CRED_DISP pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.601422 kernel: audit: type=1104 audit(1712945740.594:929): pid=1233 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.600000 audit[1228]: USER_END pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:40.603516 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:15:40.603715 systemd[1]: session-7.scope: Consumed 6.599s CPU time. Apr 12 18:15:40.604395 systemd[1]: sshd@6-10.0.0.7:22-10.0.0.1:44418.service: Deactivated successfully. Apr 12 18:15:40.605223 kernel: audit: type=1106 audit(1712945740.600:930): pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:40.601000 audit[1228]: CRED_DISP pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:40.608181 kernel: audit: type=1104 audit(1712945740.601:931): pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:15:40.603000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:44418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.608342 systemd-logind[1089]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:15:40.610849 kernel: audit: type=1131 audit(1712945740.603:932): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.7:22-10.0.0.1:44418 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:15:40.611299 systemd-logind[1089]: Removed session 7. Apr 12 18:15:40.692601 kubelet[1970]: E0412 18:15:40.692566 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:41.995359 update_engine[1091]: I0412 18:15:41.995286 1091 update_attempter.cc:509] Updating boot flags... Apr 12 18:15:47.689000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.696526 kernel: audit: type=1400 audit(1712945747.689:933): avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.696611 kernel: audit: type=1400 audit(1712945747.691:934): avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.696634 kernel: audit: type=1300 audit(1712945747.691:934): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b0b7a0 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b0b7a0 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.704163 kernel: audit: type=1327 audit(1712945747.691:934): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.704255 kernel: audit: type=1400 audit(1712945747.691:935): avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b0b960 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.710756 kernel: audit: type=1300 audit(1712945747.691:935): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000b0b960 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.710810 kernel: audit: type=1327 audit(1712945747.691:935): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.715157 kernel: audit: type=1300 audit(1712945747.689:933): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c35740 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.689000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c35740 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.718791 kernel: audit: type=1327 audit(1712945747.689:933): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.689000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000be0680 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.725090 kernel: audit: type=1400 audit(1712945747.691:936): avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:15:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:47.816000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521026 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:15:47.816000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40006ad700 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:15:47.816000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:15:49.064574 kubelet[1970]: E0412 18:15:49.064163 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:49.476433 kubelet[1970]: E0412 18:15:49.475979 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:50.701789 kubelet[1970]: E0412 18:15:50.701759 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:51.335142 kubelet[1970]: I0412 18:15:51.335109 1970 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:15:51.335503 env[1102]: time="2024-04-12T18:15:51.335451875Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:15:51.335770 kubelet[1970]: I0412 18:15:51.335633 1970 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:15:51.982595 kubelet[1970]: I0412 18:15:51.982559 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:51.987683 systemd[1]: Created slice kubepods-besteffort-poddfd84e2b_80fb_41d2_b71d_9fc276aa035d.slice. Apr 12 18:15:51.995999 kubelet[1970]: I0412 18:15:51.995958 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/dfd84e2b-80fb-41d2-b71d-9fc276aa035d-kube-proxy\") pod \"kube-proxy-jbxhc\" (UID: \"dfd84e2b-80fb-41d2-b71d-9fc276aa035d\") " pod="kube-system/kube-proxy-jbxhc" Apr 12 18:15:51.995999 kubelet[1970]: I0412 18:15:51.995998 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dfd84e2b-80fb-41d2-b71d-9fc276aa035d-xtables-lock\") pod \"kube-proxy-jbxhc\" (UID: \"dfd84e2b-80fb-41d2-b71d-9fc276aa035d\") " pod="kube-system/kube-proxy-jbxhc" Apr 12 18:15:51.996185 kubelet[1970]: I0412 18:15:51.996021 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vxrlg\" (UniqueName: \"kubernetes.io/projected/dfd84e2b-80fb-41d2-b71d-9fc276aa035d-kube-api-access-vxrlg\") pod \"kube-proxy-jbxhc\" (UID: \"dfd84e2b-80fb-41d2-b71d-9fc276aa035d\") " pod="kube-system/kube-proxy-jbxhc" Apr 12 18:15:51.996185 kubelet[1970]: I0412 18:15:51.996044 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dfd84e2b-80fb-41d2-b71d-9fc276aa035d-lib-modules\") pod \"kube-proxy-jbxhc\" (UID: \"dfd84e2b-80fb-41d2-b71d-9fc276aa035d\") " pod="kube-system/kube-proxy-jbxhc" Apr 12 18:15:52.142906 kubelet[1970]: I0412 18:15:52.142851 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:52.147952 systemd[1]: Created slice kubepods-besteffort-pod98ab58bb_b1d6_4eb3_a3fd_4d8344fca4b1.slice. Apr 12 18:15:52.197588 kubelet[1970]: I0412 18:15:52.197539 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1-var-lib-calico\") pod \"tigera-operator-786dc9d695-w4b94\" (UID: \"98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1\") " pod="tigera-operator/tigera-operator-786dc9d695-w4b94" Apr 12 18:15:52.197588 kubelet[1970]: I0412 18:15:52.197597 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j7bhg\" (UniqueName: \"kubernetes.io/projected/98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1-kube-api-access-j7bhg\") pod \"tigera-operator-786dc9d695-w4b94\" (UID: \"98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1\") " pod="tigera-operator/tigera-operator-786dc9d695-w4b94" Apr 12 18:15:52.293894 kubelet[1970]: E0412 18:15:52.293791 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:52.294674 env[1102]: time="2024-04-12T18:15:52.294627183Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jbxhc,Uid:dfd84e2b-80fb-41d2-b71d-9fc276aa035d,Namespace:kube-system,Attempt:0,}" Apr 12 18:15:52.319035 env[1102]: time="2024-04-12T18:15:52.318799969Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:52.319035 env[1102]: time="2024-04-12T18:15:52.318839691Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:52.319035 env[1102]: time="2024-04-12T18:15:52.318850131Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:52.319035 env[1102]: time="2024-04-12T18:15:52.319004775Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a9f50aae8c645e28be016c416e4725481c3abd0481c676d327cd559ef08de6e0 pid=2080 runtime=io.containerd.runc.v2 Apr 12 18:15:52.330276 systemd[1]: Started cri-containerd-a9f50aae8c645e28be016c416e4725481c3abd0481c676d327cd559ef08de6e0.scope. Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.369000 audit: BPF prog-id=109 op=LOAD Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=2080 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663530616165386336343565323862653031366334313665343732 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=2080 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663530616165386336343565323862653031366334313665343732 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit: BPF prog-id=110 op=LOAD Apr 12 18:15:52.370000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=2080 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663530616165386336343565323862653031366334313665343732 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit: BPF prog-id=111 op=LOAD Apr 12 18:15:52.370000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=2080 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663530616165386336343565323862653031366334313665343732 Apr 12 18:15:52.370000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:15:52.370000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { perfmon } for pid=2089 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit[2089]: AVC avc: denied { bpf } for pid=2089 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.370000 audit: BPF prog-id=112 op=LOAD Apr 12 18:15:52.370000 audit[2089]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=2080 pid=2089 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139663530616165386336343565323862653031366334313665343732 Apr 12 18:15:52.382764 env[1102]: time="2024-04-12T18:15:52.382717973Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-jbxhc,Uid:dfd84e2b-80fb-41d2-b71d-9fc276aa035d,Namespace:kube-system,Attempt:0,} returns sandbox id \"a9f50aae8c645e28be016c416e4725481c3abd0481c676d327cd559ef08de6e0\"" Apr 12 18:15:52.383825 kubelet[1970]: E0412 18:15:52.383786 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:52.389354 env[1102]: time="2024-04-12T18:15:52.389316795Z" level=info msg="CreateContainer within sandbox \"a9f50aae8c645e28be016c416e4725481c3abd0481c676d327cd559ef08de6e0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:15:52.401447 env[1102]: time="2024-04-12T18:15:52.401402968Z" level=info msg="CreateContainer within sandbox \"a9f50aae8c645e28be016c416e4725481c3abd0481c676d327cd559ef08de6e0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d0393e6f6b5e974edc255fe5bfcdb688280a0bf2e73a50539adaddaf5d773b92\"" Apr 12 18:15:52.403223 env[1102]: time="2024-04-12T18:15:52.403178097Z" level=info msg="StartContainer for \"d0393e6f6b5e974edc255fe5bfcdb688280a0bf2e73a50539adaddaf5d773b92\"" Apr 12 18:15:52.418355 systemd[1]: Started cri-containerd-d0393e6f6b5e974edc255fe5bfcdb688280a0bf2e73a50539adaddaf5d773b92.scope. Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2080 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333933653666366235653937346564633235356665356266636462 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.443000 audit: BPF prog-id=113 op=LOAD Apr 12 18:15:52.443000 audit[2120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2080 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.443000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333933653666366235653937346564633235356665356266636462 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.444000 audit: BPF prog-id=114 op=LOAD Apr 12 18:15:52.444000 audit[2120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2080 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.444000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333933653666366235653937346564633235356665356266636462 Apr 12 18:15:52.445000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:15:52.445000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { perfmon } for pid=2120 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit[2120]: AVC avc: denied { bpf } for pid=2120 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.445000 audit: BPF prog-id=115 op=LOAD Apr 12 18:15:52.445000 audit[2120]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2080 pid=2120 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.445000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430333933653666366235653937346564633235356665356266636462 Apr 12 18:15:52.450911 env[1102]: time="2024-04-12T18:15:52.450859092Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-w4b94,Uid:98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:15:52.467101 env[1102]: time="2024-04-12T18:15:52.464467028Z" level=info msg="StartContainer for \"d0393e6f6b5e974edc255fe5bfcdb688280a0bf2e73a50539adaddaf5d773b92\" returns successfully" Apr 12 18:15:52.471261 env[1102]: time="2024-04-12T18:15:52.471186893Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:52.471261 env[1102]: time="2024-04-12T18:15:52.471233215Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:52.471569 env[1102]: time="2024-04-12T18:15:52.471243935Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:52.471569 env[1102]: time="2024-04-12T18:15:52.471502542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fe217a9d1487494031d977e16ec9da9cffa5bb891422006e1640a0735c1a70f8 pid=2151 runtime=io.containerd.runc.v2 Apr 12 18:15:52.482564 systemd[1]: Started cri-containerd-fe217a9d1487494031d977e16ec9da9cffa5bb891422006e1640a0735c1a70f8.scope. Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.507000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.507000 audit: BPF prog-id=116 op=LOAD Apr 12 18:15:52.507000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.507000 audit[2165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2151 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665323137613964313438373439343033316439373765313665633964 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2151 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665323137613964313438373439343033316439373765313665633964 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit: BPF prog-id=117 op=LOAD Apr 12 18:15:52.508000 audit[2165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2151 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665323137613964313438373439343033316439373765313665633964 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit: BPF prog-id=118 op=LOAD Apr 12 18:15:52.508000 audit[2165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2151 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665323137613964313438373439343033316439373765313665633964 Apr 12 18:15:52.508000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:15:52.508000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { perfmon } for pid=2165 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit[2165]: AVC avc: denied { bpf } for pid=2165 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:52.508000 audit: BPF prog-id=119 op=LOAD Apr 12 18:15:52.508000 audit[2165]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2151 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6665323137613964313438373439343033316439373765313665633964 Apr 12 18:15:52.529179 env[1102]: time="2024-04-12T18:15:52.529129812Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-786dc9d695-w4b94,Uid:98ab58bb-b1d6-4eb3-a3fd-4d8344fca4b1,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"fe217a9d1487494031d977e16ec9da9cffa5bb891422006e1640a0735c1a70f8\"" Apr 12 18:15:52.530997 env[1102]: time="2024-04-12T18:15:52.530968702Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:15:52.600000 audit[2210]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2210 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.600000 audit[2210]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffde492440 a2=0 a3=1 items=0 ppid=2130 pid=2210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.600000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:15:52.601000 audit[2212]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.601000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe7cc1e20 a2=0 a3=1 items=0 ppid=2130 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:15:52.601000 audit[2211]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2211 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.601000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdcb0f840 a2=0 a3=1 items=0 ppid=2130 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.601000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:15:52.603000 audit[2213]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2213 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.603000 audit[2213]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffc12af70 a2=0 a3=1 items=0 ppid=2130 pid=2213 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:15:52.603000 audit[2214]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.603000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc31e39b0 a2=0 a3=1 items=0 ppid=2130 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.603000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:15:52.604000 audit[2215]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.604000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9330230 a2=0 a3=1 items=0 ppid=2130 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.604000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:15:52.703000 audit[2216]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.705567 kernel: kauditd_printk_skb: 180 callbacks suppressed Apr 12 18:15:52.705630 kernel: audit: type=1325 audit(1712945752.703:986): table=filter:44 family=2 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.703000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc64e9d50 a2=0 a3=1 items=0 ppid=2130 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.711009 kernel: audit: type=1300 audit(1712945752.703:986): arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc64e9d50 a2=0 a3=1 items=0 ppid=2130 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.711089 kernel: audit: type=1327 audit(1712945752.703:986): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:15:52.703000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:15:52.710000 audit[2218]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.714504 kernel: audit: type=1325 audit(1712945752.710:987): table=filter:45 family=2 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.714581 kernel: audit: type=1300 audit(1712945752.710:987): arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd7c14280 a2=0 a3=1 items=0 ppid=2130 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.710000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd7c14280 a2=0 a3=1 items=0 ppid=2130 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.710000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:15:52.721054 kernel: audit: type=1327 audit(1712945752.710:987): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:15:52.721133 kernel: audit: type=1325 audit(1712945752.714:988): table=filter:46 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.714000 audit[2221]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2221 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.714000 audit[2221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeaf06550 a2=0 a3=1 items=0 ppid=2130 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.726084 kernel: audit: type=1300 audit(1712945752.714:988): arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffeaf06550 a2=0 a3=1 items=0 ppid=2130 pid=2221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.726145 kernel: audit: type=1327 audit(1712945752.714:988): proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:15:52.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:15:52.714000 audit[2222]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.730799 kernel: audit: type=1325 audit(1712945752.714:989): table=filter:47 family=2 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.714000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcc3a38b0 a2=0 a3=1 items=0 ppid=2130 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.714000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:15:52.717000 audit[2224]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.717000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdebfe120 a2=0 a3=1 items=0 ppid=2130 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:15:52.717000 audit[2225]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.717000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe6584260 a2=0 a3=1 items=0 ppid=2130 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:15:52.720000 audit[2227]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2227 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.720000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc8eaad90 a2=0 a3=1 items=0 ppid=2130 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.720000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:15:52.725000 audit[2230]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.725000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff26a150 a2=0 a3=1 items=0 ppid=2130 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:15:52.725000 audit[2231]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.725000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe97eb180 a2=0 a3=1 items=0 ppid=2130 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.725000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:15:52.728000 audit[2233]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.728000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcd112130 a2=0 a3=1 items=0 ppid=2130 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.728000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:15:52.730000 audit[2234]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2234 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.730000 audit[2234]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5652750 a2=0 a3=1 items=0 ppid=2130 pid=2234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.730000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:15:52.732000 audit[2236]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.732000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffef855a40 a2=0 a3=1 items=0 ppid=2130 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.732000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:15:52.735000 audit[2239]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.735000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3f06070 a2=0 a3=1 items=0 ppid=2130 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.735000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:15:52.738000 audit[2242]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.738000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff98af3a0 a2=0 a3=1 items=0 ppid=2130 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.738000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:15:52.739000 audit[2243]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2243 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.739000 audit[2243]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff66160f0 a2=0 a3=1 items=0 ppid=2130 pid=2243 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.739000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:15:52.742000 audit[2245]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.742000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe6ff01b0 a2=0 a3=1 items=0 ppid=2130 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.742000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:15:52.749923 kubelet[1970]: E0412 18:15:52.749886 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:52.751000 audit[2248]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.751000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffca92af30 a2=0 a3=1 items=0 ppid=2130 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.751000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:15:52.759681 kubelet[1970]: I0412 18:15:52.759649 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-jbxhc" podStartSLOduration=1.75961669 podCreationTimestamp="2024-04-12 18:15:51 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:15:52.758989833 +0000 UTC m=+17.160932780" watchObservedRunningTime="2024-04-12 18:15:52.75961669 +0000 UTC m=+17.161559637" Apr 12 18:15:52.760000 audit[2253]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.760000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb71c4d0 a2=0 a3=1 items=0 ppid=2130 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:15:52.764000 audit[2255]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2255 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:15:52.764000 audit[2255]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe25688f0 a2=0 a3=1 items=0 ppid=2130 pid=2255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.764000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:15:52.778000 audit[2257]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:52.778000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd0b8c8f0 a2=0 a3=1 items=0 ppid=2130 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.778000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:52.782000 audit[2257]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:52.782000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffd0b8c8f0 a2=0 a3=1 items=0 ppid=2130 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.782000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:52.790000 audit[2262]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2262 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.790000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe9c77390 a2=0 a3=1 items=0 ppid=2130 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.790000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:15:52.793000 audit[2264]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.793000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc79f6a40 a2=0 a3=1 items=0 ppid=2130 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.793000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:15:52.796000 audit[2267]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2267 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.796000 audit[2267]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=fffff4ca71d0 a2=0 a3=1 items=0 ppid=2130 pid=2267 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.796000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:15:52.797000 audit[2268]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2268 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.797000 audit[2268]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc32f7c30 a2=0 a3=1 items=0 ppid=2130 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.797000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:15:52.800000 audit[2270]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2270 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.800000 audit[2270]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe864bbd0 a2=0 a3=1 items=0 ppid=2130 pid=2270 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:15:52.801000 audit[2271]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.801000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff19ba870 a2=0 a3=1 items=0 ppid=2130 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.801000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:15:52.804000 audit[2273]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2273 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.804000 audit[2273]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeb535990 a2=0 a3=1 items=0 ppid=2130 pid=2273 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.804000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:15:52.807000 audit[2276]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.807000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd5e8f260 a2=0 a3=1 items=0 ppid=2130 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.807000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:15:52.808000 audit[2277]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2277 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.808000 audit[2277]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2c0e4e0 a2=0 a3=1 items=0 ppid=2130 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.808000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:15:52.811000 audit[2279]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2279 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.811000 audit[2279]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff5737c70 a2=0 a3=1 items=0 ppid=2130 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.811000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:15:52.812000 audit[2280]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2280 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.812000 audit[2280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc782c200 a2=0 a3=1 items=0 ppid=2130 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.812000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:15:52.814000 audit[2282]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.814000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffdb3364c0 a2=0 a3=1 items=0 ppid=2130 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.814000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:15:52.817000 audit[2285]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.817000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd9ddf700 a2=0 a3=1 items=0 ppid=2130 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.817000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:15:52.821000 audit[2288]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2288 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.821000 audit[2288]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff65d7ef0 a2=0 a3=1 items=0 ppid=2130 pid=2288 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.821000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:15:52.822000 audit[2289]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2289 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.822000 audit[2289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee40a2b0 a2=0 a3=1 items=0 ppid=2130 pid=2289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.822000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:15:52.824000 audit[2291]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.824000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffffb120570 a2=0 a3=1 items=0 ppid=2130 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.824000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:15:52.827000 audit[2294]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.827000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffc4c6aca0 a2=0 a3=1 items=0 ppid=2130 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.827000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:15:52.828000 audit[2295]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.828000 audit[2295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcebd3c60 a2=0 a3=1 items=0 ppid=2130 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.828000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:15:52.830000 audit[2297]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2297 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.830000 audit[2297]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffee38bf60 a2=0 a3=1 items=0 ppid=2130 pid=2297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.830000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:15:52.833000 audit[2300]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2300 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.833000 audit[2300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff784e380 a2=0 a3=1 items=0 ppid=2130 pid=2300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.833000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:15:52.834000 audit[2301]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.834000 audit[2301]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde5f8190 a2=0 a3=1 items=0 ppid=2130 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.834000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:15:52.836000 audit[2303]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:15:52.836000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff27276a0 a2=0 a3=1 items=0 ppid=2130 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.836000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:15:52.839000 audit[2305]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:15:52.839000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffeba9ebb0 a2=0 a3=1 items=0 ppid=2130 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.839000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:52.839000 audit[2305]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:15:52.839000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffeba9ebb0 a2=0 a3=1 items=0 ppid=2130 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:52.839000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:53.372704 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3318765551.mount: Deactivated successfully. Apr 12 18:15:53.958333 env[1102]: time="2024-04-12T18:15:53.958287749Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:53.959585 env[1102]: time="2024-04-12T18:15:53.959541703Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:53.961142 env[1102]: time="2024-04-12T18:15:53.961109624Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:53.962582 env[1102]: time="2024-04-12T18:15:53.962544782Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:53.963211 env[1102]: time="2024-04-12T18:15:53.963187319Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:15:53.966229 env[1102]: time="2024-04-12T18:15:53.966195399Z" level=info msg="CreateContainer within sandbox \"fe217a9d1487494031d977e16ec9da9cffa5bb891422006e1640a0735c1a70f8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:15:53.975162 env[1102]: time="2024-04-12T18:15:53.975112954Z" level=info msg="CreateContainer within sandbox \"fe217a9d1487494031d977e16ec9da9cffa5bb891422006e1640a0735c1a70f8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"2c499067d2b2478080681529c2875964f2142174686a1f5a33c4bad4742c1c57\"" Apr 12 18:15:53.975756 env[1102]: time="2024-04-12T18:15:53.975721651Z" level=info msg="StartContainer for \"2c499067d2b2478080681529c2875964f2142174686a1f5a33c4bad4742c1c57\"" Apr 12 18:15:53.988711 systemd[1]: Started cri-containerd-2c499067d2b2478080681529c2875964f2142174686a1f5a33c4bad4742c1c57.scope. Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit: BPF prog-id=120 op=LOAD Apr 12 18:15:54.009000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.009000 audit[2314]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2151 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:54.009000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343939303637643262323437383038303638313532396332383735 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2151 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:54.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343939303637643262323437383038303638313532396332383735 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.010000 audit: BPF prog-id=121 op=LOAD Apr 12 18:15:54.010000 audit[2314]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2151 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:54.010000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343939303637643262323437383038303638313532396332383735 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit: BPF prog-id=122 op=LOAD Apr 12 18:15:54.011000 audit[2314]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2151 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:54.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343939303637643262323437383038303638313532396332383735 Apr 12 18:15:54.011000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:15:54.011000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { perfmon } for pid=2314 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit[2314]: AVC avc: denied { bpf } for pid=2314 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:54.011000 audit: BPF prog-id=123 op=LOAD Apr 12 18:15:54.011000 audit[2314]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2151 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:54.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263343939303637643262323437383038303638313532396332383735 Apr 12 18:15:54.025788 env[1102]: time="2024-04-12T18:15:54.025744667Z" level=info msg="StartContainer for \"2c499067d2b2478080681529c2875964f2142174686a1f5a33c4bad4742c1c57\" returns successfully" Apr 12 18:15:55.713573 kubelet[1970]: I0412 18:15:55.713538 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-786dc9d695-w4b94" podStartSLOduration=2.280326277 podCreationTimestamp="2024-04-12 18:15:52 +0000 UTC" firstStartedPulling="2024-04-12 18:15:52.530326525 +0000 UTC m=+16.932269472" lastFinishedPulling="2024-04-12 18:15:53.963499327 +0000 UTC m=+18.365442274" observedRunningTime="2024-04-12 18:15:54.763274229 +0000 UTC m=+19.165217176" watchObservedRunningTime="2024-04-12 18:15:55.713499079 +0000 UTC m=+20.115442026" Apr 12 18:15:57.363000 audit[2349]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:57.363000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffff8c69620 a2=0 a3=1 items=0 ppid=2130 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:57.364000 audit[2349]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2349 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:57.364000 audit[2349]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffff8c69620 a2=0 a3=1 items=0 ppid=2130 pid=2349 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.364000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:57.373000 audit[2351]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:57.373000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd28dc5d0 a2=0 a3=1 items=0 ppid=2130 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.373000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:57.382000 audit[2351]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2351 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:57.382000 audit[2351]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd28dc5d0 a2=0 a3=1 items=0 ppid=2130 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:57.496654 kubelet[1970]: I0412 18:15:57.496610 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:57.502604 systemd[1]: Created slice kubepods-besteffort-podad74522f_d90f_445b_8c6c_51913173e519.slice. Apr 12 18:15:57.532529 kubelet[1970]: I0412 18:15:57.532472 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ad74522f-d90f-445b-8c6c-51913173e519-tigera-ca-bundle\") pod \"calico-typha-5498d9cff5-cwq8x\" (UID: \"ad74522f-d90f-445b-8c6c-51913173e519\") " pod="calico-system/calico-typha-5498d9cff5-cwq8x" Apr 12 18:15:57.532669 kubelet[1970]: I0412 18:15:57.532553 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ad74522f-d90f-445b-8c6c-51913173e519-typha-certs\") pod \"calico-typha-5498d9cff5-cwq8x\" (UID: \"ad74522f-d90f-445b-8c6c-51913173e519\") " pod="calico-system/calico-typha-5498d9cff5-cwq8x" Apr 12 18:15:57.532669 kubelet[1970]: I0412 18:15:57.532604 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lpl2d\" (UniqueName: \"kubernetes.io/projected/ad74522f-d90f-445b-8c6c-51913173e519-kube-api-access-lpl2d\") pod \"calico-typha-5498d9cff5-cwq8x\" (UID: \"ad74522f-d90f-445b-8c6c-51913173e519\") " pod="calico-system/calico-typha-5498d9cff5-cwq8x" Apr 12 18:15:57.545234 kubelet[1970]: I0412 18:15:57.545173 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:57.550037 systemd[1]: Created slice kubepods-besteffort-podf8fa5535_6579_4d7b_8ac8_a2e39089851e.slice. Apr 12 18:15:57.632978 kubelet[1970]: I0412 18:15:57.632866 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-xtables-lock\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633194 kubelet[1970]: I0412 18:15:57.633180 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-policysync\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633286 kubelet[1970]: I0412 18:15:57.633275 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-cni-net-dir\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633369 kubelet[1970]: I0412 18:15:57.633358 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-var-run-calico\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633465 kubelet[1970]: I0412 18:15:57.633454 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/f8fa5535-6579-4d7b-8ac8-a2e39089851e-node-certs\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633709 kubelet[1970]: I0412 18:15:57.633549 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-flexvol-driver-host\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633774 kubelet[1970]: I0412 18:15:57.633718 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-cni-log-dir\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633831 kubelet[1970]: I0412 18:15:57.633802 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/f8fa5535-6579-4d7b-8ac8-a2e39089851e-tigera-ca-bundle\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633870 kubelet[1970]: I0412 18:15:57.633843 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-cni-bin-dir\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.633987 kubelet[1970]: I0412 18:15:57.633968 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-67ll9\" (UniqueName: \"kubernetes.io/projected/f8fa5535-6579-4d7b-8ac8-a2e39089851e-kube-api-access-67ll9\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.634094 kubelet[1970]: I0412 18:15:57.634081 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-lib-modules\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.634169 kubelet[1970]: I0412 18:15:57.634159 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/f8fa5535-6579-4d7b-8ac8-a2e39089851e-var-lib-calico\") pod \"calico-node-mz8vc\" (UID: \"f8fa5535-6579-4d7b-8ac8-a2e39089851e\") " pod="calico-system/calico-node-mz8vc" Apr 12 18:15:57.662759 kubelet[1970]: I0412 18:15:57.662713 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:15:57.663012 kubelet[1970]: E0412 18:15:57.662993 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:15:57.734974 kubelet[1970]: I0412 18:15:57.734901 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/1fd67d13-6f0e-4b9d-8e05-40c22b734a8f-socket-dir\") pod \"csi-node-driver-5cg5c\" (UID: \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\") " pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:15:57.735160 kubelet[1970]: I0412 18:15:57.735020 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/1fd67d13-6f0e-4b9d-8e05-40c22b734a8f-varrun\") pod \"csi-node-driver-5cg5c\" (UID: \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\") " pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:15:57.735160 kubelet[1970]: I0412 18:15:57.735123 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/1fd67d13-6f0e-4b9d-8e05-40c22b734a8f-kubelet-dir\") pod \"csi-node-driver-5cg5c\" (UID: \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\") " pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:15:57.735243 kubelet[1970]: I0412 18:15:57.735223 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-h2wcm\" (UniqueName: \"kubernetes.io/projected/1fd67d13-6f0e-4b9d-8e05-40c22b734a8f-kube-api-access-h2wcm\") pod \"csi-node-driver-5cg5c\" (UID: \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\") " pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:15:57.735280 kubelet[1970]: I0412 18:15:57.735268 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/1fd67d13-6f0e-4b9d-8e05-40c22b734a8f-registration-dir\") pod \"csi-node-driver-5cg5c\" (UID: \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\") " pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:15:57.735793 kubelet[1970]: E0412 18:15:57.735763 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.735793 kubelet[1970]: W0412 18:15:57.735780 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.735872 kubelet[1970]: E0412 18:15:57.735806 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.735984 kubelet[1970]: E0412 18:15:57.735962 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.735984 kubelet[1970]: W0412 18:15:57.735974 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736039 kubelet[1970]: E0412 18:15:57.735990 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736196 kubelet[1970]: E0412 18:15:57.736177 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736196 kubelet[1970]: W0412 18:15:57.736188 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736272 kubelet[1970]: E0412 18:15:57.736205 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736356 kubelet[1970]: E0412 18:15:57.736334 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736356 kubelet[1970]: W0412 18:15:57.736348 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736411 kubelet[1970]: E0412 18:15:57.736363 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736515 kubelet[1970]: E0412 18:15:57.736497 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736515 kubelet[1970]: W0412 18:15:57.736506 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736586 kubelet[1970]: E0412 18:15:57.736520 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736678 kubelet[1970]: E0412 18:15:57.736661 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736678 kubelet[1970]: W0412 18:15:57.736671 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736741 kubelet[1970]: E0412 18:15:57.736710 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736811 kubelet[1970]: E0412 18:15:57.736796 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736811 kubelet[1970]: W0412 18:15:57.736809 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.736867 kubelet[1970]: E0412 18:15:57.736831 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.736943 kubelet[1970]: E0412 18:15:57.736929 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.736943 kubelet[1970]: W0412 18:15:57.736939 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737004 kubelet[1970]: E0412 18:15:57.736965 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737083 kubelet[1970]: E0412 18:15:57.737057 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737083 kubelet[1970]: W0412 18:15:57.737073 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737135 kubelet[1970]: E0412 18:15:57.737094 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737236 kubelet[1970]: E0412 18:15:57.737219 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737236 kubelet[1970]: W0412 18:15:57.737229 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737292 kubelet[1970]: E0412 18:15:57.737254 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737378 kubelet[1970]: E0412 18:15:57.737353 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737378 kubelet[1970]: W0412 18:15:57.737360 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737426 kubelet[1970]: E0412 18:15:57.737385 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737498 kubelet[1970]: E0412 18:15:57.737480 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737498 kubelet[1970]: W0412 18:15:57.737489 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737561 kubelet[1970]: E0412 18:15:57.737510 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737663 kubelet[1970]: E0412 18:15:57.737634 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737663 kubelet[1970]: W0412 18:15:57.737658 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.737729 kubelet[1970]: E0412 18:15:57.737675 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.737938 kubelet[1970]: E0412 18:15:57.737917 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.737938 kubelet[1970]: W0412 18:15:57.737930 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738014 kubelet[1970]: E0412 18:15:57.737964 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738126 kubelet[1970]: E0412 18:15:57.738109 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738126 kubelet[1970]: W0412 18:15:57.738120 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738198 kubelet[1970]: E0412 18:15:57.738143 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738265 kubelet[1970]: E0412 18:15:57.738247 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738265 kubelet[1970]: W0412 18:15:57.738258 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738318 kubelet[1970]: E0412 18:15:57.738279 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738396 kubelet[1970]: E0412 18:15:57.738382 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738396 kubelet[1970]: W0412 18:15:57.738392 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738456 kubelet[1970]: E0412 18:15:57.738414 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738549 kubelet[1970]: E0412 18:15:57.738528 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738549 kubelet[1970]: W0412 18:15:57.738537 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738601 kubelet[1970]: E0412 18:15:57.738553 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738814 kubelet[1970]: E0412 18:15:57.738716 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738814 kubelet[1970]: W0412 18:15:57.738725 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738814 kubelet[1970]: E0412 18:15:57.738740 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.738974 kubelet[1970]: E0412 18:15:57.738912 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.738974 kubelet[1970]: W0412 18:15:57.738919 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.738974 kubelet[1970]: E0412 18:15:57.738934 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.739179 kubelet[1970]: E0412 18:15:57.739079 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.739179 kubelet[1970]: W0412 18:15:57.739087 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.739179 kubelet[1970]: E0412 18:15:57.739102 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.739263 kubelet[1970]: E0412 18:15:57.739243 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.739263 kubelet[1970]: W0412 18:15:57.739250 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.739305 kubelet[1970]: E0412 18:15:57.739265 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.739412 kubelet[1970]: E0412 18:15:57.739394 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.739412 kubelet[1970]: W0412 18:15:57.739403 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.739471 kubelet[1970]: E0412 18:15:57.739416 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.739566 kubelet[1970]: E0412 18:15:57.739553 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.739566 kubelet[1970]: W0412 18:15:57.739562 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.739624 kubelet[1970]: E0412 18:15:57.739576 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.739844 kubelet[1970]: E0412 18:15:57.739818 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.739844 kubelet[1970]: W0412 18:15:57.739836 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.739923 kubelet[1970]: E0412 18:15:57.739856 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.743296 kubelet[1970]: E0412 18:15:57.743197 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.743296 kubelet[1970]: W0412 18:15:57.743223 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.743296 kubelet[1970]: E0412 18:15:57.743255 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.743592 kubelet[1970]: E0412 18:15:57.743517 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.743592 kubelet[1970]: W0412 18:15:57.743533 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.743686 kubelet[1970]: E0412 18:15:57.743601 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.747608 kubelet[1970]: E0412 18:15:57.747573 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.747608 kubelet[1970]: W0412 18:15:57.747594 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.747719 kubelet[1970]: E0412 18:15:57.747618 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.748741 kubelet[1970]: E0412 18:15:57.748712 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.748741 kubelet[1970]: W0412 18:15:57.748740 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.748852 kubelet[1970]: E0412 18:15:57.748757 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.749183 kubelet[1970]: E0412 18:15:57.748990 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.749183 kubelet[1970]: W0412 18:15:57.749000 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.749183 kubelet[1970]: E0412 18:15:57.749095 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.749183 kubelet[1970]: E0412 18:15:57.749157 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.749183 kubelet[1970]: W0412 18:15:57.749164 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.749183 kubelet[1970]: E0412 18:15:57.749173 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.753568 kubelet[1970]: E0412 18:15:57.752567 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.753568 kubelet[1970]: W0412 18:15:57.752590 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.753568 kubelet[1970]: E0412 18:15:57.752605 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.806822 kubelet[1970]: E0412 18:15:57.806781 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:57.807352 env[1102]: time="2024-04-12T18:15:57.807308739Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5498d9cff5-cwq8x,Uid:ad74522f-d90f-445b-8c6c-51913173e519,Namespace:calico-system,Attempt:0,}" Apr 12 18:15:57.836242 kubelet[1970]: E0412 18:15:57.836215 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.836242 kubelet[1970]: W0412 18:15:57.836236 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.836397 kubelet[1970]: E0412 18:15:57.836256 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.836520 kubelet[1970]: E0412 18:15:57.836499 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.836520 kubelet[1970]: W0412 18:15:57.836514 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.836602 kubelet[1970]: E0412 18:15:57.836527 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.836762 kubelet[1970]: E0412 18:15:57.836741 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.836762 kubelet[1970]: W0412 18:15:57.836757 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.836832 kubelet[1970]: E0412 18:15:57.836771 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.837054 kubelet[1970]: E0412 18:15:57.837013 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.837054 kubelet[1970]: W0412 18:15:57.837031 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.837169 kubelet[1970]: E0412 18:15:57.837084 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.837786 kubelet[1970]: E0412 18:15:57.837741 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.837786 kubelet[1970]: W0412 18:15:57.837785 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.837858 kubelet[1970]: E0412 18:15:57.837806 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.838093 kubelet[1970]: E0412 18:15:57.838061 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.838131 kubelet[1970]: W0412 18:15:57.838090 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.838212 kubelet[1970]: E0412 18:15:57.838193 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.838414 kubelet[1970]: E0412 18:15:57.838399 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.838414 kubelet[1970]: W0412 18:15:57.838414 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.838522 kubelet[1970]: E0412 18:15:57.838510 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.838618 kubelet[1970]: E0412 18:15:57.838599 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.838618 kubelet[1970]: W0412 18:15:57.838612 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.838736 kubelet[1970]: E0412 18:15:57.838720 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.838808 kubelet[1970]: E0412 18:15:57.838765 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.838873 kubelet[1970]: W0412 18:15:57.838855 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.839027 kubelet[1970]: E0412 18:15:57.839015 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.839179 kubelet[1970]: E0412 18:15:57.839167 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.839239 kubelet[1970]: W0412 18:15:57.839229 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.841615 kubelet[1970]: E0412 18:15:57.840166 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.842499 kubelet[1970]: E0412 18:15:57.842482 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.842590 kubelet[1970]: W0412 18:15:57.842577 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.842681 kubelet[1970]: E0412 18:15:57.842671 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.843226 kubelet[1970]: E0412 18:15:57.843208 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.843310 kubelet[1970]: W0412 18:15:57.843297 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.843390 kubelet[1970]: E0412 18:15:57.843381 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.843691 kubelet[1970]: E0412 18:15:57.843675 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.843783 kubelet[1970]: W0412 18:15:57.843770 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.844123 kubelet[1970]: E0412 18:15:57.844051 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845171 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847114 kubelet[1970]: W0412 18:15:57.845188 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845283 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845379 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847114 kubelet[1970]: W0412 18:15:57.845386 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845455 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845547 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847114 kubelet[1970]: W0412 18:15:57.845555 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845660 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847114 kubelet[1970]: E0412 18:15:57.845733 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847385 env[1102]: time="2024-04-12T18:15:57.846682708Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:57.847385 env[1102]: time="2024-04-12T18:15:57.846727229Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:57.847385 env[1102]: time="2024-04-12T18:15:57.846737469Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:57.847385 env[1102]: time="2024-04-12T18:15:57.846861272Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eba8b578784daa70c45f3d414133ec4529d62229535b4eb4ff1444679c547bba pid=2408 runtime=io.containerd.runc.v2 Apr 12 18:15:57.847476 kubelet[1970]: W0412 18:15:57.845740 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.845838 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.845927 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847476 kubelet[1970]: W0412 18:15:57.845935 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.846013 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.846126 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847476 kubelet[1970]: W0412 18:15:57.846140 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.846153 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847476 kubelet[1970]: E0412 18:15:57.846460 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847476 kubelet[1970]: W0412 18:15:57.846469 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.846512 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.846704 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847746 kubelet[1970]: W0412 18:15:57.846714 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.846732 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.846988 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847746 kubelet[1970]: W0412 18:15:57.846997 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.847087 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.847162 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847746 kubelet[1970]: W0412 18:15:57.847171 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847746 kubelet[1970]: E0412 18:15:57.847269 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.847965 kubelet[1970]: E0412 18:15:57.847342 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.847965 kubelet[1970]: W0412 18:15:57.847348 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.847965 kubelet[1970]: E0412 18:15:57.847358 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.849348 kubelet[1970]: E0412 18:15:57.849325 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.849348 kubelet[1970]: W0412 18:15:57.849345 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.849441 kubelet[1970]: E0412 18:15:57.849361 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.854733 kubelet[1970]: E0412 18:15:57.853568 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:57.856390 env[1102]: time="2024-04-12T18:15:57.856287724Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mz8vc,Uid:f8fa5535-6579-4d7b-8ac8-a2e39089851e,Namespace:calico-system,Attempt:0,}" Apr 12 18:15:57.860300 kubelet[1970]: E0412 18:15:57.860258 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:15:57.860300 kubelet[1970]: W0412 18:15:57.860296 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:15:57.860393 kubelet[1970]: E0412 18:15:57.860317 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:15:57.867796 systemd[1]: Started cri-containerd-eba8b578784daa70c45f3d414133ec4529d62229535b4eb4ff1444679c547bba.scope. Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907287 kernel: kauditd_printk_skb: 194 callbacks suppressed Apr 12 18:15:57.907388 kernel: audit: type=1400 audit(1712945757.905:1053): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.912127 kernel: audit: type=1400 audit(1712945757.905:1054): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.912206 kernel: audit: type=1400 audit(1712945757.905:1055): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.916939 kernel: audit: type=1400 audit(1712945757.905:1056): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.916996 kernel: audit: type=1400 audit(1712945757.905:1057): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.919483 env[1102]: time="2024-04-12T18:15:57.907710405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:15:57.919483 env[1102]: time="2024-04-12T18:15:57.907758726Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:15:57.919483 env[1102]: time="2024-04-12T18:15:57.907769886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:15:57.919483 env[1102]: time="2024-04-12T18:15:57.907962771Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452 pid=2459 runtime=io.containerd.runc.v2 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.925670 kernel: audit: type=1400 audit(1712945757.905:1058): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.925759 kernel: audit: type=1400 audit(1712945757.905:1059): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.931209 kernel: audit: type=1400 audit(1712945757.905:1060): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.931371 kernel: audit: type=1400 audit(1712945757.905:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.937781 kernel: audit: type=1400 audit(1712945757.905:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.905000 audit: BPF prog-id=124 op=LOAD Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2408 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613862353738373834646161373063343566336434313431333365 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2408 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613862353738373834646161373063343566336434313431333365 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.907000 audit: BPF prog-id=125 op=LOAD Apr 12 18:15:57.907000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2408 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613862353738373834646161373063343566336434313431333365 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.908000 audit: BPF prog-id=126 op=LOAD Apr 12 18:15:57.908000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2408 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.908000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613862353738373834646161373063343566336434313431333365 Apr 12 18:15:57.911000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:15:57.911000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { perfmon } for pid=2429 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit[2429]: AVC avc: denied { bpf } for pid=2429 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.911000 audit: BPF prog-id=127 op=LOAD Apr 12 18:15:57.911000 audit[2429]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2408 pid=2429 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562613862353738373834646161373063343566336434313431333365 Apr 12 18:15:57.938809 systemd[1]: Started cri-containerd-8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452.scope. Apr 12 18:15:57.955933 env[1102]: time="2024-04-12T18:15:57.955889173Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5498d9cff5-cwq8x,Uid:ad74522f-d90f-445b-8c6c-51913173e519,Namespace:calico-system,Attempt:0,} returns sandbox id \"eba8b578784daa70c45f3d414133ec4529d62229535b4eb4ff1444679c547bba\"" Apr 12 18:15:57.957315 kubelet[1970]: E0412 18:15:57.956834 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:57.957921 env[1102]: time="2024-04-12T18:15:57.957887218Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit: BPF prog-id=128 op=LOAD Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2459 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643433376337363432623262356162363566303532343466303262 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2459 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643433376337363432623262356162363566303532343466303262 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.968000 audit: BPF prog-id=129 op=LOAD Apr 12 18:15:57.968000 audit[2470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2459 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.968000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643433376337363432623262356162363566303532343466303262 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit: BPF prog-id=130 op=LOAD Apr 12 18:15:57.969000 audit[2470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2459 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643433376337363432623262356162363566303532343466303262 Apr 12 18:15:57.969000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:15:57.969000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { perfmon } for pid=2470 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit[2470]: AVC avc: denied { bpf } for pid=2470 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:57.969000 audit: BPF prog-id=131 op=LOAD Apr 12 18:15:57.969000 audit[2470]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2459 pid=2470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:57.969000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862643433376337363432623262356162363566303532343466303262 Apr 12 18:15:57.983200 env[1102]: time="2024-04-12T18:15:57.983152788Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-mz8vc,Uid:f8fa5535-6579-4d7b-8ac8-a2e39089851e,Namespace:calico-system,Attempt:0,} returns sandbox id \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\"" Apr 12 18:15:57.985030 kubelet[1970]: E0412 18:15:57.984530 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:15:58.395000 audit[2501]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:58.395000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd7fca840 a2=0 a3=1 items=0 ppid=2130 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:58.395000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:58.396000 audit[2501]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2501 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:15:58.396000 audit[2501]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd7fca840 a2=0 a3=1 items=0 ppid=2130 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:58.396000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:15:58.926996 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1272918019.mount: Deactivated successfully. Apr 12 18:15:59.703586 kubelet[1970]: E0412 18:15:59.703545 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:15:59.814350 env[1102]: time="2024-04-12T18:15:59.814286919Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:59.819244 env[1102]: time="2024-04-12T18:15:59.819137541Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:59.820622 env[1102]: time="2024-04-12T18:15:59.820559731Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:59.822962 env[1102]: time="2024-04-12T18:15:59.822915660Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:15:59.823227 env[1102]: time="2024-04-12T18:15:59.823205307Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:15:59.823789 env[1102]: time="2024-04-12T18:15:59.823755398Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:15:59.841205 env[1102]: time="2024-04-12T18:15:59.840863357Z" level=info msg="CreateContainer within sandbox \"eba8b578784daa70c45f3d414133ec4529d62229535b4eb4ff1444679c547bba\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:15:59.867206 env[1102]: time="2024-04-12T18:15:59.867145508Z" level=info msg="CreateContainer within sandbox \"eba8b578784daa70c45f3d414133ec4529d62229535b4eb4ff1444679c547bba\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"3b4cb7e7131b425f709570e27e2db22a23c3af0e811156b498c655d56fb7a54b\"" Apr 12 18:15:59.867801 env[1102]: time="2024-04-12T18:15:59.867721520Z" level=info msg="StartContainer for \"3b4cb7e7131b425f709570e27e2db22a23c3af0e811156b498c655d56fb7a54b\"" Apr 12 18:15:59.891710 systemd[1]: Started cri-containerd-3b4cb7e7131b425f709570e27e2db22a23c3af0e811156b498c655d56fb7a54b.scope. Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit: BPF prog-id=132 op=LOAD Apr 12 18:15:59.930000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2408 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346362376537313331623432356637303935373065323765326462 Apr 12 18:15:59.930000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.930000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2408 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.930000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346362376537313331623432356637303935373065323765326462 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit: BPF prog-id=133 op=LOAD Apr 12 18:15:59.931000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2408 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346362376537313331623432356637303935373065323765326462 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.931000 audit: BPF prog-id=134 op=LOAD Apr 12 18:15:59.931000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2408 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.931000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346362376537313331623432356637303935373065323765326462 Apr 12 18:15:59.932000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:15:59.932000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { perfmon } for pid=2511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit[2511]: AVC avc: denied { bpf } for pid=2511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:15:59.932000 audit: BPF prog-id=135 op=LOAD Apr 12 18:15:59.932000 audit[2511]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2408 pid=2511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:15:59.932000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3362346362376537313331623432356637303935373065323765326462 Apr 12 18:16:00.103206 env[1102]: time="2024-04-12T18:16:00.103147025Z" level=info msg="StartContainer for \"3b4cb7e7131b425f709570e27e2db22a23c3af0e811156b498c655d56fb7a54b\" returns successfully" Apr 12 18:16:00.766320 kubelet[1970]: E0412 18:16:00.766288 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:00.784062 kubelet[1970]: I0412 18:16:00.784022 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5498d9cff5-cwq8x" podStartSLOduration=1.918084672 podCreationTimestamp="2024-04-12 18:15:57 +0000 UTC" firstStartedPulling="2024-04-12 18:15:57.957612491 +0000 UTC m=+22.359555398" lastFinishedPulling="2024-04-12 18:15:59.823511673 +0000 UTC m=+24.225454580" observedRunningTime="2024-04-12 18:16:00.783437563 +0000 UTC m=+25.185380510" watchObservedRunningTime="2024-04-12 18:16:00.783983854 +0000 UTC m=+25.185926761" Apr 12 18:16:00.848055 kubelet[1970]: E0412 18:16:00.848021 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.848055 kubelet[1970]: W0412 18:16:00.848046 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.848387 kubelet[1970]: E0412 18:16:00.848081 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.848387 kubelet[1970]: E0412 18:16:00.848257 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.848387 kubelet[1970]: W0412 18:16:00.848265 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.848387 kubelet[1970]: E0412 18:16:00.848277 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.848485 kubelet[1970]: E0412 18:16:00.848405 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.848485 kubelet[1970]: W0412 18:16:00.848412 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.848485 kubelet[1970]: E0412 18:16:00.848422 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.848586 kubelet[1970]: E0412 18:16:00.848578 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.848618 kubelet[1970]: W0412 18:16:00.848587 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.848618 kubelet[1970]: E0412 18:16:00.848598 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.849128 kubelet[1970]: E0412 18:16:00.848956 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.849128 kubelet[1970]: W0412 18:16:00.848976 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.849128 kubelet[1970]: E0412 18:16:00.848990 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.849853 kubelet[1970]: E0412 18:16:00.849564 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.849853 kubelet[1970]: W0412 18:16:00.849580 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.849853 kubelet[1970]: E0412 18:16:00.849593 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.849853 kubelet[1970]: E0412 18:16:00.849833 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.849853 kubelet[1970]: W0412 18:16:00.849842 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850036 kubelet[1970]: E0412 18:16:00.849863 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.850036 kubelet[1970]: E0412 18:16:00.850005 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.850036 kubelet[1970]: W0412 18:16:00.850014 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850036 kubelet[1970]: E0412 18:16:00.850025 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.850173 kubelet[1970]: E0412 18:16:00.850157 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.850173 kubelet[1970]: W0412 18:16:00.850169 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850247 kubelet[1970]: E0412 18:16:00.850179 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.850325 kubelet[1970]: E0412 18:16:00.850316 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.850325 kubelet[1970]: W0412 18:16:00.850324 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850397 kubelet[1970]: E0412 18:16:00.850336 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.850467 kubelet[1970]: E0412 18:16:00.850458 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.850467 kubelet[1970]: W0412 18:16:00.850468 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850536 kubelet[1970]: E0412 18:16:00.850477 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.850597 kubelet[1970]: E0412 18:16:00.850588 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.850597 kubelet[1970]: W0412 18:16:00.850597 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.850662 kubelet[1970]: E0412 18:16:00.850606 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.858291 kubelet[1970]: E0412 18:16:00.858120 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.858291 kubelet[1970]: W0412 18:16:00.858147 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.858291 kubelet[1970]: E0412 18:16:00.858166 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.858714 kubelet[1970]: E0412 18:16:00.858548 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.858714 kubelet[1970]: W0412 18:16:00.858561 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.858714 kubelet[1970]: E0412 18:16:00.858592 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.859342 kubelet[1970]: E0412 18:16:00.858912 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.859342 kubelet[1970]: W0412 18:16:00.858925 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.859342 kubelet[1970]: E0412 18:16:00.858954 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.859342 kubelet[1970]: E0412 18:16:00.859231 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.859342 kubelet[1970]: W0412 18:16:00.859248 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.859342 kubelet[1970]: E0412 18:16:00.859262 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.862317 kubelet[1970]: E0412 18:16:00.862190 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.862317 kubelet[1970]: W0412 18:16:00.862210 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.862317 kubelet[1970]: E0412 18:16:00.862257 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.862689 kubelet[1970]: E0412 18:16:00.862581 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.862689 kubelet[1970]: W0412 18:16:00.862595 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.862689 kubelet[1970]: E0412 18:16:00.862649 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.862982 kubelet[1970]: E0412 18:16:00.862884 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.862982 kubelet[1970]: W0412 18:16:00.862898 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.862982 kubelet[1970]: E0412 18:16:00.862925 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.863351 kubelet[1970]: E0412 18:16:00.863190 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.863351 kubelet[1970]: W0412 18:16:00.863204 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.863351 kubelet[1970]: E0412 18:16:00.863224 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.863872 kubelet[1970]: E0412 18:16:00.863521 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.863872 kubelet[1970]: W0412 18:16:00.863535 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.863872 kubelet[1970]: E0412 18:16:00.863554 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.863872 kubelet[1970]: E0412 18:16:00.863780 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.863872 kubelet[1970]: W0412 18:16:00.863796 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.863872 kubelet[1970]: E0412 18:16:00.863835 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.864141 kubelet[1970]: E0412 18:16:00.864016 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.864141 kubelet[1970]: W0412 18:16:00.864024 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.864141 kubelet[1970]: E0412 18:16:00.864041 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.864295 kubelet[1970]: E0412 18:16:00.864258 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.864295 kubelet[1970]: W0412 18:16:00.864271 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.864295 kubelet[1970]: E0412 18:16:00.864286 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.864598 kubelet[1970]: E0412 18:16:00.864584 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.864598 kubelet[1970]: W0412 18:16:00.864597 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.864685 kubelet[1970]: E0412 18:16:00.864616 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.866367 kubelet[1970]: E0412 18:16:00.866206 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.866367 kubelet[1970]: W0412 18:16:00.866223 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.866367 kubelet[1970]: E0412 18:16:00.866249 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.866667 kubelet[1970]: E0412 18:16:00.866549 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.866667 kubelet[1970]: W0412 18:16:00.866562 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.866667 kubelet[1970]: E0412 18:16:00.866575 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.866981 kubelet[1970]: E0412 18:16:00.866840 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.866981 kubelet[1970]: W0412 18:16:00.866851 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.866981 kubelet[1970]: E0412 18:16:00.866865 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.867267 kubelet[1970]: E0412 18:16:00.867175 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.867267 kubelet[1970]: W0412 18:16:00.867187 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.867267 kubelet[1970]: E0412 18:16:00.867200 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.867823 kubelet[1970]: E0412 18:16:00.867766 1970 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:16:00.867823 kubelet[1970]: W0412 18:16:00.867781 1970 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:16:00.867823 kubelet[1970]: E0412 18:16:00.867796 1970 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:16:00.953973 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount475004018.mount: Deactivated successfully. Apr 12 18:16:01.044208 env[1102]: time="2024-04-12T18:16:01.044092573Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:01.048637 env[1102]: time="2024-04-12T18:16:01.048564861Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:01.050904 env[1102]: time="2024-04-12T18:16:01.050840825Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:01.052775 env[1102]: time="2024-04-12T18:16:01.052737782Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:01.053488 env[1102]: time="2024-04-12T18:16:01.053449636Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:16:01.056790 env[1102]: time="2024-04-12T18:16:01.056736381Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:16:01.071515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1781295640.mount: Deactivated successfully. Apr 12 18:16:01.074671 env[1102]: time="2024-04-12T18:16:01.074615891Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf\"" Apr 12 18:16:01.077270 env[1102]: time="2024-04-12T18:16:01.077217102Z" level=info msg="StartContainer for \"4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf\"" Apr 12 18:16:01.104984 systemd[1]: Started cri-containerd-4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf.scope. Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2459 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353463303834366436666438396637356362613638353232633834 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit: BPF prog-id=136 op=LOAD Apr 12 18:16:01.144000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2459 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353463303834366436666438396637356362613638353232633834 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit: BPF prog-id=137 op=LOAD Apr 12 18:16:01.144000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2459 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353463303834366436666438396637356362613638353232633834 Apr 12 18:16:01.144000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:16:01.144000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:01.144000 audit: BPF prog-id=138 op=LOAD Apr 12 18:16:01.144000 audit[2583]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2459 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:01.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3464353463303834366436666438396637356362613638353232633834 Apr 12 18:16:01.159217 env[1102]: time="2024-04-12T18:16:01.158007243Z" level=info msg="StartContainer for \"4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf\" returns successfully" Apr 12 18:16:01.173511 systemd[1]: cri-containerd-4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf.scope: Deactivated successfully. Apr 12 18:16:01.178000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:16:01.206656 env[1102]: time="2024-04-12T18:16:01.206603034Z" level=info msg="shim disconnected" id=4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf Apr 12 18:16:01.206972 env[1102]: time="2024-04-12T18:16:01.206940281Z" level=warning msg="cleaning up after shim disconnected" id=4d54c0846d6fd89f75cba68522c841aed9e7d9b0dcb903a1e27e5bb5e356b7bf namespace=k8s.io Apr 12 18:16:01.207044 env[1102]: time="2024-04-12T18:16:01.207030883Z" level=info msg="cleaning up dead shim" Apr 12 18:16:01.213561 env[1102]: time="2024-04-12T18:16:01.213506449Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:16:01Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2620 runtime=io.containerd.runc.v2\n" Apr 12 18:16:01.704894 kubelet[1970]: E0412 18:16:01.704776 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:16:01.768257 kubelet[1970]: I0412 18:16:01.768207 1970 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:16:01.768821 kubelet[1970]: E0412 18:16:01.768795 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:01.769411 kubelet[1970]: E0412 18:16:01.769353 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:01.770155 env[1102]: time="2024-04-12T18:16:01.770119505Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:16:02.812460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1151713549.mount: Deactivated successfully. Apr 12 18:16:03.703305 kubelet[1970]: E0412 18:16:03.703261 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:16:04.962542 env[1102]: time="2024-04-12T18:16:04.962493768Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:04.964238 env[1102]: time="2024-04-12T18:16:04.964189758Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:04.965884 env[1102]: time="2024-04-12T18:16:04.965856027Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:04.967120 env[1102]: time="2024-04-12T18:16:04.967083049Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:04.967750 env[1102]: time="2024-04-12T18:16:04.967693380Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:16:04.970472 env[1102]: time="2024-04-12T18:16:04.970433349Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:16:04.981548 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3628905050.mount: Deactivated successfully. Apr 12 18:16:04.985157 env[1102]: time="2024-04-12T18:16:04.985105730Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2\"" Apr 12 18:16:04.986049 env[1102]: time="2024-04-12T18:16:04.985837623Z" level=info msg="StartContainer for \"3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2\"" Apr 12 18:16:05.011591 systemd[1]: Started cri-containerd-3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2.scope. Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.063317 kernel: kauditd_printk_skb: 211 callbacks suppressed Apr 12 18:16:05.063393 kernel: audit: type=1400 audit(1712945765.059:1116): avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.063417 kernel: audit: type=1300 audit(1712945765.059:1116): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2459 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.059000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2459 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656231306434373663613131386263393636653236613239623632 Apr 12 18:16:05.070120 kernel: audit: type=1327 audit(1712945765.059:1116): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656231306434373663613131386263393636653236613239623632 Apr 12 18:16:05.070293 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.075056 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.075129 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.079553 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.079603 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.084311 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.087346 kernel: audit: type=1400 audit(1712945765.059:1117): avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit: BPF prog-id=139 op=LOAD Apr 12 18:16:05.059000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2459 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656231306434373663613131386263393636653236613239623632 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.059000 audit: BPF prog-id=140 op=LOAD Apr 12 18:16:05.059000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2459 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.059000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656231306434373663613131386263393636653236613239623632 Apr 12 18:16:05.062000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:16:05.062000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { perfmon } for pid=2644 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit[2644]: AVC avc: denied { bpf } for pid=2644 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:05.062000 audit: BPF prog-id=141 op=LOAD Apr 12 18:16:05.062000 audit[2644]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2459 pid=2644 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:05.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363656231306434373663613131386263393636653236613239623632 Apr 12 18:16:05.095802 env[1102]: time="2024-04-12T18:16:05.095745848Z" level=info msg="StartContainer for \"3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2\" returns successfully" Apr 12 18:16:05.602885 env[1102]: time="2024-04-12T18:16:05.602811000Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:16:05.604587 systemd[1]: cri-containerd-3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2.scope: Deactivated successfully. Apr 12 18:16:05.609000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:16:05.626937 env[1102]: time="2024-04-12T18:16:05.626888736Z" level=info msg="shim disconnected" id=3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2 Apr 12 18:16:05.626937 env[1102]: time="2024-04-12T18:16:05.626935297Z" level=warning msg="cleaning up after shim disconnected" id=3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2 namespace=k8s.io Apr 12 18:16:05.627175 env[1102]: time="2024-04-12T18:16:05.626946937Z" level=info msg="cleaning up dead shim" Apr 12 18:16:05.633691 env[1102]: time="2024-04-12T18:16:05.633633652Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:16:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2685 runtime=io.containerd.runc.v2\n" Apr 12 18:16:05.660588 kubelet[1970]: I0412 18:16:05.660553 1970 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:16:05.687063 kubelet[1970]: I0412 18:16:05.686937 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:05.689192 kubelet[1970]: I0412 18:16:05.689081 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:05.689325 kubelet[1970]: I0412 18:16:05.689254 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:05.697827 systemd[1]: Created slice kubepods-burstable-poda336b125_f258_4468_907c_c80efa008c45.slice. Apr 12 18:16:05.703203 systemd[1]: Created slice kubepods-burstable-podf0af4f36_6c0c_46f7_ab40_b15652f0bdf9.slice. Apr 12 18:16:05.708679 systemd[1]: Created slice kubepods-besteffort-podb6109acf_1502_4cb5_98f5_a80790996b1c.slice. Apr 12 18:16:05.709506 kubelet[1970]: I0412 18:16:05.709481 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f0af4f36-6c0c-46f7-ab40-b15652f0bdf9-config-volume\") pod \"coredns-5d78c9869d-p9jp4\" (UID: \"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9\") " pod="kube-system/coredns-5d78c9869d-p9jp4" Apr 12 18:16:05.709506 kubelet[1970]: I0412 18:16:05.709523 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b6109acf-1502-4cb5-98f5-a80790996b1c-tigera-ca-bundle\") pod \"calico-kube-controllers-559b466c7d-4sqf9\" (UID: \"b6109acf-1502-4cb5-98f5-a80790996b1c\") " pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" Apr 12 18:16:05.710108 kubelet[1970]: I0412 18:16:05.710059 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mrp8j\" (UniqueName: \"kubernetes.io/projected/b6109acf-1502-4cb5-98f5-a80790996b1c-kube-api-access-mrp8j\") pod \"calico-kube-controllers-559b466c7d-4sqf9\" (UID: \"b6109acf-1502-4cb5-98f5-a80790996b1c\") " pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" Apr 12 18:16:05.710196 kubelet[1970]: I0412 18:16:05.710129 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nsxsj\" (UniqueName: \"kubernetes.io/projected/f0af4f36-6c0c-46f7-ab40-b15652f0bdf9-kube-api-access-nsxsj\") pod \"coredns-5d78c9869d-p9jp4\" (UID: \"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9\") " pod="kube-system/coredns-5d78c9869d-p9jp4" Apr 12 18:16:05.710196 kubelet[1970]: I0412 18:16:05.710159 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/a336b125-f258-4468-907c-c80efa008c45-config-volume\") pod \"coredns-5d78c9869d-62zvt\" (UID: \"a336b125-f258-4468-907c-c80efa008c45\") " pod="kube-system/coredns-5d78c9869d-62zvt" Apr 12 18:16:05.710196 kubelet[1970]: I0412 18:16:05.710180 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fsgx8\" (UniqueName: \"kubernetes.io/projected/a336b125-f258-4468-907c-c80efa008c45-kube-api-access-fsgx8\") pod \"coredns-5d78c9869d-62zvt\" (UID: \"a336b125-f258-4468-907c-c80efa008c45\") " pod="kube-system/coredns-5d78c9869d-62zvt" Apr 12 18:16:05.713735 systemd[1]: Created slice kubepods-besteffort-pod1fd67d13_6f0e_4b9d_8e05_40c22b734a8f.slice. Apr 12 18:16:05.715789 env[1102]: time="2024-04-12T18:16:05.715690749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5cg5c,Uid:1fd67d13-6f0e-4b9d-8e05-40c22b734a8f,Namespace:calico-system,Attempt:0,}" Apr 12 18:16:05.778497 kubelet[1970]: E0412 18:16:05.778373 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:05.793091 env[1102]: time="2024-04-12T18:16:05.787885115Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:16:05.847726 env[1102]: time="2024-04-12T18:16:05.847651906Z" level=error msg="Failed to destroy network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:05.848256 env[1102]: time="2024-04-12T18:16:05.848220156Z" level=error msg="encountered an error cleaning up failed sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:05.848396 env[1102]: time="2024-04-12T18:16:05.848369079Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5cg5c,Uid:1fd67d13-6f0e-4b9d-8e05-40c22b734a8f,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:05.850690 kubelet[1970]: E0412 18:16:05.850645 1970 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:05.850877 kubelet[1970]: E0412 18:16:05.850854 1970 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:16:05.851022 kubelet[1970]: E0412 18:16:05.851000 1970 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5cg5c" Apr 12 18:16:05.851092 kubelet[1970]: E0412 18:16:05.851081 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5cg5c_calico-system(1fd67d13-6f0e-4b9d-8e05-40c22b734a8f)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5cg5c_calico-system(1fd67d13-6f0e-4b9d-8e05-40c22b734a8f)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:16:05.982192 systemd[1]: run-containerd-runc-k8s.io-3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2-runc.1F0pJ8.mount: Deactivated successfully. Apr 12 18:16:05.982287 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3ceb10d476ca118bc966e26a29b62bbace0f4cb566596bf5b431d477f633f0c2-rootfs.mount: Deactivated successfully. Apr 12 18:16:06.002150 kubelet[1970]: E0412 18:16:06.002107 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:06.002652 env[1102]: time="2024-04-12T18:16:06.002614700Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-62zvt,Uid:a336b125-f258-4468-907c-c80efa008c45,Namespace:kube-system,Attempt:0,}" Apr 12 18:16:06.007669 kubelet[1970]: E0412 18:16:06.007623 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:06.008575 env[1102]: time="2024-04-12T18:16:06.008521279Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-p9jp4,Uid:f0af4f36-6c0c-46f7-ab40-b15652f0bdf9,Namespace:kube-system,Attempt:0,}" Apr 12 18:16:06.012280 env[1102]: time="2024-04-12T18:16:06.012247582Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-559b466c7d-4sqf9,Uid:b6109acf-1502-4cb5-98f5-a80790996b1c,Namespace:calico-system,Attempt:0,}" Apr 12 18:16:06.079587 env[1102]: time="2024-04-12T18:16:06.079526750Z" level=error msg="Failed to destroy network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.079943 env[1102]: time="2024-04-12T18:16:06.079906077Z" level=error msg="encountered an error cleaning up failed sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.080002 env[1102]: time="2024-04-12T18:16:06.079964117Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-p9jp4,Uid:f0af4f36-6c0c-46f7-ab40-b15652f0bdf9,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.080260 kubelet[1970]: E0412 18:16:06.080234 1970 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.080360 kubelet[1970]: E0412 18:16:06.080286 1970 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-p9jp4" Apr 12 18:16:06.080360 kubelet[1970]: E0412 18:16:06.080307 1970 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-p9jp4" Apr 12 18:16:06.080360 kubelet[1970]: E0412 18:16:06.080354 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-p9jp4_kube-system(f0af4f36-6c0c-46f7-ab40-b15652f0bdf9)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-p9jp4_kube-system(f0af4f36-6c0c-46f7-ab40-b15652f0bdf9)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-p9jp4" podUID=f0af4f36-6c0c-46f7-ab40-b15652f0bdf9 