Apr 12 18:31:16.726493 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:31:16.726515 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:31:16.726523 kernel: efi: EFI v2.70 by EDK II Apr 12 18:31:16.726528 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Apr 12 18:31:16.726533 kernel: random: crng init done Apr 12 18:31:16.726539 kernel: ACPI: Early table checksum verification disabled Apr 12 18:31:16.726549 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Apr 12 18:31:16.726556 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Apr 12 18:31:16.726561 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726566 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726572 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726577 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726582 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726588 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726596 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726602 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726608 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:31:16.726613 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Apr 12 18:31:16.726619 kernel: NUMA: Failed to initialise from firmware Apr 12 18:31:16.726625 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:31:16.726630 kernel: NUMA: NODE_DATA [mem 0xdcb0a900-0xdcb0ffff] Apr 12 18:31:16.726636 kernel: Zone ranges: Apr 12 18:31:16.726642 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:31:16.726648 kernel: DMA32 empty Apr 12 18:31:16.726654 kernel: Normal empty Apr 12 18:31:16.726659 kernel: Movable zone start for each node Apr 12 18:31:16.726668 kernel: Early memory node ranges Apr 12 18:31:16.726675 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Apr 12 18:31:16.726680 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Apr 12 18:31:16.726686 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Apr 12 18:31:16.726692 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Apr 12 18:31:16.726697 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Apr 12 18:31:16.726703 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Apr 12 18:31:16.726709 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Apr 12 18:31:16.726715 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:31:16.726722 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Apr 12 18:31:16.726728 kernel: psci: probing for conduit method from ACPI. Apr 12 18:31:16.726733 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:31:16.726739 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:31:16.726745 kernel: psci: Trusted OS migration not required Apr 12 18:31:16.726753 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:31:16.726759 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Apr 12 18:31:16.726767 kernel: ACPI: SRAT not present Apr 12 18:31:16.726773 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:31:16.726779 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:31:16.726785 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Apr 12 18:31:16.726791 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:31:16.726797 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:31:16.726803 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:31:16.726809 kernel: CPU features: detected: Spectre-v4 Apr 12 18:31:16.726815 kernel: CPU features: detected: Spectre-BHB Apr 12 18:31:16.726822 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:31:16.726828 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:31:16.726835 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:31:16.726841 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Apr 12 18:31:16.726847 kernel: Policy zone: DMA Apr 12 18:31:16.726854 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:16.726860 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:31:16.726866 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:31:16.726872 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:31:16.726878 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:31:16.726885 kernel: Memory: 2457464K/2572288K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 114824K reserved, 0K cma-reserved) Apr 12 18:31:16.726892 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:31:16.726898 kernel: trace event string verifier disabled Apr 12 18:31:16.726904 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:31:16.726911 kernel: rcu: RCU event tracing is enabled. Apr 12 18:31:16.726917 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:31:16.726923 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:31:16.726929 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:31:16.726936 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:31:16.726942 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:31:16.726948 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:31:16.726954 kernel: GICv3: 256 SPIs implemented Apr 12 18:31:16.726961 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:31:16.726967 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:31:16.726973 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:31:16.726979 kernel: GICv3: 16 PPIs implemented Apr 12 18:31:16.726985 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Apr 12 18:31:16.726991 kernel: ACPI: SRAT not present Apr 12 18:31:16.726997 kernel: ITS [mem 0x08080000-0x0809ffff] Apr 12 18:31:16.727003 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:31:16.727009 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:31:16.727015 kernel: GICv3: using LPI property table @0x00000000400d0000 Apr 12 18:31:16.727021 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Apr 12 18:31:16.727028 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:16.727035 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:31:16.727041 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:31:16.727047 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:31:16.727053 kernel: arm-pv: using stolen time PV Apr 12 18:31:16.727060 kernel: Console: colour dummy device 80x25 Apr 12 18:31:16.727066 kernel: ACPI: Core revision 20210730 Apr 12 18:31:16.727072 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:31:16.727079 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:31:16.727085 kernel: LSM: Security Framework initializing Apr 12 18:31:16.727091 kernel: SELinux: Initializing. Apr 12 18:31:16.727099 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:16.727105 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:31:16.727111 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:31:16.727117 kernel: Platform MSI: ITS@0x8080000 domain created Apr 12 18:31:16.727123 kernel: PCI/MSI: ITS@0x8080000 domain created Apr 12 18:31:16.727129 kernel: Remapping and enabling EFI services. Apr 12 18:31:16.727136 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:31:16.727142 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:31:16.727148 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Apr 12 18:31:16.727155 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Apr 12 18:31:16.727162 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:16.727168 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:31:16.727174 kernel: Detected PIPT I-cache on CPU2 Apr 12 18:31:16.727186 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Apr 12 18:31:16.727193 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Apr 12 18:31:16.727199 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:16.727205 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Apr 12 18:31:16.727211 kernel: Detected PIPT I-cache on CPU3 Apr 12 18:31:16.727217 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Apr 12 18:31:16.727225 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Apr 12 18:31:16.727232 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:31:16.727238 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Apr 12 18:31:16.727244 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:31:16.727254 kernel: SMP: Total of 4 processors activated. Apr 12 18:31:16.727262 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:31:16.727268 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:31:16.727275 kernel: CPU features: detected: Common not Private translations Apr 12 18:31:16.727281 kernel: CPU features: detected: CRC32 instructions Apr 12 18:31:16.727288 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:31:16.727294 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:31:16.727301 kernel: CPU features: detected: Privileged Access Never Apr 12 18:31:16.727308 kernel: CPU features: detected: RAS Extension Support Apr 12 18:31:16.727315 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 18:31:16.727322 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:31:16.727328 kernel: alternatives: patching kernel code Apr 12 18:31:16.727335 kernel: devtmpfs: initialized Apr 12 18:31:16.727342 kernel: KASLR enabled Apr 12 18:31:16.727349 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:31:16.727355 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:31:16.727362 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:31:16.727368 kernel: SMBIOS 3.0.0 present. Apr 12 18:31:16.727375 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Apr 12 18:31:16.727381 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:31:16.727388 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:31:16.727394 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:31:16.727402 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:31:16.727409 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:31:16.727415 kernel: audit: type=2000 audit(0.032:1): state=initialized audit_enabled=0 res=1 Apr 12 18:31:16.727422 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:31:16.727428 kernel: cpuidle: using governor menu Apr 12 18:31:16.727435 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:31:16.727441 kernel: ASID allocator initialised with 32768 entries Apr 12 18:31:16.727448 kernel: ACPI: bus type PCI registered Apr 12 18:31:16.727454 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:31:16.727462 kernel: Serial: AMBA PL011 UART driver Apr 12 18:31:16.727468 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:31:16.727475 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:31:16.727482 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:31:16.727488 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:31:16.727495 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:31:16.727501 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:31:16.727508 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:31:16.727514 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:31:16.727522 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:31:16.727528 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:31:16.727535 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:31:16.727541 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:31:16.727548 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:31:16.727554 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:31:16.727561 kernel: ACPI: Interpreter enabled Apr 12 18:31:16.727567 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:31:16.727573 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:31:16.727581 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:31:16.727588 kernel: printk: console [ttyAMA0] enabled Apr 12 18:31:16.727594 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:31:16.727731 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:31:16.727797 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:31:16.727855 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:31:16.727915 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Apr 12 18:31:16.727975 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Apr 12 18:31:16.727984 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Apr 12 18:31:16.727990 kernel: PCI host bridge to bus 0000:00 Apr 12 18:31:16.728059 