Apr 12 18:16:06.080931 env[1102]: time="2024-04-12T18:16:06.080892533Z" level=error msg="Failed to destroy network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.081414 env[1102]: time="2024-04-12T18:16:06.081381701Z" level=error msg="encountered an error cleaning up failed sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.081724 env[1102]: time="2024-04-12T18:16:06.081595185Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-62zvt,Uid:a336b125-f258-4468-907c-c80efa008c45,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.082181 kubelet[1970]: E0412 18:16:06.082153 1970 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.082264 kubelet[1970]: E0412 18:16:06.082205 1970 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-62zvt" Apr 12 18:16:06.082264 kubelet[1970]: E0412 18:16:06.082223 1970 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-62zvt" Apr 12 18:16:06.082324 kubelet[1970]: E0412 18:16:06.082271 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-62zvt_kube-system(a336b125-f258-4468-907c-c80efa008c45)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-62zvt_kube-system(a336b125-f258-4468-907c-c80efa008c45)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-62zvt" podUID=a336b125-f258-4468-907c-c80efa008c45 Apr 12 18:16:06.101526 env[1102]: time="2024-04-12T18:16:06.101467478Z" level=error msg="Failed to destroy network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.101871 env[1102]: time="2024-04-12T18:16:06.101835564Z" level=error msg="encountered an error cleaning up failed sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.101968 env[1102]: time="2024-04-12T18:16:06.101934206Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-559b466c7d-4sqf9,Uid:b6109acf-1502-4cb5-98f5-a80790996b1c,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.102520 kubelet[1970]: E0412 18:16:06.102187 1970 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.102520 kubelet[1970]: E0412 18:16:06.102240 1970 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" Apr 12 18:16:06.102520 kubelet[1970]: E0412 18:16:06.102258 1970 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" Apr 12 18:16:06.102807 kubelet[1970]: E0412 18:16:06.102315 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-559b466c7d-4sqf9_calico-system(b6109acf-1502-4cb5-98f5-a80790996b1c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-559b466c7d-4sqf9_calico-system(b6109acf-1502-4cb5-98f5-a80790996b1c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" podUID=b6109acf-1502-4cb5-98f5-a80790996b1c Apr 12 18:16:06.780961 kubelet[1970]: I0412 18:16:06.780929 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:06.783126 env[1102]: time="2024-04-12T18:16:06.781828287Z" level=info msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" Apr 12 18:16:06.784120 kubelet[1970]: I0412 18:16:06.784017 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:06.785146 env[1102]: time="2024-04-12T18:16:06.785114703Z" level=info msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" Apr 12 18:16:06.787288 kubelet[1970]: I0412 18:16:06.787233 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:06.787749 env[1102]: time="2024-04-12T18:16:06.787713266Z" level=info msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" Apr 12 18:16:06.789795 kubelet[1970]: I0412 18:16:06.789764 1970 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:06.790462 env[1102]: time="2024-04-12T18:16:06.790410831Z" level=info msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" Apr 12 18:16:06.827623 env[1102]: time="2024-04-12T18:16:06.827560614Z" level=error msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" failed" error="failed to destroy network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.828092 kubelet[1970]: E0412 18:16:06.828049 1970 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:06.828164 kubelet[1970]: E0412 18:16:06.828124 1970 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6} Apr 12 18:16:06.828217 kubelet[1970]: E0412 18:16:06.828168 1970 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"a336b125-f258-4468-907c-c80efa008c45\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:06.828217 kubelet[1970]: E0412 18:16:06.828201 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"a336b125-f258-4468-907c-c80efa008c45\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-62zvt" podUID=a336b125-f258-4468-907c-c80efa008c45 Apr 12 18:16:06.831700 env[1102]: time="2024-04-12T18:16:06.831650563Z" level=error msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" failed" error="failed to destroy network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.831889 kubelet[1970]: E0412 18:16:06.831860 1970 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:06.831947 kubelet[1970]: E0412 18:16:06.831896 1970 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5} Apr 12 18:16:06.831947 kubelet[1970]: E0412 18:16:06.831926 1970 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:06.832026 kubelet[1970]: E0412 18:16:06.831951 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5cg5c" podUID=1fd67d13-6f0e-4b9d-8e05-40c22b734a8f Apr 12 18:16:06.839312 env[1102]: time="2024-04-12T18:16:06.839266251Z" level=error msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" failed" error="failed to destroy network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.839473 kubelet[1970]: E0412 18:16:06.839456 1970 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:06.839516 kubelet[1970]: E0412 18:16:06.839486 1970 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4} Apr 12 18:16:06.839556 kubelet[1970]: E0412 18:16:06.839516 1970 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:06.839556 kubelet[1970]: E0412 18:16:06.839540 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-p9jp4" podUID=f0af4f36-6c0c-46f7-ab40-b15652f0bdf9 Apr 12 18:16:06.849373 env[1102]: time="2024-04-12T18:16:06.849301659Z" level=error msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" failed" error="failed to destroy network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:16:06.849578 kubelet[1970]: E0412 18:16:06.849542 1970 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:06.849633 kubelet[1970]: E0412 18:16:06.849581 1970 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7} Apr 12 18:16:06.849633 kubelet[1970]: E0412 18:16:06.849613 1970 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b6109acf-1502-4cb5-98f5-a80790996b1c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:16:06.849706 kubelet[1970]: E0412 18:16:06.849639 1970 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b6109acf-1502-4cb5-98f5-a80790996b1c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" podUID=b6109acf-1502-4cb5-98f5-a80790996b1c Apr 12 18:16:06.979740 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7-shm.mount: Deactivated successfully. Apr 12 18:16:06.979859 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4-shm.mount: Deactivated successfully. Apr 12 18:16:06.979919 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6-shm.mount: Deactivated successfully. Apr 12 18:16:07.330010 systemd[1]: Started sshd@7-10.0.0.7:22-10.0.0.1:38678.service. Apr 12 18:16:07.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.7:22-10.0.0.1:38678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:07.376000 audit[2944]: USER_ACCT pid=2944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.378214 sshd[2944]: Accepted publickey for core from 10.0.0.1 port 38678 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:07.377000 audit[2944]: CRED_ACQ pid=2944 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.377000 audit[2944]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcc715150 a2=3 a3=1 items=0 ppid=1 pid=2944 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:07.377000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:07.379874 sshd[2944]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:07.385885 systemd[1]: Started session-8.scope. Apr 12 18:16:07.386391 systemd-logind[1089]: New session 8 of user core. Apr 12 18:16:07.391000 audit[2944]: USER_START pid=2944 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.393000 audit[2946]: CRED_ACQ pid=2946 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.546861 sshd[2944]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:07.547000 audit[2944]: USER_END pid=2944 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.547000 audit[2944]: CRED_DISP pid=2944 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:07.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.7:22-10.0.0.1:38678 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:07.550182 systemd[1]: sshd@7-10.0.0.7:22-10.0.0.1:38678.service: Deactivated successfully. Apr 12 18:16:07.550939 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:16:07.551918 systemd-logind[1089]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:16:07.553426 systemd-logind[1089]: Removed session 8. Apr 12 18:16:10.624812 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2950772186.mount: Deactivated successfully. Apr 12 18:16:10.846652 env[1102]: time="2024-04-12T18:16:10.846608426Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.847796 env[1102]: time="2024-04-12T18:16:10.847765083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.849137 env[1102]: time="2024-04-12T18:16:10.849108223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.852010 env[1102]: time="2024-04-12T18:16:10.851971067Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:10.852725 env[1102]: time="2024-04-12T18:16:10.852693837Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:16:10.866755 env[1102]: time="2024-04-12T18:16:10.866708369Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:16:10.877562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount392806043.mount: Deactivated successfully. Apr 12 18:16:10.880542 env[1102]: time="2024-04-12T18:16:10.880497737Z" level=info msg="CreateContainer within sandbox \"8bd437c7642b2b5ab65f05244f02b30dfdbaacc6a258f6807fd9defe38d51452\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"2adb5b40e6c8edc8e539c73431b9cc9d6771024dfd1a46b03a9ed8c8df4d76fc\"" Apr 12 18:16:10.881029 env[1102]: time="2024-04-12T18:16:10.880986264Z" level=info msg="StartContainer for \"2adb5b40e6c8edc8e539c73431b9cc9d6771024dfd1a46b03a9ed8c8df4d76fc\"" Apr 12 18:16:10.896883 systemd[1]: Started cri-containerd-2adb5b40e6c8edc8e539c73431b9cc9d6771024dfd1a46b03a9ed8c8df4d76fc.scope. Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.983242 kernel: kauditd_printk_skb: 45 callbacks suppressed Apr 12 18:16:10.983331 kernel: audit: type=1400 audit(1712945770.979:1132): avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.983361 kernel: audit: type=1300 audit(1712945770.979:1132): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2459 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.979000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2459 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646235623430653663386564633865353339633733343331623963 Apr 12 18:16:10.990018 kernel: audit: type=1327 audit(1712945770.979:1132): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646235623430653663386564633865353339633733343331623963 Apr 12 18:16:10.990098 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.994541 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.994602 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.999402 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.002458 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.002538 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:11.007155 kernel: audit: type=1400 audit(1712945770.979:1133): avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit: BPF prog-id=142 op=LOAD Apr 12 18:16:10.979000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2459 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646235623430653663386564633865353339633733343331623963 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.979000 audit: BPF prog-id=143 op=LOAD Apr 12 18:16:10.979000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2459 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646235623430653663386564633865353339633733343331623963 Apr 12 18:16:10.982000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:16:10.982000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { perfmon } for pid=2967 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit[2967]: AVC avc: denied { bpf } for pid=2967 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:10.982000 audit: BPF prog-id=144 op=LOAD Apr 12 18:16:10.982000 audit[2967]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2459 pid=2967 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:10.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261646235623430653663386564633865353339633733343331623963 Apr 12 18:16:11.102605 env[1102]: time="2024-04-12T18:16:11.102538652Z" level=info msg="StartContainer for \"2adb5b40e6c8edc8e539c73431b9cc9d6771024dfd1a46b03a9ed8c8df4d76fc\" returns successfully" Apr 12 18:16:11.174667 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:16:11.174815 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:16:11.800679 kubelet[1970]: E0412 18:16:11.800652 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:11.817582 kubelet[1970]: I0412 18:16:11.815531 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-mz8vc" podStartSLOduration=1.9478454360000002 podCreationTimestamp="2024-04-12 18:15:57 +0000 UTC" firstStartedPulling="2024-04-12 18:15:57.985316077 +0000 UTC m=+22.387259024" lastFinishedPulling="2024-04-12 18:16:10.852960121 +0000 UTC m=+35.254903028" observedRunningTime="2024-04-12 18:16:11.81481975 +0000 UTC m=+36.216762697" watchObservedRunningTime="2024-04-12 18:16:11.81548944 +0000 UTC m=+36.217432387" Apr 12 18:16:12.442000 audit[3093]: AVC avc: denied { write } for pid=3093 comm="tee" name="fd" dev="proc" ino=17201 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.442000 audit[3093]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff144a997 a2=241 a3=1b6 items=1 ppid=3052 pid=3093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.442000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:16:12.442000 audit: PATH item=0 name="/dev/fd/63" inode=17198 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.442000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.447000 audit[3107]: AVC avc: denied { write } for pid=3107 comm="tee" name="fd" dev="proc" ino=17212 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.447000 audit[3107]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcef3a987 a2=241 a3=1b6 items=1 ppid=3066 pid=3107 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.447000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:16:12.447000 audit: PATH item=0 name="/dev/fd/63" inode=16381 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.447000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.449000 audit[3109]: AVC avc: denied { write } for pid=3109 comm="tee" name="fd" dev="proc" ino=17216 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.449000 audit[3109]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcef1d999 a2=241 a3=1b6 items=1 ppid=3074 pid=3109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.449000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:16:12.449000 audit: PATH item=0 name="/dev/fd/63" inode=17209 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.449000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.455000 audit[3123]: AVC avc: denied { write } for pid=3123 comm="tee" name="fd" dev="proc" ino=17225 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.455000 audit[3123]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffb498997 a2=241 a3=1b6 items=1 ppid=3059 pid=3123 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.455000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:16:12.455000 audit: PATH item=0 name="/dev/fd/63" inode=18920 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.455000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.458000 audit[3126]: AVC avc: denied { write } for pid=3126 comm="tee" name="fd" dev="proc" ino=17229 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.458000 audit[3126]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe11f3988 a2=241 a3=1b6 items=1 ppid=3053 pid=3126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.458000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:16:12.458000 audit: PATH item=0 name="/dev/fd/63" inode=18333 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.458000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.471000 audit[3121]: AVC avc: denied { write } for pid=3121 comm="tee" name="fd" dev="proc" ino=19464 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.471000 audit[3121]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeaedc997 a2=241 a3=1b6 items=1 ppid=3061 pid=3121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.471000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:16:12.471000 audit: PATH item=0 name="/dev/fd/63" inode=17220 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.471000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.486000 audit[3133]: AVC avc: denied { write } for pid=3133 comm="tee" name="fd" dev="proc" ino=19469 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:16:12.486000 audit[3133]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff9cb6998 a2=241 a3=1b6 items=1 ppid=3054 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.486000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:16:12.486000 audit: PATH item=0 name="/dev/fd/63" inode=19466 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:16:12.486000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:16:12.503104 kubelet[1970]: I0412 18:16:12.503057 1970 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:16:12.503671 kubelet[1970]: E0412 18:16:12.503654 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:12.551410 systemd[1]: Started sshd@8-10.0.0.7:22-10.0.0.1:39026.service. Apr 12 18:16:12.550000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.7:22-10.0.0.1:39026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:12.558000 audit[3144]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:12.558000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffd0a71050 a2=0 a3=1 items=0 ppid=2130 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:12.558000 audit[3144]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=3144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:12.558000 audit[3144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffd0a71050 a2=0 a3=1 items=0 ppid=2130 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.558000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:12.597000 audit[3143]: USER_ACCT pid=3143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.599567 sshd[3143]: Accepted publickey for core from 10.0.0.1 port 39026 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:12.598000 audit[3143]: CRED_ACQ pid=3143 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.599000 audit[3143]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdae78fa0 a2=3 a3=1 items=0 ppid=1 pid=3143 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:12.600738 sshd[3143]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:12.604856 systemd-logind[1089]: New session 9 of user core. Apr 12 18:16:12.605755 systemd[1]: Started session-9.scope. Apr 12 18:16:12.610000 audit[3143]: USER_START pid=3143 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.612000 audit[3151]: CRED_ACQ pid=3151 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit: BPF prog-id=145 op=LOAD Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5d11718 a2=70 a3=ffffd5d11788 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit: BPF prog-id=146 op=LOAD Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffd5d11718 a2=70 a3=4b243c items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffd5d116d0 a2=70 a3=ffffd5d11740 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit: BPF prog-id=147 op=LOAD Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffd5d116b8 a2=70 a3=ffffd5d11728 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5d11788 a2=70 a3=0 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5d11778 a2=70 a3=0 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.721000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.721000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffd5d116e8 a2=70 a3=0 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.721000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffd5d117c0 a2=70 a3=2ae429ef items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffd5d117c0 a2=70 a3=2ae429ef items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { perfmon } for pid=3196 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit[3196]: AVC avc: denied { bpf } for pid=3196 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.722000 audit: BPF prog-id=148 op=LOAD Apr 12 18:16:12.722000 audit[3196]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffd5d116e8 a2=70 a3=2ae42a09 items=0 ppid=3064 pid=3196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.722000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:16:12.728000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.728000 audit[3198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8eb0e68 a2=70 a3=ffffe8eb0ed8 items=0 ppid=3064 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:16:12.728000 audit[3198]: AVC avc: denied { bpf } for pid=3198 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:12.728000 audit[3198]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe8eb0d38 a2=70 a3=ffffe8eb0da8 items=0 ppid=3064 pid=3198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.728000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:16:12.743110 sshd[3143]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:12.742000 audit[3143]: USER_END pid=3143 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.742000 audit[3143]: CRED_DISP pid=3143 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:12.743000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:16:12.745351 systemd[1]: sshd@8-10.0.0.7:22-10.0.0.1:39026.service: Deactivated successfully. Apr 12 18:16:12.744000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.7:22-10.0.0.1:39026 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:12.746089 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:16:12.747197 systemd-logind[1089]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:16:12.747746 systemd-logind[1089]: Removed session 9. Apr 12 18:16:12.785000 audit[3230]: NETFILTER_CFG table=mangle:97 family=2 entries=16 op=nft_register_chain pid=3230 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:12.785000 audit[3230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff9779b80 a2=0 a3=ffffbc45bfa8 items=0 ppid=3064 pid=3230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.785000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:12.786000 audit[3227]: NETFILTER_CFG table=raw:98 family=2 entries=19 op=nft_register_chain pid=3227 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:12.786000 audit[3227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc99e4d20 a2=0 a3=ffffb24f9fa8 items=0 ppid=3064 pid=3227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.786000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:12.790000 audit[3228]: NETFILTER_CFG table=nat:99 family=2 entries=15 op=nft_register_chain pid=3228 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:12.790000 audit[3228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=fffff31167d0 a2=0 a3=ffffa8196fa8 items=0 ppid=3064 pid=3228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:12.790000 audit[3232]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3232 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:12.790000 audit[3232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=ffffde7b5020 a2=0 a3=ffff94e2bfa8 items=0 ppid=3064 pid=3232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:12.790000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:12.802682 kubelet[1970]: E0412 18:16:12.802307 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:12.802682 kubelet[1970]: E0412 18:16:12.802514 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:13.627604 systemd-networkd[1003]: vxlan.calico: Link UP Apr 12 18:16:13.627610 systemd-networkd[1003]: vxlan.calico: Gained carrier Apr 12 18:16:15.144235 systemd-networkd[1003]: vxlan.calico: Gained IPv6LL Apr 12 18:16:17.748203 systemd[1]: Started sshd@9-10.0.0.7:22-10.0.0.1:39028.service. Apr 12 18:16:17.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:17.750649 kernel: kauditd_printk_skb: 174 callbacks suppressed Apr 12 18:16:17.750739 kernel: audit: type=1130 audit(1712945777.747:1176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:17.796435 sshd[3308]: Accepted publickey for core from 10.0.0.1 port 39028 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:17.795000 audit[3308]: USER_ACCT pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.797000 audit[3308]: CRED_ACQ pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.802302 sshd[3308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:17.807122 kernel: audit: type=1101 audit(1712945777.795:1177): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.807207 kernel: audit: type=1103 audit(1712945777.797:1178): pid=3308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.811614 kernel: audit: type=1006 audit(1712945777.797:1179): pid=3308 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:16:17.797000 audit[3308]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd57ed30 a2=3 a3=1 items=0 ppid=1 pid=3308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:17.817626 kernel: audit: type=1300 audit(1712945777.797:1179): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd57ed30 a2=3 a3=1 items=0 ppid=1 pid=3308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:17.817715 kernel: audit: type=1327 audit(1712945777.797:1179): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:17.797000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:17.821634 systemd-logind[1089]: New session 10 of user core. Apr 12 18:16:17.822404 systemd[1]: Started session-10.scope. Apr 12 18:16:17.825000 audit[3308]: USER_START pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.831000 audit[3318]: CRED_ACQ pid=3318 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.833168 kernel: audit: type=1105 audit(1712945777.825:1180): pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.836106 kernel: audit: type=1103 audit(1712945777.831:1181): pid=3318 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.962849 sshd[3308]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:17.963000 audit[3308]: USER_END pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.963000 audit[3308]: CRED_DISP pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.967717 systemd[1]: Started sshd@10-10.0.0.7:22-10.0.0.1:39034.service. Apr 12 18:16:17.970825 kernel: audit: type=1106 audit(1712945777.963:1182): pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.970903 kernel: audit: type=1104 audit(1712945777.963:1183): pid=3308 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:17.967000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.7:22-10.0.0.1:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:17.976639 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:16:17.977390 systemd-logind[1089]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:16:17.977482 systemd[1]: sshd@9-10.0.0.7:22-10.0.0.1:39028.service: Deactivated successfully. Apr 12 18:16:17.976000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.7:22-10.0.0.1:39028 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:17.978795 systemd-logind[1089]: Removed session 10. Apr 12 18:16:18.026000 audit[3330]: USER_ACCT pid=3330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.027677 sshd[3330]: Accepted publickey for core from 10.0.0.1 port 39034 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:18.028000 audit[3330]: CRED_ACQ pid=3330 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.028000 audit[3330]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea881280 a2=3 a3=1 items=0 ppid=1 pid=3330 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:18.028000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:18.030455 sshd[3330]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:18.034293 systemd-logind[1089]: New session 11 of user core. Apr 12 18:16:18.034784 systemd[1]: Started session-11.scope. Apr 12 18:16:18.037000 audit[3330]: USER_START pid=3330 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.039000 audit[3333]: CRED_ACQ pid=3333 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.703754 env[1102]: time="2024-04-12T18:16:18.703697120Z" level=info msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" Apr 12 18:16:18.895741 sshd[3330]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:18.898000 audit[3330]: USER_END pid=3330 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.898000 audit[3330]: CRED_DISP pid=3330 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.7:22-10.0.0.1:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:18.901765 systemd[1]: Started sshd@11-10.0.0.7:22-10.0.0.1:39046.service. Apr 12 18:16:18.905000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.7:22-10.0.0.1:39034 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:18.908322 systemd-logind[1089]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:16:18.908575 systemd[1]: sshd@10-10.0.0.7:22-10.0.0.1:39034.service: Deactivated successfully. Apr 12 18:16:18.909550 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:16:18.910285 systemd-logind[1089]: Removed session 11. Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.812 [INFO][3356] k8s.go 585: Cleaning up netns ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.812 [INFO][3356] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" iface="eth0" netns="/var/run/netns/cni-6092b9ad-1d7f-e380-7508-97d8b2336fa7" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.815 [INFO][3356] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" iface="eth0" netns="/var/run/netns/cni-6092b9ad-1d7f-e380-7508-97d8b2336fa7" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.815 [INFO][3356] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" iface="eth0" netns="/var/run/netns/cni-6092b9ad-1d7f-e380-7508-97d8b2336fa7" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.815 [INFO][3356] k8s.go 592: Releasing IP address(es) ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.815 [INFO][3356] utils.go 188: Calico CNI releasing IP address ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.942 [INFO][3363] ipam_plugin.go 415: Releasing address using handleID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.942 [INFO][3363] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.942 [INFO][3363] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.952 [WARNING][3363] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.952 [INFO][3363] ipam_plugin.go 443: Releasing address using workloadID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.953 [INFO][3363] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:18.959130 env[1102]: 2024-04-12 18:16:18.955 [INFO][3356] k8s.go 598: Teardown processing complete. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:18.959130 env[1102]: time="2024-04-12T18:16:18.957098163Z" level=info msg="TearDown network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" successfully" Apr 12 18:16:18.959130 env[1102]: time="2024-04-12T18:16:18.957131603Z" level=info msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" returns successfully" Apr 12 18:16:18.959130 env[1102]: time="2024-04-12T18:16:18.958369139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-62zvt,Uid:a336b125-f258-4468-907c-c80efa008c45,Namespace:kube-system,Attempt:1,}" Apr 12 18:16:18.959031 systemd[1]: run-netns-cni\x2d6092b9ad\x2d1d7f\x2de380\x2d7508\x2d97d8b2336fa7.mount: Deactivated successfully. Apr 12 18:16:18.959650 kubelet[1970]: E0412 18:16:18.957678 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:18.959000 audit[3369]: USER_ACCT pid=3369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.960481 sshd[3369]: Accepted publickey for core from 10.0.0.1 port 39046 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:18.961000 audit[3369]: CRED_ACQ pid=3369 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.961000 audit[3369]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd652e860 a2=3 a3=1 items=0 ppid=1 pid=3369 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:18.