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Apr 12 18:31:16.728113 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:31:16.728165 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Apr 12 18:31:16.728229 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:31:16.728303 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Apr 12 18:31:16.728372 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:31:16.728433 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Apr 12 18:31:16.728493 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Apr 12 18:31:16.728552 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:31:16.728611 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:31:16.728680 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Apr 12 18:31:16.728765 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Apr 12 18:31:16.728827 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Apr 12 18:31:16.728882 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:31:16.728950 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Apr 12 18:31:16.728959 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:31:16.728967 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:31:16.728974 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:31:16.728983 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:31:16.728990 kernel: iommu: Default domain type: Translated Apr 12 18:31:16.728996 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:31:16.729003 kernel: vgaarb: loaded Apr 12 18:31:16.729009 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:31:16.729016 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:31:16.729023 kernel: PTP clock support registered Apr 12 18:31:16.729029 kernel: Registered efivars operations Apr 12 18:31:16.729036 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:31:16.729042 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:31:16.729050 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:31:16.729057 kernel: pnp: PnP ACPI init Apr 12 18:31:16.729124 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Apr 12 18:31:16.729133 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:31:16.729140 kernel: NET: Registered PF_INET protocol family Apr 12 18:31:16.729146 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:31:16.729153 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:31:16.729160 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:31:16.729168 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:31:16.729180 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:31:16.729188 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:31:16.729194 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:16.729201 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:31:16.729208 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:31:16.729215 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:31:16.729221 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 18:31:16.729228 kernel: kvm [1]: HYP mode not available Apr 12 18:31:16.729236 kernel: Initialise system trusted keyrings Apr 12 18:31:16.729243 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:31:16.729249 kernel: Key type asymmetric registered Apr 12 18:31:16.729256 kernel: Asymmetric key parser 'x509' registered Apr 12 18:31:16.729262 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:31:16.729269 kernel: io scheduler mq-deadline registered Apr 12 18:31:16.729275 kernel: io scheduler kyber registered Apr 12 18:31:16.729282 kernel: io scheduler bfq registered Apr 12 18:31:16.729288 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:31:16.729296 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:31:16.729303 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:31:16.729367 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Apr 12 18:31:16.729376 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:31:16.729382 kernel: thunder_xcv, ver 1.0 Apr 12 18:31:16.729389 kernel: thunder_bgx, ver 1.0 Apr 12 18:31:16.729395 kernel: nicpf, ver 1.0 Apr 12 18:31:16.729402 kernel: nicvf, ver 1.0 Apr 12 18:31:16.729470 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:31:16.729529 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:31:16 UTC (1712946676) Apr 12 18:31:16.729538 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:31:16.729548 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:31:16.729555 kernel: Segment Routing with IPv6 Apr 12 18:31:16.729561 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:31:16.729568 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:31:16.729574 kernel: Key type dns_resolver registered Apr 12 18:31:16.729581 kernel: registered taskstats version 1 Apr 12 18:31:16.729589 kernel: Loading compiled-in X.509 certificates Apr 12 18:31:16.729596 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:31:16.729603 kernel: Key type .fscrypt registered Apr 12 18:31:16.729609 kernel: Key type fscrypt-provisioning registered Apr 12 18:31:16.729616 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:31:16.729622 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:31:16.729629 kernel: ima: No architecture policies found Apr 12 18:31:16.729635 kernel: Freeing unused kernel memory: 36352K Apr 12 18:31:16.729642 kernel: Run /init as init process Apr 12 18:31:16.729649 kernel: with arguments: Apr 12 18:31:16.729656 kernel: /init Apr 12 18:31:16.729662 kernel: with environment: Apr 12 18:31:16.729677 kernel: HOME=/ Apr 12 18:31:16.729683 kernel: TERM=linux Apr 12 18:31:16.729699 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:31:16.729708 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:16.729716 systemd[1]: Detected virtualization kvm. Apr 12 18:31:16.729725 systemd[1]: Detected architecture arm64. Apr 12 18:31:16.729732 systemd[1]: Running in initrd. Apr 12 18:31:16.729739 systemd[1]: No hostname configured, using default hostname. Apr 12 18:31:16.729745 systemd[1]: Hostname set to . Apr 12 18:31:16.729753 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:31:16.729759 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:31:16.729766 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:16.729773 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:16.729781 systemd[1]: Reached target paths.target. Apr 12 18:31:16.729788 systemd[1]: Reached target slices.target. Apr 12 18:31:16.729794 systemd[1]: Reached target swap.target. Apr 12 18:31:16.729801 systemd[1]: Reached target timers.target. Apr 12 18:31:16.729808 systemd[1]: Listening on iscsid.socket. Apr 12 18:31:16.729815 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:31:16.729822 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:31:16.729830 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:31:16.729837 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:31:16.729844 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:16.729851 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:16.729858 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:16.729865 systemd[1]: Reached target sockets.target. Apr 12 18:31:16.729871 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:16.729878 systemd[1]: Finished network-cleanup.service. Apr 12 18:31:16.729885 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:31:16.729893 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:16.729900 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:16.729907 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:16.729914 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:31:16.729921 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:16.729928 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:31:16.729935 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:31:16.729942 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:31:16.729950 kernel: audit: type=1130 audit(1712946676.725:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.729958 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:31:16.729968 systemd-journald[250]: Journal started Apr 12 18:31:16.730005 systemd-journald[250]: Runtime Journal (/run/log/journal/a2136f4130d14e2c91b600f01d3801cf) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:31:16.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.720417 systemd-modules-load[251]: Inserted module 'overlay' Apr 12 18:31:16.732183 systemd[1]: Started systemd-journald.service. Apr 12 18:31:16.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.734677 kernel: audit: type=1130 audit(1712946676.732:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.734793 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:31:16.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.738790 kernel: audit: type=1130 audit(1712946676.734:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.746742 systemd-resolved[252]: Positive Trust Anchors: Apr 12 18:31:16.746752 systemd-resolved[252]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:16.746780 systemd-resolved[252]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:16.752355 systemd-resolved[252]: Defaulting to hostname 'linux'. Apr 12 18:31:16.759045 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:31:16.759062 kernel: audit: type=1130 audit(1712946676.756:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.755116 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:16.756229 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:16.760546 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:31:16.765049 kernel: Bridge firewalling registered Apr 12 18:31:16.765066 kernel: audit: type=1130 audit(1712946676.762:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.761497 systemd-modules-load[251]: Inserted module 'br_netfilter' Apr 12 18:31:16.762964 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:31:16.771496 dracut-cmdline[268]: dracut-dracut-053 Apr 12 18:31:16.773659 dracut-cmdline[268]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:31:16.779884 kernel: SCSI subsystem initialized Apr 12 18:31:16.787450 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:31:16.787483 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:31:16.787494 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:31:16.791400 systemd-modules-load[251]: Inserted module 'dm_multipath' Apr 12 18:31:16.792136 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:16.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.795903 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:16.797783 kernel: audit: type=1130 audit(1712946676.792:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.802296 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:16.802000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.806704 kernel: audit: type=1130 audit(1712946676.802:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.837705 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:31:16.849705 kernel: iscsi: registered transport (tcp) Apr 12 18:31:16.864694 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:31:16.864713 kernel: QLogic iSCSI HBA Driver Apr 12 18:31:16.899554 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:31:16.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.901205 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:31:16.904466 kernel: audit: type=1130 audit(1712946676.899:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:16.944693 kernel: raid6: neonx8 gen() 13806 MB/s Apr 12 18:31:16.961685 kernel: raid6: neonx8 xor() 10826 MB/s Apr 12 18:31:16.978686 kernel: raid6: neonx4 gen() 13501 MB/s Apr 12 18:31:16.995691 kernel: raid6: neonx4 xor() 11146 MB/s Apr 12 18:31:17.012683 kernel: raid6: neonx2 gen() 12944 MB/s Apr 12 18:31:17.029681 kernel: raid6: neonx2 xor() 10590 MB/s Apr 12 18:31:17.046685 kernel: raid6: neonx1 gen() 10510 MB/s Apr 12 18:31:17.063690 kernel: raid6: neonx1 xor() 8773 MB/s Apr 12 18:31:17.080690 kernel: raid6: int64x8 gen() 6251 MB/s Apr 12 18:31:17.097691 kernel: raid6: int64x8 xor() 3535 MB/s Apr 12 18:31:17.114686 kernel: raid6: int64x4 gen() 7196 MB/s Apr 12 