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:18.963509 sshd[3369]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:18.970175 systemd-logind[1089]: New session 12 of user core. Apr 12 18:16:18.970331 systemd[1]: Started session-12.scope. Apr 12 18:16:18.973000 audit[3369]: USER_START pid=3369 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:18.978000 audit[3374]: CRED_ACQ pid=3374 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:19.091531 systemd-networkd[1003]: cali427bebe4c1c: Link UP Apr 12 18:16:19.093229 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:19.093310 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali427bebe4c1c: link becomes ready Apr 12 18:16:19.093387 systemd-networkd[1003]: cali427bebe4c1c: Gained carrier Apr 12 18:16:19.106518 sshd[3369]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:19.109000 audit[3369]: USER_END pid=3369 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:19.109000 audit[3369]: CRED_DISP pid=3369 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:19.111000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.7:22-10.0.0.1:39046 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:19.111950 systemd[1]: sshd@11-10.0.0.7:22-10.0.0.1:39046.service: Deactivated successfully. Apr 12 18:16:19.112676 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.008 [INFO][3375] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--62zvt-eth0 coredns-5d78c9869d- kube-system a336b125-f258-4468-907c-c80efa008c45 765 0 2024-04-12 18:15:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-62zvt eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali427bebe4c1c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.008 [INFO][3375] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.037 [INFO][3389] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" HandleID="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.050 [INFO][3389] ipam_plugin.go 268: Auto assigning IP ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" HandleID="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aa690), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-62zvt", "timestamp":"2024-04-12 18:16:19.037347182 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.050 [INFO][3389] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.050 [INFO][3389] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.050 [INFO][3389] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.057 [INFO][3389] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.063 [INFO][3389] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.067 [INFO][3389] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.069 [INFO][3389] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.071 [INFO][3389] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.071 [INFO][3389] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.073 [INFO][3389] ipam.go 1682: Creating new handle: k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02 Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.076 [INFO][3389] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.082 [INFO][3389] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.082 [INFO][3389] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" host="localhost" Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.082 [INFO][3389] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:19.114458 env[1102]: 2024-04-12 18:16:19.082 [INFO][3389] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" HandleID="k8s-pod-network.cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.088 [INFO][3375] k8s.go 385: Populated endpoint ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--62zvt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a336b125-f258-4468-907c-c80efa008c45", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-62zvt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali427bebe4c1c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.088 [INFO][3375] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.088 [INFO][3375] dataplane_linux.go 68: Setting the host side veth name to cali427bebe4c1c ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.093 [INFO][3375] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.098 [INFO][3375] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--62zvt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a336b125-f258-4468-907c-c80efa008c45", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02", Pod:"coredns-5d78c9869d-62zvt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali427bebe4c1c", MAC:"52:a0:43:ed:65:30", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:19.115574 env[1102]: 2024-04-12 18:16:19.108 [INFO][3375] k8s.go 498: Wrote updated endpoint to datastore ContainerID="cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02" Namespace="kube-system" Pod="coredns-5d78c9869d-62zvt" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:19.115129 systemd-logind[1089]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:16:19.116643 systemd-logind[1089]: Removed session 12. Apr 12 18:16:19.125000 audit[3431]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3431 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:19.125000 audit[3431]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=fffff1149480 a2=0 a3=ffffb66c4fa8 items=0 ppid=3064 pid=3431 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.125000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:19.128377 env[1102]: time="2024-04-12T18:16:19.128327407Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:19.128480 env[1102]: time="2024-04-12T18:16:19.128368888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:19.128480 env[1102]: time="2024-04-12T18:16:19.128379648Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:19.128574 env[1102]: time="2024-04-12T18:16:19.128542210Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02 pid=3433 runtime=io.containerd.runc.v2 Apr 12 18:16:19.143112 systemd[1]: Started cri-containerd-cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02.scope. Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.155000 audit: BPF prog-id=149 op=LOAD Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362326235636235336463633333396461633237396261343761663065 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362326235636235336463633333396461633237396261343761663065 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit: BPF prog-id=150 op=LOAD Apr 12 18:16:19.156000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362326235636235336463633333396461633237396261343761663065 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit: BPF prog-id=151 op=LOAD Apr 12 18:16:19.156000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362326235636235336463633333396461633237396261343761663065 Apr 12 18:16:19.156000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:16:19.156000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { perfmon } for pid=3443 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit[3443]: AVC avc: denied { bpf } for pid=3443 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.156000 audit: BPF prog-id=152 op=LOAD Apr 12 18:16:19.156000 audit[3443]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3433 pid=3443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6362326235636235336463633333396461633237396261343761663065 Apr 12 18:16:19.157870 systemd-resolved[1045]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:19.173994 env[1102]: time="2024-04-12T18:16:19.173947822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-62zvt,Uid:a336b125-f258-4468-907c-c80efa008c45,Namespace:kube-system,Attempt:1,} returns sandbox id \"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02\"" Apr 12 18:16:19.174660 kubelet[1970]: E0412 18:16:19.174641 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:19.176628 env[1102]: time="2024-04-12T18:16:19.176576375Z" level=info msg="CreateContainer within sandbox \"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:16:19.188605 env[1102]: time="2024-04-12T18:16:19.188500445Z" level=info msg="CreateContainer within sandbox \"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"9e4c2b21c8f7f677a5755d02453755e50cc21912dbe40d188138e58c1cd7f72a\"" Apr 12 18:16:19.190315 env[1102]: time="2024-04-12T18:16:19.190273867Z" level=info msg="StartContainer for \"9e4c2b21c8f7f677a5755d02453755e50cc21912dbe40d188138e58c1cd7f72a\"" Apr 12 18:16:19.204036 systemd[1]: Started cri-containerd-9e4c2b21c8f7f677a5755d02453755e50cc21912dbe40d188138e58c1cd7f72a.scope. Apr 12 18:16:19.221000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit: BPF prog-id=153 op=LOAD Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3433 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346332623231633866376636373761353735356430323435333735 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3433 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346332623231633866376636373761353735356430323435333735 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit: BPF prog-id=154 op=LOAD Apr 12 18:16:19.222000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3433 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346332623231633866376636373761353735356430323435333735 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit: BPF prog-id=155 op=LOAD Apr 12 18:16:19.222000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3433 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346332623231633866376636373761353735356430323435333735 Apr 12 18:16:19.222000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:16:19.222000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { perfmon } for pid=3474 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit[3474]: AVC avc: denied { bpf } for pid=3474 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:19.222000 audit: BPF prog-id=156 op=LOAD Apr 12 18:16:19.222000 audit[3474]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3433 pid=3474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3965346332623231633866376636373761353735356430323435333735 Apr 12 18:16:19.259922 env[1102]: time="2024-04-12T18:16:19.259869303Z" level=info msg="StartContainer for \"9e4c2b21c8f7f677a5755d02453755e50cc21912dbe40d188138e58c1cd7f72a\" returns successfully" Apr 12 18:16:19.703664 env[1102]: time="2024-04-12T18:16:19.703623568Z" level=info msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] k8s.go 585: Cleaning up netns ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" iface="eth0" netns="/var/run/netns/cni-7affe7fd-1e83-4bfa-f763-18716ca56240" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" iface="eth0" netns="/var/run/netns/cni-7affe7fd-1e83-4bfa-f763-18716ca56240" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" iface="eth0" netns="/var/run/netns/cni-7affe7fd-1e83-4bfa-f763-18716ca56240" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] k8s.go 592: Releasing IP address(es) ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.746 [INFO][3522] utils.go 188: Calico CNI releasing IP address ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.764 [INFO][3530] ipam_plugin.go 415: Releasing address using handleID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.765 [INFO][3530] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.765 [INFO][3530] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.773 [WARNING][3530] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.773 [INFO][3530] ipam_plugin.go 443: Releasing address using workloadID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.775 [INFO][3530] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:19.778270 env[1102]: 2024-04-12 18:16:19.776 [INFO][3522] k8s.go 598: Teardown processing complete. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:19.778827 env[1102]: time="2024-04-12T18:16:19.778394669Z" level=info msg="TearDown network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" successfully" Apr 12 18:16:19.778827 env[1102]: time="2024-04-12T18:16:19.778433070Z" level=info msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" returns successfully" Apr 12 18:16:19.779147 env[1102]: time="2024-04-12T18:16:19.779114438Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-559b466c7d-4sqf9,Uid:b6109acf-1502-4cb5-98f5-a80790996b1c,Namespace:calico-system,Attempt:1,}" Apr 12 18:16:19.822531 kubelet[1970]: E0412 18:16:19.822108 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:19.841107 kubelet[1970]: I0412 18:16:19.840413 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-62zvt" podStartSLOduration=27.840376929 podCreationTimestamp="2024-04-12 18:15:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:16:19.830848609 +0000 UTC m=+44.232791596" watchObservedRunningTime="2024-04-12 18:16:19.840376929 +0000 UTC m=+44.242319836" Apr 12 18:16:19.844000 audit[3558]: NETFILTER_CFG table=filter:102 family=2 entries=14 op=nft_register_rule pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.844000 audit[3558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffedfc8720 a2=0 a3=1 items=0 ppid=2130 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.844000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.846000 audit[3558]: NETFILTER_CFG table=nat:103 family=2 entries=14 op=nft_register_rule pid=3558 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.846000 audit[3558]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffedfc8720 a2=0 a3=1 items=0 ppid=2130 pid=3558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.858000 audit[3561]: NETFILTER_CFG table=filter:104 family=2 entries=11 op=nft_register_rule pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.858000 audit[3561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc2f06a10 a2=0 a3=1 items=0 ppid=2130 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.860000 audit[3561]: NETFILTER_CFG table=nat:105 family=2 entries=35 op=nft_register_chain pid=3561 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:19.860000 audit[3561]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc2f06a10 a2=0 a3=1 items=0 ppid=2130 pid=3561 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.860000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:19.913315 systemd-networkd[1003]: calid7908a7539c: Link UP Apr 12 18:16:19.914291 systemd-networkd[1003]: calid7908a7539c: Gained carrier Apr 12 18:16:19.915085 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid7908a7539c: link becomes ready Apr 12 18:16:19.960513 systemd[1]: run-netns-cni\x2d7affe7fd\x2d1e83\x2d4bfa\x2df763\x2d18716ca56240.mount: Deactivated successfully. Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.817 [INFO][3538] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0 calico-kube-controllers-559b466c7d- calico-system b6109acf-1502-4cb5-98f5-a80790996b1c 793 0 2024-04-12 18:15:57 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:559b466c7d projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-559b466c7d-4sqf9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid7908a7539c [] []}} ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.817 [INFO][3538] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.862 [INFO][3552] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" HandleID="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.876 [INFO][3552] ipam_plugin.go 268: Auto assigning IP ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" HandleID="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000c9e80), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-559b466c7d-4sqf9", "timestamp":"2024-04-12 18:16:19.862795772 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.876 [INFO][3552] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.876 [INFO][3552] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.876 [INFO][3552] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.878 [INFO][3552] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.885 [INFO][3552] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.889 [INFO][3552] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.891 [INFO][3552] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.894 [INFO][3552] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.894 [INFO][3552] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.896 [INFO][3552] ipam.go 1682: Creating new handle: k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416 Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.900 [INFO][3552] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.909 [INFO][3552] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.909 [INFO][3552] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" host="localhost" Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.909 [INFO][3552] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:19.985714 env[1102]: 2024-04-12 18:16:19.909 [INFO][3552] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" HandleID="k8s-pod-network.2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.912 [INFO][3538] k8s.go 385: Populated endpoint ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0", GenerateName:"calico-kube-controllers-559b466c7d-", Namespace:"calico-system", SelfLink:"", UID:"b6109acf-1502-4cb5-98f5-a80790996b1c", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"559b466c7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-559b466c7d-4sqf9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7908a7539c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.912 [INFO][3538] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.912 [INFO][3538] dataplane_linux.go 68: Setting the host side veth name to calid7908a7539c ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.914 [INFO][3538] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.914 [INFO][3538] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0", GenerateName:"calico-kube-controllers-559b466c7d-", Namespace:"calico-system", SelfLink:"", UID:"b6109acf-1502-4cb5-98f5-a80790996b1c", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"559b466c7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416", Pod:"calico-kube-controllers-559b466c7d-4sqf9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7908a7539c", MAC:"26:92:f5:e3:be:35", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:19.986327 env[1102]: 2024-04-12 18:16:19.983 [INFO][3538] k8s.go 498: Wrote updated endpoint to datastore ContainerID="2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416" Namespace="calico-system" Pod="calico-kube-controllers-559b466c7d-4sqf9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:19.995000 audit[3582]: NETFILTER_CFG table=filter:106 family=2 entries=40 op=nft_register_chain pid=3582 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:19.995000 audit[3582]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffcab6c950 a2=0 a3=ffff95becfa8 items=0 ppid=3064 pid=3582 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:19.995000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:20.003833 env[1102]: time="2024-04-12T18:16:20.003768425Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:20.003833 env[1102]: time="2024-04-12T18:16:20.003813826Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:20.003833 env[1102]: time="2024-04-12T18:16:20.003823826Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:20.004075 env[1102]: time="2024-04-12T18:16:20.003975348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416 pid=3592 runtime=io.containerd.runc.v2 Apr 12 18:16:20.019145 systemd[1]: Started cri-containerd-2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416.scope. Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit: BPF prog-id=157 op=LOAD Apr 12 18:16:20.041000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.041000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3592 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656462313130633436343230623566656164663230623263356461 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3592 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656462313130633436343230623566656164663230623263356461 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit: BPF prog-id=158 op=LOAD Apr 12 18:16:20.042000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3592 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656462313130633436343230623566656164663230623263356461 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit: BPF prog-id=159 op=LOAD Apr 12 18:16:20.042000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3592 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656462313130633436343230623566656164663230623263356461 Apr 12 18:16:20.042000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:16:20.042000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { perfmon } for pid=3600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit[3600]: AVC avc: denied { bpf } for pid=3600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:20.042000 audit: BPF prog-id=160 op=LOAD Apr 12 18:16:20.042000 audit[3600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3592 pid=3600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.042000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264656462313130633436343230623566656164663230623263356461 Apr 12 18:16:20.043981 systemd-resolved[1045]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:20.060849 env[1102]: time="2024-04-12T18:16:20.060810332Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-559b466c7d-4sqf9,Uid:b6109acf-1502-4cb5-98f5-a80790996b1c,Namespace:calico-system,Attempt:1,} returns sandbox id \"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416\"" Apr 12 18:16:20.063351 env[1102]: time="2024-04-12T18:16:20.063316843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:16:20.200283 systemd-networkd[1003]: cali427bebe4c1c: Gained IPv6LL Apr 12 18:16:20.703617 env[1102]: time="2024-04-12T18:16:20.703579454Z" level=info msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.745 [INFO][3641] k8s.go 585: Cleaning up netns ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.746 [INFO][3641] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" iface="eth0" netns="/var/run/netns/cni-c0a665c3-dc5a-94d9-7257-3289bcd40e22" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.746 [INFO][3641] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" iface="eth0" netns="/var/run/netns/cni-c0a665c3-dc5a-94d9-7257-3289bcd40e22" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.746 [INFO][3641] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" iface="eth0" netns="/var/run/netns/cni-c0a665c3-dc5a-94d9-7257-3289bcd40e22" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.746 [INFO][3641] k8s.go 592: Releasing IP address(es) ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.746 [INFO][3641] utils.go 188: Calico CNI releasing IP address ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.766 [INFO][3648] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.766 [INFO][3648] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.766 [INFO][3648] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.776 [WARNING][3648] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.779 [INFO][3648] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.781 [INFO][3648] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:20.784678 env[1102]: 2024-04-12 18:16:20.783 [INFO][3641] k8s.go 598: Teardown processing complete. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:20.786301 env[1102]: time="2024-04-12T18:16:20.786255958Z" level=info msg="TearDown network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" successfully" Apr 12 18:16:20.786397 env[1102]: time="2024-04-12T18:16:20.786380480Z" level=info msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" returns successfully" Apr 12 18:16:20.786525 systemd[1]: run-netns-cni\x2dc0a665c3\x2ddc5a\x2d94d9\x2d7257\x2d3289bcd40e22.mount: Deactivated successfully. Apr 12 18:16:20.787379 kubelet[1970]: E0412 18:16:20.787353 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:20.789010 env[1102]: time="2024-04-12T18:16:20.788968592Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-p9jp4,Uid:f0af4f36-6c0c-46f7-ab40-b15652f0bdf9,Namespace:kube-system,Attempt:1,}" Apr 12 18:16:20.825951 kubelet[1970]: E0412 18:16:20.825905 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:20.955803 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:20.955994 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib633338ab3b: link becomes ready Apr 12 18:16:20.954491 systemd-networkd[1003]: calib633338ab3b: Link UP Apr 12 18:16:20.955830 systemd-networkd[1003]: calib633338ab3b: Gained carrier Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.844 [INFO][3657] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5d78c9869d--p9jp4-eth0 coredns-5d78c9869d- kube-system f0af4f36-6c0c-46f7-ab40-b15652f0bdf9 808 0 2024-04-12 18:15:52 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5d78c9869d-p9jp4 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib633338ab3b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.844 [INFO][3657] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.870 [INFO][3670] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" HandleID="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.882 [INFO][3670] ipam_plugin.go 268: Auto assigning IP ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" HandleID="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000d64b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5d78c9869d-p9jp4", "timestamp":"2024-04-12 18:16:20.870582643 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.883 [INFO][3670] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.883 [INFO][3670] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.883 [INFO][3670] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.884 [INFO][3670] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.888 [INFO][3670] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.926 [INFO][3670] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.928 [INFO][3670] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.930 [INFO][3670] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.930 [INFO][3670] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.931 [INFO][3670] ipam.go 1682: Creating new handle: k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6 Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.934 [INFO][3670] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.949 [INFO][3670] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.949 [INFO][3670] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" host="localhost" Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.949 [INFO][3670] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:20.972649 env[1102]: 2024-04-12 18:16:20.949 [INFO][3670] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" HandleID="k8s-pod-network.3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.952 [INFO][3657] k8s.go 385: Populated endpoint ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--p9jp4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5d78c9869d-p9jp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib633338ab3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.952 [INFO][3657] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.952 [INFO][3657] dataplane_linux.go 68: Setting the host side veth name to calib633338ab3b ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.957 [INFO][3657] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.962 [INFO][3657] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--p9jp4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9", ResourceVersion:"808", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6", Pod:"coredns-5d78c9869d-p9jp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib633338ab3b", MAC:"5a:a2:30:b0:e5:36", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:20.973548 env[1102]: 2024-04-12 18:16:20.970 [INFO][3657] k8s.go 498: Wrote updated endpoint to datastore ContainerID="3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6" Namespace="kube-system" Pod="coredns-5d78c9869d-p9jp4" WorkloadEndpoint="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:20.980000 audit[3692]: NETFILTER_CFG table=filter:107 family=2 entries=34 op=nft_register_chain pid=3692 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:20.980000 audit[3692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18220 a0=3 a1=fffff2a14ad0 a2=0 a3=ffffa43c4fa8 items=0 ppid=3064 pid=3692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:20.980000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:21.075563 env[1102]: time="2024-04-12T18:16:21.075483047Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:21.075563 env[1102]: time="2024-04-12T18:16:21.075536488Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:21.075563 env[1102]: time="2024-04-12T18:16:21.075547408Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:21.075777 env[1102]: time="2024-04-12T18:16:21.075708570Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6 pid=3699 runtime=io.containerd.runc.v2 Apr 12 18:16:21.087352 systemd[1]: Started cri-containerd-3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6.scope. Apr 12 18:16:21.091494 systemd[1]: run-containerd-runc-k8s.io-3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6-runc.aR6vny.mount: Deactivated successfully. Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.109000 audit: BPF prog-id=161 op=LOAD Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3699 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376665666630653733356233386463313236306538633230393039 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3699 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376665666630653733356233386463313236306538633230393039 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit: BPF prog-id=162 op=LOAD Apr 12 18:16:21.110000 audit[3709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3699 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376665666630653733356233386463313236306538633230393039 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit: BPF prog-id=163 op=LOAD Apr 12 18:16:21.110000 audit[3709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3699 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376665666630653733356233386463313236306538633230393039 Apr 12 18:16:21.110000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:16:21.110000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { perfmon } for pid=3709 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit[3709]: AVC avc: denied { bpf } for pid=3709 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.110000 audit: BPF prog-id=164 op=LOAD Apr 12 18:16:21.110000 audit[3709]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3699 pid=3709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363376665666630653733356233386463313236306538633230393039 Apr 12 18:16:21.112256 systemd-resolved[1045]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:21.132022 env[1102]: time="2024-04-12T18:16:21.131974096Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-p9jp4,Uid:f0af4f36-6c0c-46f7-ab40-b15652f0bdf9,Namespace:kube-system,Attempt:1,} returns sandbox id \"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6\"" Apr 12 18:16:21.132698 kubelet[1970]: E0412 18:16:21.132664 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:21.134704 env[1102]: time="2024-04-12T18:16:21.134665569Z" level=info msg="CreateContainer within sandbox \"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:16:21.152194 env[1102]: time="2024-04-12T18:16:21.152151502Z" level=info msg="CreateContainer within sandbox \"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"942d70e358ad4a6c46b069455934cdb66a4261ba8a0801db0d5ab2a17486520c\"" Apr 12 18:16:21.153697 env[1102]: time="2024-04-12T18:16:21.153670561Z" level=info msg="StartContainer for \"942d70e358ad4a6c46b069455934cdb66a4261ba8a0801db0d5ab2a17486520c\"" Apr 12 18:16:21.167827 systemd[1]: Started cri-containerd-942d70e358ad4a6c46b069455934cdb66a4261ba8a0801db0d5ab2a17486520c.scope. Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.196000 audit: BPF prog-id=165 op=LOAD Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326437306533353861643461366334366230363934353539333463 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326437306533353861643461366334366230363934353539333463 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit: BPF prog-id=166 op=LOAD Apr 12 18:16:21.197000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326437306533353861643461366334366230363934353539333463 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit: BPF prog-id=167 op=LOAD Apr 12 18:16:21.197000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326437306533353861643461366334366230363934353539333463 Apr 12 18:16:21.197000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:16:21.197000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:21.197000 audit: BPF prog-id=168 op=LOAD Apr 12 18:16:21.197000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3934326437306533353861643461366334366230363934353539333463 Apr 12 18:16:21.224293 env[1102]: time="2024-04-12T18:16:21.224171341Z" level=info msg="StartContainer for \"942d70e358ad4a6c46b069455934cdb66a4261ba8a0801db0d5ab2a17486520c\" returns successfully" Apr 12 18:16:21.704683 env[1102]: time="2024-04-12T18:16:21.704631443Z" level=info msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.750 [INFO][3794] k8s.go 585: Cleaning up netns ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.750 [INFO][3794] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" iface="eth0" netns="/var/run/netns/cni-94e73c16-b707-5d68-6d06-3f2bdd46861c" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.750 [INFO][3794] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" iface="eth0" netns="/var/run/netns/cni-94e73c16-b707-5d68-6d06-3f2bdd46861c" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.751 [INFO][3794] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" iface="eth0" netns="/var/run/netns/cni-94e73c16-b707-5d68-6d06-3f2bdd46861c" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.751 [INFO][3794] k8s.go 592: Releasing IP address(es) ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.751 [INFO][3794] utils.go 188: Calico CNI releasing IP address ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.770 [INFO][3803] ipam_plugin.go 415: Releasing address using handleID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.770 [INFO][3803] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.770 [INFO][3803] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.786 [WARNING][3803] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.786 [INFO][3803] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.788 [INFO][3803] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:21.794025 env[1102]: 2024-04-12 18:16:21.789 [INFO][3794] k8s.go 598: Teardown processing complete. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:21.794711 env[1102]: time="2024-04-12T18:16:21.794176816Z" level=info msg="TearDown network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" successfully" Apr 12 18:16:21.794711 env[1102]: time="2024-04-12T18:16:21.794207616Z" level=info msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" returns successfully" Apr 12 18:16:21.795369 env[1102]: time="2024-04-12T18:16:21.795340110Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5cg5c,Uid:1fd67d13-6f0e-4b9d-8e05-40c22b734a8f,Namespace:calico-system,Attempt:1,}" Apr 12 18:16:21.839419 kubelet[1970]: E0412 18:16:21.839362 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:21.839991 kubelet[1970]: E0412 18:16:21.839767 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:21.849947 kubelet[1970]: I0412 18:16:21.849899 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-p9jp4" podStartSLOduration=29.849688013 podCreationTimestamp="2024-04-12 18:15:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:16:21.849386369 +0000 UTC m=+46.251329316" watchObservedRunningTime="2024-04-12 18:16:21.849688013 +0000 UTC m=+46.251630960" Apr 12 18:16:21.865109 systemd-networkd[1003]: calid7908a7539c: Gained IPv6LL Apr 12 18:16:21.867000 audit[3824]: NETFILTER_CFG table=filter:108 family=2 entries=8 op=nft_register_rule pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.867000 audit[3824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffc13220b0 a2=0 a3=1 items=0 ppid=2130 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.868000 audit[3824]: NETFILTER_CFG table=nat:109 family=2 entries=44 op=nft_register_rule pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.868000 audit[3824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffc13220b0 a2=0 a3=1 items=0 ppid=2130 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.882000 audit[3826]: NETFILTER_CFG table=filter:110 family=2 entries=8 op=nft_register_rule pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.882000 audit[3826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=fffff31f3840 a2=0 a3=1 items=0 ppid=2130 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.882000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.892000 audit[3826]: NETFILTER_CFG table=nat:111 family=2 entries=56 op=nft_register_chain pid=3826 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:21.892000 audit[3826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=fffff31f3840 a2=0 a3=1 items=0 ppid=2130 pid=3826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.892000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:21.960664 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1346324252.mount: Deactivated successfully. Apr 12 18:16:21.961990 systemd[1]: run-netns-cni\x2d94e73c16\x2db707\x2d5d68\x2d6d06\x2d3f2bdd46861c.mount: Deactivated successfully. Apr 12 18:16:21.969341 systemd-networkd[1003]: cali9d4a991a2bd: Link UP Apr 12 18:16:21.970084 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:21.970164 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9d4a991a2bd: link becomes ready Apr 12 18:16:21.971000 systemd-networkd[1003]: cali9d4a991a2bd: Gained carrier Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.897 [INFO][3811] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--5cg5c-eth0 csi-node-driver- calico-system 1fd67d13-6f0e-4b9d-8e05-40c22b734a8f 836 0 2024-04-12 18:15:57 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:54c68f759 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-5cg5c eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali9d4a991a2bd [] []}} ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.897 [INFO][3811] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.923 [INFO][3829] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" HandleID="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.938 [INFO][3829] ipam_plugin.go 268: Auto assigning IP ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" HandleID="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000d77b0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-5cg5c", "timestamp":"2024-04-12 18:16:21.923791437 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.938 [INFO][3829] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.938 [INFO][3829] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.938 [INFO][3829] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.939 [INFO][3829] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.943 [INFO][3829] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.946 [INFO][3829] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.947 [INFO][3829] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.949 [INFO][3829] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.949 [INFO][3829] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.950 [INFO][3829] ipam.go 1682: Creating new handle: k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.954 [INFO][3829] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.964 [INFO][3829] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.964 [INFO][3829] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" host="localhost" Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.964 [INFO][3829] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:21.987123 env[1102]: 2024-04-12 18:16:21.964 [INFO][3829] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" HandleID="k8s-pod-network.baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.966 [INFO][3811] k8s.go 385: Populated endpoint ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5cg5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-5cg5c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9d4a991a2bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.966 [INFO][3811] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.966 [INFO][3811] dataplane_linux.go 68: Setting the host side veth name to cali9d4a991a2bd ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.971 [INFO][3811] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.971 [INFO][3811] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5cg5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e", Pod:"csi-node-driver-5cg5c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9d4a991a2bd", MAC:"c6:28:9d:5c:09:80", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:21.987812 env[1102]: 2024-04-12 18:16:21.980 [INFO][3811] k8s.go 498: Wrote updated endpoint to datastore ContainerID="baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e" Namespace="calico-system" Pod="csi-node-driver-5cg5c" WorkloadEndpoint="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:21.990000 audit[3846]: NETFILTER_CFG table=filter:112 family=2 entries=42 op=nft_register_chain pid=3846 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:21.990000 audit[3846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21016 a0=3 a1=ffffdea082d0 a2=0 a3=ffffa37f3fa8 items=0 ppid=3064 pid=3846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:21.990000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:22.012906 env[1102]: time="2024-04-12T18:16:22.012828681Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:22.012906 env[1102]: time="2024-04-12T18:16:22.012900042Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:22.013081 env[1102]: time="2024-04-12T18:16:22.012938882Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:22.013227 env[1102]: time="2024-04-12T18:16:22.013175125Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e pid=3860 runtime=io.containerd.runc.v2 Apr 12 18:16:22.034058 systemd[1]: Started cri-containerd-baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e.scope. Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061628 env[1102]: time="2024-04-12T18:16:22.061289944Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:22.060000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.060000 audit: BPF prog-id=169 op=LOAD Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3860 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261616439376432353663333134623063626435326663346263623935 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3860 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261616439376432353663333134623063626435326663346263623935 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit: BPF prog-id=170 op=LOAD Apr 12 18:16:22.061000 audit[3870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3860 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261616439376432353663333134623063626435326663346263623935 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.062998 env[1102]: time="2024-04-12T18:16:22.062861083Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit: BPF prog-id=171 op=LOAD Apr 12 18:16:22.061000 audit[3870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3860 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261616439376432353663333134623063626435326663346263623935 Apr 12 18:16:22.061000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:16:22.061000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { perfmon } for pid=3870 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit[3870]: AVC avc: denied { bpf } for pid=3870 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.061000 audit: BPF prog-id=172 op=LOAD Apr 12 18:16:22.061000 audit[3870]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3860 pid=3870 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.061000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261616439376432353663333134623063626435326663346263623935 Apr 12 18:16:22.064578 systemd-resolved[1045]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:22.064780 env[1102]: time="2024-04-12T18:16:22.064745625Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:22.066536 env[1102]: time="2024-04-12T18:16:22.066467246Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:22.067757 env[1102]: time="2024-04-12T18:16:22.067696741Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:16:22.077156 env[1102]: time="2024-04-12T18:16:22.077120694Z" level=info msg="CreateContainer within sandbox \"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:16:22.086788 env[1102]: time="2024-04-12T18:16:22.086737290Z" level=info msg="CreateContainer within sandbox \"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b800ec860473a70ad736a9b6deee61ccbacc1ed7a1474b1b5582651b6186c648\"" Apr 12 18:16:22.086888 env[1102]: time="2024-04-12T18:16:22.086872972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5cg5c,Uid:1fd67d13-6f0e-4b9d-8e05-40c22b734a8f,Namespace:calico-system,Attempt:1,} returns sandbox id \"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e\"" Apr 12 18:16:22.088063 env[1102]: time="2024-04-12T18:16:22.087637581Z" level=info msg="StartContainer for \"b800ec860473a70ad736a9b6deee61ccbacc1ed7a1474b1b5582651b6186c648\"" Apr 12 18:16:22.088588 env[1102]: time="2024-04-12T18:16:22.088559832Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:16:22.103297 systemd[1]: Started cri-containerd-b800ec860473a70ad736a9b6deee61ccbacc1ed7a1474b1b5582651b6186c648.scope. Apr 12 18:16:22.120701 systemd-networkd[1003]: calib633338ab3b: Gained IPv6LL Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit: BPF prog-id=173 op=LOAD Apr 12 18:16:22.155000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.155000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3592 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303065633836303437336137306164373336613962366465656536 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3592 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303065633836303437336137306164373336613962366465656536 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit: BPF prog-id=174 op=LOAD Apr 12 18:16:22.156000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3592 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303065633836303437336137306164373336613962366465656536 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit: BPF prog-id=175 op=LOAD Apr 12 18:16:22.156000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3592 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303065633836303437336137306164373336613962366465656536 Apr 12 18:16:22.156000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:16:22.156000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { perfmon } for pid=3904 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit[3904]: AVC avc: denied { bpf } for pid=3904 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:22.156000 audit: BPF prog-id=176 op=LOAD Apr 12 18:16:22.156000 audit[3904]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3592 pid=3904 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:22.156000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238303065633836303437336137306164373336613962366465656536 Apr 12 18:16:22.176025 env[1102]: time="2024-04-12T18:16:22.175978243Z" level=info msg="StartContainer for \"b800ec860473a70ad736a9b6deee61ccbacc1ed7a1474b1b5582651b6186c648\" returns successfully" Apr 12 18:16:22.843793 kubelet[1970]: E0412 18:16:22.843759 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:22.906112 kubelet[1970]: I0412 18:16:22.905673 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-559b466c7d-4sqf9" podStartSLOduration=23.899788062 podCreationTimestamp="2024-04-12 18:15:57 +0000 UTC" firstStartedPulling="2024-04-12 18:16:20.062032507 +0000 UTC m=+44.463975454" lastFinishedPulling="2024-04-12 18:16:22.067879823 +0000 UTC m=+46.469822770" observedRunningTime="2024-04-12 18:16:22.857798563 +0000 UTC m=+47.259741510" watchObservedRunningTime="2024-04-12 18:16:22.905635378 +0000 UTC m=+47.307578285" Apr 12 18:16:23.157939 env[1102]: time="2024-04-12T18:16:23.156125165Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:23.161622 env[1102]: time="2024-04-12T18:16:23.157982547Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:23.161622 env[1102]: time="2024-04-12T18:16:23.159253922Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:23.161622 env[1102]: time="2024-04-12T18:16:23.160745620Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:23.161622 env[1102]: time="2024-04-12T18:16:23.161172625Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:16:23.163053 env[1102]: time="2024-04-12T18:16:23.163015727Z" level=info msg="CreateContainer within sandbox \"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:16:23.177043 env[1102]: time="2024-04-12T18:16:23.177001612Z" level=info msg="CreateContainer within sandbox \"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"a0aad742d7164146d4ef85ce69e72cdb0dbbbbcfe13b6ad0df97b8954d241ecf\"" Apr 12 18:16:23.178767 env[1102]: time="2024-04-12T18:16:23.177648620Z" level=info msg="StartContainer for \"a0aad742d7164146d4ef85ce69e72cdb0dbbbbcfe13b6ad0df97b8954d241ecf\"" Apr 12 18:16:23.194264 systemd[1]: Started cri-containerd-a0aad742d7164146d4ef85ce69e72cdb0dbbbbcfe13b6ad0df97b8954d241ecf.scope. Apr 12 18:16:23.230099 kernel: kauditd_printk_skb: 458 callbacks suppressed Apr 12 18:16:23.230240 kernel: audit: type=1400 audit(1712945783.221:1341): avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.230286 kernel: audit: type=1300 audit(1712945783.221:1341): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3860 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:23.230307 kernel: audit: type=1327 audit(1712945783.221:1341): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130616164373432643731363431343664346566383563653639653732 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3860 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:23.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130616164373432643731363431343664346566383563653639653732 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.234251 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.234323 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.238943 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.241265 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.241333 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.245711 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.245785 kernel: audit: type=1400 audit(1712945783.221:1342): avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.221000 audit: BPF prog-id=177 op=LOAD Apr 12 18:16:23.221000 audit[3976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3860 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:23.221000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130616164373432643731363431343664346566383563653639653732 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.222000 audit: BPF prog-id=178 op=LOAD Apr 12 18:16:23.222000 audit[3976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3860 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:23.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130616164373432643731363431343664346566383563653639653732 Apr 12 18:16:23.224000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:16:23.224000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { perfmon } for pid=3976 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit[3976]: AVC avc: denied { bpf } for pid=3976 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:23.224000 audit: BPF prog-id=179 op=LOAD Apr 12 18:16:23.224000 audit[3976]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3860 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:23.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130616164373432643731363431343664346566383563653639653732 Apr 12 18:16:23.250997 env[1102]: time="2024-04-12T18:16:23.250950810Z" level=info msg="StartContainer for \"a0aad742d7164146d4ef85ce69e72cdb0dbbbbcfe13b6ad0df97b8954d241ecf\" returns successfully" Apr 12 18:16:23.252622 env[1102]: time="2024-04-12T18:16:23.252593549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:16:23.528315 systemd-networkd[1003]: cali9d4a991a2bd: Gained IPv6LL Apr 12 18:16:23.847675 kubelet[1970]: E0412 18:16:23.847646 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:24.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.7:22-10.0.0.1:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:24.111441 systemd[1]: Started sshd@12-10.0.0.7:22-10.0.0.1:43236.service. Apr 12 18:16:24.158000 audit[4005]: USER_ACCT pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.159523 sshd[4005]: Accepted publickey for core from 10.0.0.1 port 43236 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:24.159000 audit[4005]: CRED_ACQ pid=4005 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.159000 audit[4005]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0f693f0 a2=3 a3=1 items=0 ppid=1 pid=4005 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:24.159000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:24.160880 sshd[4005]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:24.164111 systemd-logind[1089]: New session 13 of user core. Apr 12 18:16:24.165640 systemd[1]: Started session-13.scope. Apr 12 18:16:24.168000 audit[4005]: USER_START pid=4005 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.169000 audit[4007]: CRED_ACQ pid=4007 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.302407 sshd[4005]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:24.302000 audit[4005]: USER_END pid=4005 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.302000 audit[4005]: CRED_DISP pid=4005 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:24.303000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.7:22-10.0.0.1:43236 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:24.304698 systemd[1]: sshd@12-10.0.0.7:22-10.0.0.1:43236.service: Deactivated successfully. Apr 12 18:16:24.305554 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:16:24.306563 systemd-logind[1089]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:16:24.307398 systemd-logind[1089]: Removed session 13. Apr 12 18:16:24.388618 env[1102]: time="2024-04-12T18:16:24.388508524Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:24.389921 env[1102]: time="2024-04-12T18:16:24.389869780Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:24.391561 env[1102]: time="2024-04-12T18:16:24.391533880Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:24.392524 env[1102]: time="2024-04-12T18:16:24.392489891Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:24.392890 env[1102]: time="2024-04-12T18:16:24.392855415Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:16:24.396237 env[1102]: time="2024-04-12T18:16:24.396189774Z" level=info msg="CreateContainer within sandbox \"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:16:24.407332 env[1102]: time="2024-04-12T18:16:24.406725737Z" level=info msg="CreateContainer within sandbox \"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"e2a23ceeb5417b2b8f7e95294968f5c85553c7566701ca22fd2a23350849f581\"" Apr 12 18:16:24.407332 env[1102]: time="2024-04-12T18:16:24.407204223Z" level=info msg="StartContainer for \"e2a23ceeb5417b2b8f7e95294968f5c85553c7566701ca22fd2a23350849f581\"" Apr 12 18:16:24.425904 systemd[1]: Started cri-containerd-e2a23ceeb5417b2b8f7e95294968f5c85553c7566701ca22fd2a23350849f581.scope. Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3860 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532613233636565623534313762326238663765393532393439363866 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.474000 audit: BPF prog-id=180 op=LOAD Apr 12 18:16:24.474000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3860 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:24.474000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532613233636565623534313762326238663765393532393439363866 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit: BPF prog-id=181 op=LOAD Apr 12 18:16:24.475000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3860 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:24.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532613233636565623534313762326238663765393532393439363866 Apr 12 18:16:24.475000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:16:24.475000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { perfmon } for pid=4025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit[4025]: AVC avc: denied { bpf } for pid=4025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:24.475000 audit: BPF prog-id=182 op=LOAD Apr 12 18:16:24.475000 audit[4025]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3860 pid=4025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:24.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532613233636565623534313762326238663765393532393439363866 Apr 12 18:16:24.488547 env[1102]: time="2024-04-12T18:16:24.488498055Z" level=info msg="StartContainer for \"e2a23ceeb5417b2b8f7e95294968f5c85553c7566701ca22fd2a23350849f581\" returns successfully" Apr 12 18:16:24.775688 kubelet[1970]: I0412 18:16:24.775602 1970 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:16:24.779327 kubelet[1970]: I0412 18:16:24.779251 1970 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:16:24.864767 kubelet[1970]: I0412 18:16:24.864726 1970 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5cg5c" podStartSLOduration=25.559741588 podCreationTimestamp="2024-04-12 18:15:57 +0000 UTC" firstStartedPulling="2024-04-12 18:16:22.088305069 +0000 UTC m=+46.490248016" lastFinishedPulling="2024-04-12 18:16:24.39324522 +0000 UTC m=+48.795188167" observedRunningTime="2024-04-12 18:16:24.860414969 +0000 UTC m=+49.262357916" watchObservedRunningTime="2024-04-12 18:16:24.864681739 +0000 UTC m=+49.266624686" Apr 12 18:16:29.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:55484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:29.307623 systemd[1]: Started sshd@13-10.0.0.7:22-10.0.0.1:55484.service. Apr 12 18:16:29.308510 kernel: kauditd_printk_skb: 87 callbacks suppressed Apr 12 18:16:29.308561 kernel: audit: type=1130 audit(1712945789.306:1362): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:55484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:29.366000 audit[4062]: USER_ACCT pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.367474 sshd[4062]: Accepted publickey for core from 10.0.0.1 port 55484 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:29.368439 sshd[4062]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:29.367000 audit[4062]: CRED_ACQ pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.373106 kernel: audit: type=1101 audit(1712945789.366:1363): pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.373280 kernel: audit: type=1103 audit(1712945789.367:1364): pid=4062 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.375615 kernel: audit: type=1006 audit(1712945789.367:1365): pid=4062 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:16:29.375502 systemd-logind[1089]: New session 14 of user core. Apr 12 18:16:29.367000 audit[4062]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf340010 a2=3 a3=1 items=0 ppid=1 pid=4062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:29.376042 systemd[1]: Started session-14.scope. Apr 12 18:16:29.379483 kernel: audit: type=1300 audit(1712945789.367:1365): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf340010 a2=3 a3=1 items=0 ppid=1 pid=4062 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:29.379551 kernel: audit: type=1327 audit(1712945789.367:1365): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:29.367000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:29.379000 audit[4062]: USER_START pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.384226 kernel: audit: type=1105 audit(1712945789.379:1366): pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.383000 audit[4064]: CRED_ACQ pid=4064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.387953 kernel: audit: type=1103 audit(1712945789.383:1367): pid=4064 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.523737 sshd[4062]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:29.523000 audit[4062]: USER_END pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.526641 systemd[1]: sshd@13-10.0.0.7:22-10.0.0.1:55484.service: Deactivated successfully. Apr 12 18:16:29.527548 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:16:29.528086 systemd-logind[1089]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:16:29.524000 audit[4062]: CRED_DISP pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.528793 systemd-logind[1089]: Removed session 14. Apr 12 18:16:29.531114 kernel: audit: type=1106 audit(1712945789.523:1368): pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.531224 kernel: audit: type=1104 audit(1712945789.524:1369): pid=4062 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:29.525000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.7:22-10.0.0.1:55484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:32.632000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.632000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.632000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400a10de60 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.632000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400968db30 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:32.632000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:32.633000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520995 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.633000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40096ec870 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.633000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:32.634000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=521001 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.634000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400968db90 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.634000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:32.675000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.675000 audit[1855]: AVC avc: denied { watch } for pid=1855 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:32.675000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400cb92c60 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.675000 audit[1855]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40094d08d0 a2=fc6 a3=0 items=0 ppid=1677 pid=1855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c515,c842 key=(null) Apr 12 18:16:32.