18:31:17.131688 kernel: raid6: int64x4 xor() 3849 MB/s Apr 12 18:31:17.148689 kernel: raid6: int64x2 gen() 6142 MB/s Apr 12 18:31:17.165697 kernel: raid6: int64x2 xor() 3317 MB/s Apr 12 18:31:17.182700 kernel: raid6: int64x1 gen() 5037 MB/s Apr 12 18:31:17.199733 kernel: raid6: int64x1 xor() 2641 MB/s Apr 12 18:31:17.199760 kernel: raid6: using algorithm neonx8 gen() 13806 MB/s Apr 12 18:31:17.199777 kernel: raid6: .... xor() 10826 MB/s, rmw enabled Apr 12 18:31:17.200775 kernel: raid6: using neon recovery algorithm Apr 12 18:31:17.212695 kernel: xor: measuring software checksum speed Apr 12 18:31:17.213683 kernel: 8regs : 17286 MB/sec Apr 12 18:31:17.215116 kernel: 32regs : 20765 MB/sec Apr 12 18:31:17.215133 kernel: arm64_neon : 28054 MB/sec Apr 12 18:31:17.215149 kernel: xor: using function: arm64_neon (28054 MB/sec) Apr 12 18:31:17.267689 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:31:17.277695 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:31:17.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.280000 audit: BPF prog-id=7 op=LOAD Apr 12 18:31:17.280000 audit: BPF prog-id=8 op=LOAD Apr 12 18:31:17.281692 kernel: audit: type=1130 audit(1712946677.277:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.281701 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:17.297249 systemd-udevd[453]: Using default interface naming scheme 'v252'. Apr 12 18:31:17.300557 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:17.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.302611 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:31:17.314207 dracut-pre-trigger[461]: rd.md=0: removing MD RAID activation Apr 12 18:31:17.339898 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:31:17.340000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.341409 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:17.375579 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:17.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:17.420747 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:31:17.424083 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:31:17.424111 kernel: GPT:9289727 != 19775487 Apr 12 18:31:17.424120 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:31:17.424128 kernel: GPT:9289727 != 19775487 Apr 12 18:31:17.425008 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:31:17.425021 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:31:17.440343 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:31:17.443089 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (510) Apr 12 18:31:17.444707 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:31:17.451295 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:17.454121 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:31:17.455082 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:31:17.457548 systemd[1]: Starting disk-uuid.service... Apr 12 18:31:17.463350 disk-uuid[523]: Primary Header is updated. Apr 12 18:31:17.463350 disk-uuid[523]: Secondary Entries is updated. Apr 12 18:31:17.463350 disk-uuid[523]: Secondary Header is updated. Apr 12 18:31:17.466686 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:31:18.478046 disk-uuid[524]: The operation has completed successfully. Apr 12 18:31:18.479250 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:31:18.500698 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:31:18.501795 systemd[1]: Finished disk-uuid.service. Apr 12 18:31:18.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.504020 systemd[1]: Starting verity-setup.service... Apr 12 18:31:18.521345 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:31:18.540635 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:31:18.542733 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:31:18.544491 systemd[1]: Finished verity-setup.service. Apr 12 18:31:18.545000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.591679 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:31:18.591801 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:31:18.592582 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:31:18.593254 systemd[1]: Starting ignition-setup.service... Apr 12 18:31:18.595425 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:31:18.602076 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:18.602183 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:31:18.602224 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:31:18.610128 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:31:18.616657 systemd[1]: Finished ignition-setup.service. Apr 12 18:31:18.616000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.618228 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:31:18.675578 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:31:18.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.676000 audit: BPF prog-id=9 op=LOAD Apr 12 18:31:18.677733 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:18.698212 ignition[608]: Ignition 2.14.0 Apr 12 18:31:18.698221 ignition[608]: Stage: fetch-offline Apr 12 18:31:18.698259 ignition[608]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:18.698268 ignition[608]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:18.698396 ignition[608]: parsed url from cmdline: "" Apr 12 18:31:18.698399 ignition[608]: no config URL provided Apr 12 18:31:18.698403 ignition[608]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:31:18.698410 ignition[608]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:31:18.698427 ignition[608]: op(1): [started] loading QEMU firmware config module Apr 12 18:31:18.698432 ignition[608]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:31:18.704937 systemd-networkd[700]: lo: Link UP Apr 12 18:31:18.704940 systemd-networkd[700]: lo: Gained carrier Apr 12 18:31:18.705509 systemd-networkd[700]: Enumeration completed Apr 12 18:31:18.705894 systemd-networkd[700]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:18.