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:32.675000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E37002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E65 Apr 12 18:16:33.772000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:33.772000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000b0b720 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:33.772000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:33.772000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:33.772000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40020f5800 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:33.772000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:34.314508 systemd[1]: run-containerd-runc-k8s.io-2adb5b40e6c8edc8e539c73431b9cc9d6771024dfd1a46b03a9ed8c8df4d76fc-runc.arNTrx.mount: Deactivated successfully. Apr 12 18:16:34.377607 kubelet[1970]: E0412 18:16:34.377569 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:34.528446 systemd[1]: Started sshd@14-10.0.0.7:22-10.0.0.1:55500.service. Apr 12 18:16:34.532407 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:16:34.532494 kernel: audit: type=1130 audit(1712945794.527:1379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:55500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:34.527000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:55500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:34.567000 audit[4112]: USER_ACCT pid=4112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.568999 sshd[4112]: Accepted publickey for core from 10.0.0.1 port 55500 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:34.570686 sshd[4112]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:34.569000 audit[4112]: CRED_ACQ pid=4112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.576082 kernel: audit: type=1101 audit(1712945794.567:1380): pid=4112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.576210 kernel: audit: type=1103 audit(1712945794.569:1381): pid=4112 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.576251 kernel: audit: type=1006 audit(1712945794.569:1382): pid=4112 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:16:34.575400 systemd[1]: Started session-15.scope. Apr 12 18:16:34.575703 systemd-logind[1089]: New session 15 of user core. Apr 12 18:16:34.569000 audit[4112]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4151230 a2=3 a3=1 items=0 ppid=1 pid=4112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.580601 kernel: audit: type=1300 audit(1712945794.569:1382): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4151230 a2=3 a3=1 items=0 ppid=1 pid=4112 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:34.580664 kernel: audit: type=1327 audit(1712945794.569:1382): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:34.569000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:34.579000 audit[4112]: USER_START pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.585004 kernel: audit: type=1105 audit(1712945794.579:1383): pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.585074 kernel: audit: type=1103 audit(1712945794.580:1384): pid=4114 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.580000 audit[4114]: CRED_ACQ pid=4114 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.690274 sshd[4112]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:34.690000 audit[4112]: USER_END pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.692923 systemd[1]: sshd@14-10.0.0.7:22-10.0.0.1:55500.service: Deactivated successfully. Apr 12 18:16:34.693710 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:16:34.694400 systemd-logind[1089]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:16:34.690000 audit[4112]: CRED_DISP pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.695203 systemd-logind[1089]: Removed session 15. Apr 12 18:16:34.697883 kernel: audit: type=1106 audit(1712945794.690:1385): pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.697953 kernel: audit: type=1104 audit(1712945794.690:1386): pid=4112 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:34.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.7:22-10.0.0.1:55500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:35.678363 env[1102]: time="2024-04-12T18:16:35.678323322Z" level=info msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.722 [WARNING][4141] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0", GenerateName:"calico-kube-controllers-559b466c7d-", Namespace:"calico-system", SelfLink:"", UID:"b6109acf-1502-4cb5-98f5-a80790996b1c", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"559b466c7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416", Pod:"calico-kube-controllers-559b466c7d-4sqf9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7908a7539c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.722 [INFO][4141] k8s.go 585: Cleaning up netns ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.722 [INFO][4141] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" iface="eth0" netns="" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.722 [INFO][4141] k8s.go 592: Releasing IP address(es) ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.722 [INFO][4141] utils.go 188: Calico CNI releasing IP address ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.746 [INFO][4150] ipam_plugin.go 415: Releasing address using handleID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.746 [INFO][4150] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.746 [INFO][4150] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.755 [WARNING][4150] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.755 [INFO][4150] ipam_plugin.go 443: Releasing address using workloadID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.756 [INFO][4150] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:35.760008 env[1102]: 2024-04-12 18:16:35.758 [INFO][4141] k8s.go 598: Teardown processing complete. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.760589 env[1102]: time="2024-04-12T18:16:35.760046456Z" level=info msg="TearDown network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" successfully" Apr 12 18:16:35.760589 env[1102]: time="2024-04-12T18:16:35.760087896Z" level=info msg="StopPodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" returns successfully" Apr 12 18:16:35.761218 env[1102]: time="2024-04-12T18:16:35.761189767Z" level=info msg="RemovePodSandbox for \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" Apr 12 18:16:35.761362 env[1102]: time="2024-04-12T18:16:35.761319366Z" level=info msg="Forcibly stopping sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\"" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.798 [WARNING][4172] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0", GenerateName:"calico-kube-controllers-559b466c7d-", Namespace:"calico-system", SelfLink:"", UID:"b6109acf-1502-4cb5-98f5-a80790996b1c", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"559b466c7d", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"2dedb110c46420b5feadf20b2c5da692f528104562e13bfc24e362ada0cbd416", Pod:"calico-kube-controllers-559b466c7d-4sqf9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid7908a7539c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.798 [INFO][4172] k8s.go 585: Cleaning up netns ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.798 [INFO][4172] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" iface="eth0" netns="" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.798 [INFO][4172] k8s.go 592: Releasing IP address(es) ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.798 [INFO][4172] utils.go 188: Calico CNI releasing IP address ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.818 [INFO][4179] ipam_plugin.go 415: Releasing address using handleID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.818 [INFO][4179] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.818 [INFO][4179] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.828 [WARNING][4179] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.828 [INFO][4179] ipam_plugin.go 443: Releasing address using workloadID ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" HandleID="k8s-pod-network.75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Workload="localhost-k8s-calico--kube--controllers--559b466c7d--4sqf9-eth0" Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.830 [INFO][4179] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:35.833361 env[1102]: 2024-04-12 18:16:35.831 [INFO][4172] k8s.go 598: Teardown processing complete. ContainerID="75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7" Apr 12 18:16:35.833781 env[1102]: time="2024-04-12T18:16:35.833386098Z" level=info msg="TearDown network for sandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" successfully" Apr 12 18:16:35.836271 env[1102]: time="2024-04-12T18:16:35.836240515Z" level=info msg="RemovePodSandbox \"75f15812aabdc80b2cf8bf5bb0c8be15eeb97cbf50bdc677882a1cce97746ea7\" returns successfully" Apr 12 18:16:35.836847 env[1102]: time="2024-04-12T18:16:35.836806710Z" level=info msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.882 [WARNING][4203] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--62zvt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a336b125-f258-4468-907c-c80efa008c45", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02", Pod:"coredns-5d78c9869d-62zvt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali427bebe4c1c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.882 [INFO][4203] k8s.go 585: Cleaning up netns ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.882 [INFO][4203] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" iface="eth0" netns="" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.882 [INFO][4203] k8s.go 592: Releasing IP address(es) ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.882 [INFO][4203] utils.go 188: Calico CNI releasing IP address ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.900 [INFO][4211] ipam_plugin.go 415: Releasing address using handleID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.901 [INFO][4211] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.901 [INFO][4211] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.909 [WARNING][4211] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.909 [INFO][4211] ipam_plugin.go 443: Releasing address using workloadID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.911 [INFO][4211] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:35.914417 env[1102]: 2024-04-12 18:16:35.912 [INFO][4203] k8s.go 598: Teardown processing complete. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.914859 env[1102]: time="2024-04-12T18:16:35.914439678Z" level=info msg="TearDown network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" successfully" Apr 12 18:16:35.914859 env[1102]: time="2024-04-12T18:16:35.914483597Z" level=info msg="StopPodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" returns successfully" Apr 12 18:16:35.914945 env[1102]: time="2024-04-12T18:16:35.914907914Z" level=info msg="RemovePodSandbox for \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" Apr 12 18:16:35.914982 env[1102]: time="2024-04-12T18:16:35.914946153Z" level=info msg="Forcibly stopping sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\"" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.950 [WARNING][4233] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--62zvt-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"a336b125-f258-4468-907c-c80efa008c45", ResourceVersion:"798", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"cb2b5cb53dcc339dac279ba47af0e4275b2f755cd004bd10beb4bd39ddc7cf02", Pod:"coredns-5d78c9869d-62zvt", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali427bebe4c1c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.950 [INFO][4233] k8s.go 585: Cleaning up netns ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.950 [INFO][4233] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" iface="eth0" netns="" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.950 [INFO][4233] k8s.go 592: Releasing IP address(es) ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.950 [INFO][4233] utils.go 188: Calico CNI releasing IP address ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.968 [INFO][4240] ipam_plugin.go 415: Releasing address using handleID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.969 [INFO][4240] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.969 [INFO][4240] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.977 [WARNING][4240] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.978 [INFO][4240] ipam_plugin.go 443: Releasing address using workloadID ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" HandleID="k8s-pod-network.021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Workload="localhost-k8s-coredns--5d78c9869d--62zvt-eth0" Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.979 [INFO][4240] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:35.982804 env[1102]: 2024-04-12 18:16:35.981 [INFO][4233] k8s.go 598: Teardown processing complete. ContainerID="021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6" Apr 12 18:16:35.984104 env[1102]: time="2024-04-12T18:16:35.984054990Z" level=info msg="TearDown network for sandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" successfully" Apr 12 18:16:35.986814 env[1102]: time="2024-04-12T18:16:35.986770528Z" level=info msg="RemovePodSandbox \"021b59e8548d888c7524d9fcf1179c5d2ea8d8e117fa3c8d1179154bbfec77e6\" returns successfully" Apr 12 18:16:35.987378 env[1102]: time="2024-04-12T18:16:35.987344843Z" level=info msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.024 [WARNING][4263] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--p9jp4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6", Pod:"coredns-5d78c9869d-p9jp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib633338ab3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.024 [INFO][4263] k8s.go 585: Cleaning up netns ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.024 [INFO][4263] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" iface="eth0" netns="" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.024 [INFO][4263] k8s.go 592: Releasing IP address(es) ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.024 [INFO][4263] utils.go 188: Calico CNI releasing IP address ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.052 [INFO][4278] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.052 [INFO][4278] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.052 [INFO][4278] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.063 [WARNING][4278] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.063 [INFO][4278] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.065 [INFO][4278] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:36.070236 env[1102]: 2024-04-12 18:16:36.067 [INFO][4263] k8s.go 598: Teardown processing complete. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.070949 env[1102]: time="2024-04-12T18:16:36.070915476Z" level=info msg="TearDown network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" successfully" Apr 12 18:16:36.071056 env[1102]: time="2024-04-12T18:16:36.071027995Z" level=info msg="StopPodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" returns successfully" Apr 12 18:16:36.071971 env[1102]: time="2024-04-12T18:16:36.071946268Z" level=info msg="RemovePodSandbox for \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" Apr 12 18:16:36.072123 env[1102]: time="2024-04-12T18:16:36.072084547Z" level=info msg="Forcibly stopping sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\"" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.107 [WARNING][4311] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5d78c9869d--p9jp4-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"f0af4f36-6c0c-46f7-ab40-b15652f0bdf9", ResourceVersion:"842", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 52, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c7feff0e735b38dc1260e8c20909eb37a5986e7aa9f2876b665087846dcf0c6", Pod:"coredns-5d78c9869d-p9jp4", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib633338ab3b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.107 [INFO][4311] k8s.go 585: Cleaning up netns ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.107 [INFO][4311] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" iface="eth0" netns="" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.107 [INFO][4311] k8s.go 592: Releasing IP address(es) ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.107 [INFO][4311] utils.go 188: Calico CNI releasing IP address ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.125 [INFO][4319] ipam_plugin.go 415: Releasing address using handleID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.125 [INFO][4319] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.125 [INFO][4319] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.134 [WARNING][4319] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.134 [INFO][4319] ipam_plugin.go 443: Releasing address using workloadID ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" HandleID="k8s-pod-network.dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Workload="localhost-k8s-coredns--5d78c9869d--p9jp4-eth0" Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.135 [INFO][4319] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:36.138994 env[1102]: 2024-04-12 18:16:36.137 [INFO][4311] k8s.go 598: Teardown processing complete. ContainerID="dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4" Apr 12 18:16:36.139565 env[1102]: time="2024-04-12T18:16:36.139525430Z" level=info msg="TearDown network for sandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" successfully" Apr 12 18:16:36.147027 env[1102]: time="2024-04-12T18:16:36.146986133Z" level=info msg="RemovePodSandbox \"dc86878cd192129b35a701777c6b16b719d6b468b5d58ad01ae13501e4da4aa4\" returns successfully" Apr 12 18:16:36.147700 env[1102]: time="2024-04-12T18:16:36.147671128Z" level=info msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.181 [WARNING][4342] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5cg5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e", Pod:"csi-node-driver-5cg5c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9d4a991a2bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.182 [INFO][4342] k8s.go 585: Cleaning up netns ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.182 [INFO][4342] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" iface="eth0" netns="" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.182 [INFO][4342] k8s.go 592: Releasing IP address(es) ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.182 [INFO][4342] utils.go 188: Calico CNI releasing IP address ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.200 [INFO][4349] ipam_plugin.go 415: Releasing address using handleID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.200 [INFO][4349] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.200 [INFO][4349] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.210 [WARNING][4349] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.210 [INFO][4349] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.212 [INFO][4349] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:36.215239 env[1102]: 2024-04-12 18:16:36.213 [INFO][4342] k8s.go 598: Teardown processing complete. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.215670 env[1102]: time="2024-04-12T18:16:36.215264610Z" level=info msg="TearDown network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" successfully" Apr 12 18:16:36.215670 env[1102]: time="2024-04-12T18:16:36.215296049Z" level=info msg="StopPodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" returns successfully" Apr 12 18:16:36.215823 env[1102]: time="2024-04-12T18:16:36.215799006Z" level=info msg="RemovePodSandbox for \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" Apr 12 18:16:36.215874 env[1102]: time="2024-04-12T18:16:36.215838685Z" level=info msg="Forcibly stopping sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\"" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.256 [WARNING][4372] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5cg5c-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"1fd67d13-6f0e-4b9d-8e05-40c22b734a8f", ResourceVersion:"887", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 15, 57, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"54c68f759", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"baad97d256c314b0cbd52fc4bcb95fe0efef4606402b4d9fd611b96b332b862e", Pod:"csi-node-driver-5cg5c", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali9d4a991a2bd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.256 [INFO][4372] k8s.go 585: Cleaning up netns ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.257 [INFO][4372] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" iface="eth0" netns="" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.257 [INFO][4372] k8s.go 592: Releasing IP address(es) ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.257 [INFO][4372] utils.go 188: Calico CNI releasing IP address ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.275 [INFO][4380] ipam_plugin.go 415: Releasing address using handleID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.275 [INFO][4380] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.275 [INFO][4380] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.284 [WARNING][4380] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.284 [INFO][4380] ipam_plugin.go 443: Releasing address using workloadID ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" HandleID="k8s-pod-network.cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Workload="localhost-k8s-csi--node--driver--5cg5c-eth0" Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.285 [INFO][4380] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:36.289391 env[1102]: 2024-04-12 18:16:36.287 [INFO][4372] k8s.go 598: Teardown processing complete. ContainerID="cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5" Apr 12 18:16:36.289391 env[1102]: time="2024-04-12T18:16:36.289361242Z" level=info msg="TearDown network for sandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" successfully" Apr 12 18:16:36.292230 env[1102]: time="2024-04-12T18:16:36.292190700Z" level=info msg="RemovePodSandbox \"cd55bffa59ae5cbdfb45cfbe1fca25c4385773de92c20da5920d5c8314ba9cc5\" returns successfully" Apr 12 18:16:39.695645 systemd[1]: Started sshd@15-10.0.0.7:22-10.0.0.1:46118.service. Apr 12 18:16:39.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:46118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:39.697940 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:16:39.698036 kernel: audit: type=1130 audit(1712945799.694:1388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:46118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:39.737000 audit[4408]: USER_ACCT pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.739237 sshd[4408]: Accepted publickey for core from 10.0.0.1 port 46118 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:39.740825 sshd[4408]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:39.739000 audit[4408]: CRED_ACQ pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.745693 kernel: audit: type=1101 audit(1712945799.737:1389): pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.745746 kernel: audit: type=1103 audit(1712945799.739:1390): pid=4408 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.747874 kernel: audit: type=1006 audit(1712945799.739:1391): pid=4408 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:16:39.739000 audit[4408]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8b8b020 a2=3 a3=1 items=0 ppid=1 pid=4408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:39.750331 systemd-logind[1089]: New session 16 of user core. Apr 12 18:16:39.750709 systemd[1]: Started session-16.scope. Apr 12 18:16:39.751766 kernel: audit: type=1300 audit(1712945799.739:1391): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8b8b020 a2=3 a3=1 items=0 ppid=1 pid=4408 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:39.739000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:39.752958 kernel: audit: type=1327 audit(1712945799.739:1391): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:39.753000 audit[4408]: USER_START pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.757000 audit[4410]: CRED_ACQ pid=4410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.761665 kernel: audit: type=1105 audit(1712945799.753:1392): pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.761723 kernel: audit: type=1103 audit(1712945799.757:1393): pid=4410 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.870638 sshd[4408]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:39.871000 audit[4408]: USER_END pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.874406 systemd[1]: Started sshd@16-10.0.0.7:22-10.0.0.1:46124.service. Apr 12 18:16:39.874900 systemd[1]: sshd@15-10.0.0.7:22-10.0.0.1:46118.service: Deactivated successfully. Apr 12 18:16:39.875955 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:16:39.871000 audit[4408]: CRED_DISP pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.876800 systemd-logind[1089]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:16:39.877586 systemd-logind[1089]: Removed session 16. Apr 12 18:16:39.878916 kernel: audit: type=1106 audit(1712945799.871:1394): pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.878969 kernel: audit: type=1104 audit(1712945799.871:1395): pid=4408 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.871000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.7:22-10.0.0.1:46124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:39.871000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.7:22-10.0.0.1:46118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:39.915000 audit[4420]: USER_ACCT pid=4420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.916667 sshd[4420]: Accepted publickey for core from 10.0.0.1 port 46124 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:39.916000 audit[4420]: CRED_ACQ pid=4420 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.916000 audit[4420]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef87b610 a2=3 a3=1 items=0 ppid=1 pid=4420 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:39.916000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:39.917909 sshd[4420]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:39.921600 systemd-logind[1089]: New session 17 of user core. Apr 12 18:16:39.922495 systemd[1]: Started session-17.scope. Apr 12 18:16:39.924000 audit[4420]: USER_START pid=4420 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:39.926000 audit[4423]: CRED_ACQ pid=4423 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.176337 sshd[4420]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:40.176000 audit[4420]: USER_END pid=4420 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.176000 audit[4420]: CRED_DISP pid=4420 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.181480 systemd[1]: sshd@16-10.0.0.7:22-10.0.0.1:46124.service: Deactivated successfully. Apr 12 18:16:40.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.7:22-10.0.0.1:46124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:40.182170 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:16:40.184342 systemd-logind[1089]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:16:40.185511 systemd[1]: Started sshd@17-10.0.0.7:22-10.0.0.1:46140.service. Apr 12 18:16:40.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.7:22-10.0.0.1:46140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:40.190693 systemd-logind[1089]: Removed session 17. Apr 12 18:16:40.228000 audit[4433]: USER_ACCT pid=4433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.230128 sshd[4433]: Accepted publickey for core from 10.0.0.1 port 46140 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:40.230000 audit[4433]: CRED_ACQ pid=4433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.230000 audit[4433]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3a84c80 a2=3 a3=1 items=0 ppid=1 pid=4433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:40.230000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:40.231587 sshd[4433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:40.238976 systemd-logind[1089]: New session 18 of user core. Apr 12 18:16:40.239406 systemd[1]: Started session-18.scope. Apr 12 18:16:40.242000 audit[4433]: USER_START pid=4433 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:40.243000 audit[4435]: CRED_ACQ pid=4435 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.170000 audit[4447]: NETFILTER_CFG table=filter:113 family=2 entries=20 op=nft_register_rule pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.170000 audit[4447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffdc7f1fe0 a2=0 a3=1 items=0 ppid=2130 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.170000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.186436 sshd[4433]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:41.171000 audit[4447]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4447 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.171000 audit[4447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffdc7f1fe0 a2=0 a3=1 items=0 ppid=2130 pid=4447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.171000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.191291 systemd[1]: Started sshd@18-10.0.0.7:22-10.0.0.1:46152.service. Apr 12 18:16:41.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.7:22-10.0.0.1:46152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:41.191000 audit[4433]: USER_END pid=4433 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.191000 audit[4433]: CRED_DISP pid=4433 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.203082 systemd[1]: sshd@17-10.0.0.7:22-10.0.0.1:46140.service: Deactivated successfully. Apr 12 18:16:41.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.7:22-10.0.0.1:46140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:41.204016 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:16:41.205836 systemd-logind[1089]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:16:41.207161 systemd-logind[1089]: Removed session 18. Apr 12 18:16:41.207000 audit[4453]: NETFILTER_CFG table=filter:115 family=2 entries=32 op=nft_register_rule pid=4453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.207000 audit[4453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=fffff84de090 a2=0 a3=1 items=0 ppid=2130 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.207000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.208000 audit[4453]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4453 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:41.208000 audit[4453]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff84de090 a2=0 a3=1 items=0 ppid=2130 pid=4453 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.208000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:41.239000 audit[4449]: USER_ACCT pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.241128 sshd[4449]: Accepted publickey for core from 10.0.0.1 port 46152 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:41.241000 audit[4449]: CRED_ACQ pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.241000 audit[4449]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff072430 a2=3 a3=1 items=0 ppid=1 pid=4449 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.241000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:41.242689 sshd[4449]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:41.247766 systemd-logind[1089]: New session 19 of user core. Apr 12 18:16:41.248346 systemd[1]: Started session-19.scope. Apr 12 18:16:41.252000 audit[4449]: USER_START pid=4449 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.254000 audit[4454]: CRED_ACQ pid=4454 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.573919 sshd[4449]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:41.578000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.7:22-10.0.0.1:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:41.579399 systemd[1]: Started sshd@19-10.0.0.7:22-10.0.0.1:46154.service. Apr 12 18:16:41.582000 audit[4449]: USER_END pid=4449 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.582000 audit[4449]: CRED_DISP pid=4449 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.588469 systemd[1]: sshd@18-10.0.0.7:22-10.0.0.1:46152.service: Deactivated successfully. Apr 12 18:16:41.587000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.7:22-10.0.0.1:46152 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:41.589479 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:16:41.590312 systemd-logind[1089]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:16:41.593694 systemd-logind[1089]: Removed session 19. Apr 12 18:16:41.632000 audit[4463]: USER_ACCT pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.633737 sshd[4463]: Accepted publickey for core from 10.0.0.1 port 46154 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:41.635000 audit[4463]: CRED_ACQ pid=4463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.635000 audit[4463]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe6d28ff0 a2=3 a3=1 items=0 ppid=1 pid=4463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:41.