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.707296 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:18.707374 systemd-networkd[700]: eth0: Link UP Apr 12 18:31:18.710411 ignition[608]: op(1): [finished] loading QEMU firmware config module Apr 12 18:31:18.707378 systemd-networkd[700]: eth0: Gained carrier Apr 12 18:31:18.708254 systemd[1]: Reached target network.target. Apr 12 18:31:18.710726 systemd[1]: Starting iscsiuio.service... Apr 12 18:31:18.719892 systemd[1]: Started iscsiuio.service. Apr 12 18:31:18.719000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.721448 systemd[1]: Starting iscsid.service... Apr 12 18:31:18.722981 systemd-networkd[700]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:31:18.726224 iscsid[707]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:18.726224 iscsid[707]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:31:18.726224 iscsid[707]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:31:18.726224 iscsid[707]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:31:18.726224 iscsid[707]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:31:18.726224 iscsid[707]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:31:18.732000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.729123 systemd[1]: Started iscsid.service. Apr 12 18:31:18.734372 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:31:18.744164 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:31:18.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.745139 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:31:18.746611 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:18.748199 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:18.750471 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:31:18.757659 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:31:18.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.797482 ignition[608]: parsing config with SHA512: 2843ed9e7bf1b0792d3264e9ede752bb15fc0715ce50dc303e8ed9f2fa695f25dc0782d4fa5ba6af6fb12bf33f1c8002b2cf172d7aefacafb0a46764768e3e68 Apr 12 18:31:18.833252 unknown[608]: fetched base config from "system" Apr 12 18:31:18.834059 unknown[608]: fetched user config from "qemu" Apr 12 18:31:18.834601 ignition[608]: fetch-offline: fetch-offline passed Apr 12 18:31:18.834664 ignition[608]: Ignition finished successfully Apr 12 18:31:18.835717 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:31:18.836000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.837101 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:31:18.837794 systemd[1]: Starting ignition-kargs.service... Apr 12 18:31:18.846658 ignition[722]: Ignition 2.14.0 Apr 12 18:31:18.846681 ignition[722]: Stage: kargs Apr 12 18:31:18.846769 ignition[722]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:18.846779 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:18.848881 systemd[1]: Finished ignition-kargs.service. Apr 12 18:31:18.849000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.847846 ignition[722]: kargs: kargs passed Apr 12 18:31:18.847887 ignition[722]: Ignition finished successfully Apr 12 18:31:18.851134 systemd[1]: Starting ignition-disks.service... Apr 12 18:31:18.856954 ignition[728]: Ignition 2.14.0 Apr 12 18:31:18.856963 ignition[728]: Stage: disks Apr 12 18:31:18.857043 ignition[728]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:18.857053 ignition[728]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:18.858000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.858835 systemd[1]: Finished ignition-disks.service. Apr 12 18:31:18.858095 ignition[728]: disks: disks passed Apr 12 18:31:18.859732 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:31:18.858133 ignition[728]: Ignition finished successfully Apr 12 18:31:18.861249 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:18.862512 systemd[1]: Reached target local-fs.target. Apr 12 18:31:18.863638 systemd[1]: Reached target sysinit.target. Apr 12 18:31:18.864931 systemd[1]: Reached target basic.target. Apr 12 18:31:18.866862 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:31:18.877163 systemd-fsck[736]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:31:18.880245 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:31:18.882282 systemd[1]: Mounting sysroot.mount... Apr 12 18:31:18.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.890685 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:31:18.890972 systemd[1]: Mounted sysroot.mount. Apr 12 18:31:18.891695 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:31:18.893801 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:31:18.894627 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:31:18.894694 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:31:18.894723 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:31:18.896389 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:31:18.898109 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:31:18.902240 initrd-setup-root[746]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:31:18.906943 initrd-setup-root[754]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:31:18.910856 initrd-setup-root[762]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:31:18.914356 initrd-setup-root[770]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:31:18.940265 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:31:18.940000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.941760 systemd[1]: Starting ignition-mount.service... Apr 12 18:31:18.943012 systemd[1]: Starting sysroot-boot.service... Apr 12 18:31:18.947707 bash[787]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:31:18.956389 ignition[789]: INFO : Ignition 2.14.0 Apr 12 18:31:18.957383 ignition[789]: INFO : Stage: mount Apr 12 18:31:18.958218 ignition[789]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:18.959164 ignition[789]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:18.961618 ignition[789]: INFO : mount: mount passed Apr 12 18:31:18.961886 systemd[1]: Finished sysroot-boot.service. Apr 12 18:31:18.963719 ignition[789]: INFO : Ignition finished successfully Apr 12 18:31:18.964037 systemd[1]: Finished ignition-mount.service. Apr 12 18:31:18.