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:41.636632 sshd[4463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:41.640513 systemd-logind[1089]: New session 20 of user core. Apr 12 18:16:41.641426 systemd[1]: Started session-20.scope. Apr 12 18:16:41.645000 audit[4463]: USER_START pid=4463 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.647000 audit[4466]: CRED_ACQ pid=4466 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.785576 sshd[4463]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:41.785000 audit[4463]: USER_END pid=4463 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.785000 audit[4463]: CRED_DISP pid=4463 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:41.790125 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:16:41.790741 systemd-logind[1089]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:16:41.790863 systemd[1]: sshd@19-10.0.0.7:22-10.0.0.1:46154.service: Deactivated successfully. Apr 12 18:16:41.790000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.7:22-10.0.0.1:46154 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:41.791943 systemd-logind[1089]: Removed session 20. Apr 12 18:16:46.003054 kubelet[1970]: I0412 18:16:46.003007 1970 topology_manager.go:212] "Topology Admit Handler" Apr 12 18:16:46.009736 systemd[1]: Created slice kubepods-besteffort-podeb1a988b_8f4b_40e9_b2c5_7362c92ee9d0.slice. Apr 12 18:16:46.024000 audit[4484]: NETFILTER_CFG table=filter:117 family=2 entries=33 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.026152 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:16:46.026240 kernel: audit: type=1325 audit(1712945806.024:1437): table=filter:117 family=2 entries=33 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.024000 audit[4484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc52d6400 a2=0 a3=1 items=0 ppid=2130 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.024000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.034292 kernel: audit: type=1300 audit(1712945806.024:1437): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc52d6400 a2=0 a3=1 items=0 ppid=2130 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.034360 kernel: audit: type=1327 audit(1712945806.024:1437): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.025000 audit[4484]: NETFILTER_CFG table=nat:118 family=2 entries=20 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.025000 audit[4484]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc52d6400 a2=0 a3=1 items=0 ppid=2130 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.042181 kernel: audit: type=1325 audit(1712945806.025:1438): table=nat:118 family=2 entries=20 op=nft_register_rule pid=4484 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.042257 kernel: audit: type=1300 audit(1712945806.025:1438): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc52d6400 a2=0 a3=1 items=0 ppid=2130 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.042280 kernel: audit: type=1327 audit(1712945806.025:1438): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.025000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.041000 audit[4487]: NETFILTER_CFG table=filter:119 family=2 entries=34 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.041000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=fffff8eb76e0 a2=0 a3=1 items=0 ppid=2130 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.050663 kernel: audit: type=1325 audit(1712945806.041:1439): table=filter:119 family=2 entries=34 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.050723 kernel: audit: type=1300 audit(1712945806.041:1439): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=fffff8eb76e0 a2=0 a3=1 items=0 ppid=2130 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.050745 kernel: audit: type=1327 audit(1712945806.041:1439): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.041000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.044000 audit[4487]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.044000 audit[4487]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=fffff8eb76e0 a2=0 a3=1 items=0 ppid=2130 pid=4487 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.044000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:46.061094 kernel: audit: type=1325 audit(1712945806.044:1440): table=nat:120 family=2 entries=20 op=nft_register_rule pid=4487 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:46.161416 kubelet[1970]: I0412 18:16:46.161374 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qbwpf\" (UniqueName: \"kubernetes.io/projected/eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0-kube-api-access-qbwpf\") pod \"calico-apiserver-7844cc77cc-d2sp8\" (UID: \"eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0\") " pod="calico-apiserver/calico-apiserver-7844cc77cc-d2sp8" Apr 12 18:16:46.161569 kubelet[1970]: I0412 18:16:46.161489 1970 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0-calico-apiserver-certs\") pod \"calico-apiserver-7844cc77cc-d2sp8\" (UID: \"eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0\") " pod="calico-apiserver/calico-apiserver-7844cc77cc-d2sp8" Apr 12 18:16:46.313233 env[1102]: time="2024-04-12T18:16:46.313128758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7844cc77cc-d2sp8,Uid:eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:16:46.435864 systemd-networkd[1003]: cali519303a5efc: Link UP Apr 12 18:16:46.437550 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:16:46.437600 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali519303a5efc: link becomes ready Apr 12 18:16:46.437748 systemd-networkd[1003]: cali519303a5efc: Gained carrier Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.359 [INFO][4490] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0 calico-apiserver-7844cc77cc- calico-apiserver eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0 1043 0 2024-04-12 18:16:45 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7844cc77cc projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-7844cc77cc-d2sp8 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali519303a5efc [] []}} ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.360 [INFO][4490] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.383 [INFO][4504] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" HandleID="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Workload="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.396 [INFO][4504] ipam_plugin.go 268: Auto assigning IP ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" HandleID="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Workload="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000569480), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-7844cc77cc-d2sp8", "timestamp":"2024-04-12 18:16:46.383915066 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.396 [INFO][4504] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.397 [INFO][4504] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.397 [INFO][4504] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.401 [INFO][4504] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.407 [INFO][4504] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.413 [INFO][4504] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.415 [INFO][4504] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.419 [INFO][4504] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.419 [INFO][4504] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.420 [INFO][4504] ipam.go 1682: Creating new handle: k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82 Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.426 [INFO][4504] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.431 [INFO][4504] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.431 [INFO][4504] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" host="localhost" Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.431 [INFO][4504] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:16:46.447625 env[1102]: 2024-04-12 18:16:46.431 [INFO][4504] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" HandleID="k8s-pod-network.93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Workload="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.434 [INFO][4490] k8s.go 385: Populated endpoint ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0", GenerateName:"calico-apiserver-7844cc77cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7844cc77cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-7844cc77cc-d2sp8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali519303a5efc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.434 [INFO][4490] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.434 [INFO][4490] dataplane_linux.go 68: Setting the host side veth name to cali519303a5efc ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.437 [INFO][4490] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.438 [INFO][4490] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0", GenerateName:"calico-apiserver-7844cc77cc-", Namespace:"calico-apiserver", SelfLink:"", UID:"eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0", ResourceVersion:"1043", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 16, 45, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7844cc77cc", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82", Pod:"calico-apiserver-7844cc77cc-d2sp8", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali519303a5efc", MAC:"a2:3b:ab:92:ec:37", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:16:46.448238 env[1102]: 2024-04-12 18:16:46.443 [INFO][4490] k8s.go 498: Wrote updated endpoint to datastore ContainerID="93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82" Namespace="calico-apiserver" Pod="calico-apiserver-7844cc77cc-d2sp8" WorkloadEndpoint="localhost-k8s-calico--apiserver--7844cc77cc--d2sp8-eth0" Apr 12 18:16:46.471030 env[1102]: time="2024-04-12T18:16:46.470905915Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:16:46.471030 env[1102]: time="2024-04-12T18:16:46.470965675Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:16:46.471030 env[1102]: time="2024-04-12T18:16:46.470976675Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:16:46.471464 env[1102]: time="2024-04-12T18:16:46.471228434Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82 pid=4539 runtime=io.containerd.runc.v2 Apr 12 18:16:46.481000 audit[4555]: NETFILTER_CFG table=filter:121 family=2 entries=59 op=nft_register_chain pid=4555 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:16:46.481000 audit[4555]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30140 a0=3 a1=ffffe2dd20a0 a2=0 a3=ffffaae33fa8 items=0 ppid=3064 pid=4555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.481000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:16:46.489632 systemd[1]: Started cri-containerd-93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82.scope. Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.534000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.535000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.535000 audit: BPF prog-id=183 op=LOAD Apr 12 18:16:46.535000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.535000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4539 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.535000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623836623730633137366636643862393766306665323063613864 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4539 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623836623730633137366636643862393766306665323063613864 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit: BPF prog-id=184 op=LOAD Apr 12 18:16:46.536000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4539 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623836623730633137366636643862393766306665323063613864 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.536000 audit: BPF prog-id=185 op=LOAD Apr 12 18:16:46.536000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4539 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.536000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623836623730633137366636643862393766306665323063613864 Apr 12 18:16:46.538000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:16:46.538000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { perfmon } for pid=4550 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit[4550]: AVC avc: denied { bpf } for pid=4550 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:46.538000 audit: BPF prog-id=186 op=LOAD Apr 12 18:16:46.538000 audit[4550]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4539 pid=4550 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.538000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933623836623730633137366636643862393766306665323063613864 Apr 12 18:16:46.542229 systemd-resolved[1045]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:16:46.560883 env[1102]: time="2024-04-12T18:16:46.560808035Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7844cc77cc-d2sp8,Uid:eb1a988b-8f4b-40e9-b2c5-7362c92ee9d0,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82\"" Apr 12 18:16:46.563169 env[1102]: time="2024-04-12T18:16:46.563133146Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:16:46.790315 systemd[1]: Started sshd@20-10.0.0.7:22-10.0.0.1:46158.service. Apr 12 18:16:46.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.7:22-10.0.0.1:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:46.830000 audit[4575]: USER_ACCT pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.831461 sshd[4575]: Accepted publickey for core from 10.0.0.1 port 46158 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:46.831000 audit[4575]: CRED_ACQ pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.831000 audit[4575]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff8bc530 a2=3 a3=1 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:46.831000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:46.832598 sshd[4575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:46.836130 systemd-logind[1089]: New session 21 of user core. Apr 12 18:16:46.836872 systemd[1]: Started session-21.scope. Apr 12 18:16:46.839000 audit[4575]: USER_START pid=4575 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.840000 audit[4577]: CRED_ACQ pid=4577 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.945887 sshd[4575]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:46.945000 audit[4575]: USER_END pid=4575 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.945000 audit[4575]: CRED_DISP pid=4575 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:46.948652 systemd[1]: sshd@20-10.0.0.7:22-10.0.0.1:46158.service: Deactivated successfully. Apr 12 18:16:46.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.7:22-10.0.0.1:46158 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:46.949472 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:16:46.950042 systemd-logind[1089]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:16:46.950840 systemd-logind[1089]: Removed session 21. Apr 12 18:16:47.065000 audit[4588]: NETFILTER_CFG table=filter:122 family=2 entries=22 op=nft_register_rule pid=4588 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:47.065000 audit[4588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdfb7ee00 a2=0 a3=1 items=0 ppid=2130 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:47.065000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:47.067000 audit[4588]: NETFILTER_CFG table=nat:123 family=2 entries=104 op=nft_register_chain pid=4588 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:47.067000 audit[4588]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffdfb7ee00 a2=0 a3=1 items=0 ppid=2130 pid=4588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:47.067000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:47.547460 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2797405846.mount: Deactivated successfully. Apr 12 18:16:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f61b60 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f61b80 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024c4c20 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:47.691000 audit[1838]: AVC avc: denied { watch } for pid=1838 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520984 scontext=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:16:47.691000 audit[1838]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e38460 a2=fc6 a3=0 items=0 ppid=1683 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c329,c801 key=(null) Apr 12 18:16:47.691000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:16:48.232320 systemd-networkd[1003]: cali519303a5efc: Gained IPv6LL Apr 12 18:16:48.553099 env[1102]: time="2024-04-12T18:16:48.552817203Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.554864 env[1102]: time="2024-04-12T18:16:48.554828997Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.556604 env[1102]: time="2024-04-12T18:16:48.556577832Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.558111 env[1102]: time="2024-04-12T18:16:48.558058387Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:16:48.558781 env[1102]: time="2024-04-12T18:16:48.558679226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:16:48.561539 env[1102]: time="2024-04-12T18:16:48.561366698Z" level=info msg="CreateContainer within sandbox \"93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:16:48.571343 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1772040222.mount: Deactivated successfully. Apr 12 18:16:48.576994 env[1102]: time="2024-04-12T18:16:48.576918933Z" level=info msg="CreateContainer within sandbox \"93b86b70c176f6d8b97f0fe20ca8d99d360ea315fd057aa8bd44d5978ae99e82\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"929fb17693f9b5d63f1d0a05c1b05944648818542750e0d35d5a0d0c37b68a88\"" Apr 12 18:16:48.578254 env[1102]: time="2024-04-12T18:16:48.577478771Z" level=info msg="StartContainer for \"929fb17693f9b5d63f1d0a05c1b05944648818542750e0d35d5a0d0c37b68a88\"" Apr 12 18:16:48.599450 systemd[1]: Started cri-containerd-929fb17693f9b5d63f1d0a05c1b05944648818542750e0d35d5a0d0c37b68a88.scope. Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.638000 audit: BPF prog-id=187 op=LOAD Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=4539 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932396662313736393366396235643633663164306130356331623035 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=4539 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932396662313736393366396235643633663164306130356331623035 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit: BPF prog-id=188 op=LOAD Apr 12 18:16:48.639000 audit[4598]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=4539 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932396662313736393366396235643633663164306130356331623035 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit: BPF prog-id=189 op=LOAD Apr 12 18:16:48.639000 audit[4598]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=4539 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932396662313736393366396235643633663164306130356331623035 Apr 12 18:16:48.639000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:16:48.639000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { perfmon } for pid=4598 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit[4598]: AVC avc: denied { bpf } for pid=4598 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:16:48.639000 audit: BPF prog-id=190 op=LOAD Apr 12 18:16:48.639000 audit[4598]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=4539 pid=4598 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.639000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3932396662313736393366396235643633663164306130356331623035 Apr 12 18:16:48.670129 env[1102]: time="2024-04-12T18:16:48.670084703Z" level=info msg="StartContainer for \"929fb17693f9b5d63f1d0a05c1b05944648818542750e0d35d5a0d0c37b68a88\" returns successfully" Apr 12 18:16:48.728000 audit[4627]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:48.728000 audit[4627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff8457260 a2=0 a3=1 items=0 ppid=2130 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.728000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:48.731000 audit[4627]: NETFILTER_CFG table=nat:125 family=2 entries=44 op=nft_register_rule pid=4627 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:48.731000 audit[4627]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff8457260 a2=0 a3=1 items=0 ppid=2130 pid=4627 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:48.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:49.610000 audit[4609]: AVC avc: denied { watch } for pid=4609 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_16_46.4238811714/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c646,c657 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c646,c657 tclass=file permissive=0 Apr 12 18:16:49.610000 audit[4609]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40002f1a00 a2=fc6 a3=0 items=0 ppid=4539 pid=4609 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c646,c657 key=(null) Apr 12 18:16:49.610000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:16:49.753000 audit[4632]: NETFILTER_CFG table=filter:126 family=2 entries=10 op=nft_register_rule pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:49.753000 audit[4632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff29f1720 a2=0 a3=1 items=0 ppid=2130 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:49.753000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:49.754000 audit[4632]: NETFILTER_CFG table=nat:127 family=2 entries=44 op=nft_register_rule pid=4632 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:16:49.754000 audit[4632]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff29f1720 a2=0 a3=1 items=0 ppid=2130 pid=4632 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:49.754000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:16:51.950358 systemd[1]: Started sshd@21-10.0.0.7:22-10.0.0.1:33862.service. Apr 12 18:16:51.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:33862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:51.951153 kernel: kauditd_printk_skb: 163 callbacks suppressed Apr 12 18:16:51.951227 kernel: audit: type=1130 audit(1712945811.949:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:33862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:51.997000 audit[4637]: USER_ACCT pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:51.998898 sshd[4637]: Accepted publickey for core from 10.0.0.1 port 33862 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:52.000521 sshd[4637]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:51.999000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.004485 kernel: audit: type=1101 audit(1712945811.997:1499): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.004555 kernel: audit: type=1103 audit(1712945811.999:1500): pid=4637 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.006377 kernel: audit: type=1006 audit(1712945811.999:1501): pid=4637 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:16:52.006418 kernel: audit: type=1300 audit(1712945811.999:1501): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8fd94e0 a2=3 a3=1 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:51.999000 audit[4637]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd8fd94e0 a2=3 a3=1 items=0 ppid=1 pid=4637 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:52.008556 systemd-logind[1089]: New session 22 of user core. Apr 12 18:16:52.008927 systemd[1]: Started session-22.scope. Apr 12 18:16:52.010076 kernel: audit: type=1327 audit(1712945811.999:1501): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:51.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:52.013000 audit[4637]: USER_START pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.014000 audit[4639]: CRED_ACQ pid=4639 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.020924 kernel: audit: type=1105 audit(1712945812.013:1502): pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.020965 kernel: audit: type=1103 audit(1712945812.014:1503): pid=4639 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.141647 sshd[4637]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:52.141000 audit[4637]: USER_END pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.144277 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:16:52.144924 systemd-logind[1089]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:16:52.145005 systemd[1]: sshd@21-10.0.0.7:22-10.0.0.1:33862.service: Deactivated successfully. Apr 12 18:16:52.141000 audit[4637]: CRED_DISP pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.146424 systemd-logind[1089]: Removed session 22. Apr 12 18:16:52.148987 kernel: audit: type=1106 audit(1712945812.141:1504): pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.149121 kernel: audit: type=1104 audit(1712945812.141:1505): pid=4637 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:52.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.7:22-10.0.0.1:33862 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:53.703755 kubelet[1970]: E0412 18:16:53.703716 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:16:57.147575 systemd[1]: Started sshd@22-10.0.0.7:22-10.0.0.1:33878.service. Apr 12 18:16:57.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:33878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:57.151802 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:16:57.151916 kernel: audit: type=1130 audit(1712945817.146:1507): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:33878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:16:57.190000 audit[4666]: USER_ACCT pid=4666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.191512 sshd[4666]: Accepted publickey for core from 10.0.0.1 port 33878 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:16:57.193199 sshd[4666]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:16:57.191000 audit[4666]: CRED_ACQ pid=4666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.199610 kernel: audit: type=1101 audit(1712945817.190:1508): pid=4666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.199699 kernel: audit: type=1103 audit(1712945817.191:1509): pid=4666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.206017 kernel: audit: type=1006 audit(1712945817.191:1510): pid=4666 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:16:57.206555 kernel: audit: type=1300 audit(1712945817.191:1510): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5f0c310 a2=3 a3=1 items=0 ppid=1 pid=4666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.191000 audit[4666]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5f0c310 a2=3 a3=1 items=0 ppid=1 pid=4666 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:16:57.205158 systemd[1]: Started session-23.scope. Apr 12 18:16:57.205823 systemd-logind[1089]: New session 23 of user core. Apr 12 18:16:57.191000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:57.210575 kernel: audit: type=1327 audit(1712945817.191:1510): proctitle=737368643A20636F7265205B707269765D Apr 12 18:16:57.211000 audit[4666]: USER_START pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.212000 audit[4668]: CRED_ACQ pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.219033 kernel: audit: type=1105 audit(1712945817.211:1511): pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.219145 kernel: audit: type=1103 audit(1712945817.212:1512): pid=4668 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.320343 sshd[4666]: pam_unix(sshd:session): session closed for user core Apr 12 18:16:57.320000 audit[4666]: USER_END pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.323601 systemd-logind[1089]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:16:57.323747 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:16:57.324694 systemd[1]: sshd@22-10.0.0.7:22-10.0.0.1:33878.service: Deactivated successfully. Apr 12 18:16:57.321000 audit[4666]: CRED_DISP pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.326226 systemd-logind[1089]: Removed session 23. Apr 12 18:16:57.327799 kernel: audit: type=1106 audit(1712945817.320:1513): pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.327854 kernel: audit: type=1104 audit(1712945817.321:1514): pid=4666 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:16:57.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.7:22-10.0.0.1:33878 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:17:02.324789 systemd[1]: Started sshd@23-10.0.0.7:22-10.0.0.1:48290.service. Apr 12 18:17:02.330415 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:17:02.330494 kernel: audit: type=1130 audit(1712945822.323:1516): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:17:02.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:17:02.365000 audit[4679]: USER_ACCT pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.366737 sshd[4679]: Accepted publickey for core from 10.0.0.1 port 48290 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:17:02.368230 sshd[4679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:17:02.366000 audit[4679]: CRED_ACQ pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.372937 kernel: audit: type=1101 audit(1712945822.365:1517): pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.373003 kernel: audit: type=1103 audit(1712945822.366:1518): pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.373022 kernel: audit: type=1006 audit(1712945822.366:1519): pid=4679 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:17:02.366000 audit[4679]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeefe2be0 a2=3 a3=1 items=0 ppid=1 pid=4679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:17:02.378187 kernel: audit: type=1300 audit(1712945822.366:1519): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeefe2be0 a2=3 a3=1 items=0 ppid=1 pid=4679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:17:02.378695 kernel: audit: type=1327 audit(1712945822.366:1519): proctitle=737368643A20636F7265205B707269765D Apr 12 18:17:02.366000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:17:02.382244 systemd[1]: Started session-24.scope. Apr 12 18:17:02.382448 systemd-logind[1089]: New session 24 of user core. Apr 12 18:17:02.389000 audit[4679]: USER_START pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.395104 kernel: audit: type=1105 audit(1712945822.389:1520): pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.395154 kernel: audit: type=1103 audit(1712945822.393:1521): pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.393000 audit[4681]: CRED_ACQ pid=4681 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.502094 sshd[4679]: pam_unix(sshd:session): session closed for user core Apr 12 18:17:02.502000 audit[4679]: USER_END pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.504490 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:17:02.505079 systemd-logind[1089]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:17:02.505177 systemd[1]: sshd@23-10.0.0.7:22-10.0.0.1:48290.service: Deactivated successfully. Apr 12 18:17:02.506210 systemd-logind[1089]: Removed session 24. Apr 12 18:17:02.502000 audit[4679]: CRED_DISP pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.509520 kernel: audit: type=1106 audit(1712945822.502:1522): pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.509579 kernel: audit: type=1104 audit(1712945822.502:1523): pid=4679 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:17:02.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.7:22-10.0.0.1:48290 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:17:03.703910 kubelet[1970]: E0412 18:17:03.703864 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:17:03.704306 kubelet[1970]: E0412 18:17:03.704164 1970 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8"