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:18.964000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:19.554032 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:31:19.559692 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (797) Apr 12 18:31:19.562010 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:31:19.562038 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:31:19.562048 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:31:19.564881 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:31:19.566369 systemd[1]: Starting ignition-files.service... Apr 12 18:31:19.579716 ignition[817]: INFO : Ignition 2.14.0 Apr 12 18:31:19.579716 ignition[817]: INFO : Stage: files Apr 12 18:31:19.581152 ignition[817]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:19.581152 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:19.581152 ignition[817]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:31:19.584328 ignition[817]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:31:19.584328 ignition[817]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:31:19.586933 ignition[817]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:31:19.586933 ignition[817]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:31:19.586933 ignition[817]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:31:19.586933 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:19.586933 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:31:19.585774 unknown[817]: wrote ssh authorized keys file for user: core Apr 12 18:31:19.896041 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:31:20.116038 systemd-networkd[700]: eth0: Gained IPv6LL Apr 12 18:31:20.207158 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:31:20.209807 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:31:20.209807 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:20.209807 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:20.417429 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:31:20.547427 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:31:20.550115 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:31:20.550115 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:20.550115 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:31:20.594432 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:31:20.647488 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:31:20.649603 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:20.649603 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:31:20.698835 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:31:20.967804 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Apr 12 18:31:20.970477 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:31:20.970477 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:20.970477 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:31:20.989210 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:31:21.573671 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Apr 12 18:31:21.576396 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:31:21.576396 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:21.576396 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:31:21.595808 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:31:21.949942 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Apr 12 18:31:21.952807 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:31:21.952807 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:21.956295 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:31:21.956295 ignition[817]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:31:21.985421 ignition[817]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:31:22.025947 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:31:22.025974 kernel: audit: type=1130 audit(1712946681.988:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.025986 kernel: audit: type=1130 audit(1712946681.999:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.025996 kernel: audit: type=1131 audit(1712946681.999:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.026005 kernel: audit: type=1130 audit(1712946682.004:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.026109 ignition[817]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:31:22.026109 ignition[817]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:31:22.026109 ignition[817]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:22.026109 ignition[817]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:31:22.026109 ignition[817]: INFO : files: files passed Apr 12 18:31:22.026109 ignition[817]: INFO : Ignition finished successfully Apr 12 18:31:22.039824 kernel: audit: type=1130 audit(1712946682.027:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.039845 kernel: audit: type=1131 audit(1712946682.027:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.027000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.027000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.987212 systemd[1]: Finished ignition-files.service. Apr 12 18:31:21.989234 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:31:22.041740 initrd-setup-root-after-ignition[842]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:31:21.990252 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:31:22.044828 initrd-setup-root-after-ignition[844]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:31:21.990892 systemd[1]: Starting ignition-quench.service... Apr 12 18:31:21.998378 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:31:22.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.998465 systemd[1]: Finished ignition-quench.service. Apr 12 18:31:22.052044 kernel: audit: type=1130 audit(1712946682.047:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:21.999479 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:31:22.005633 systemd[1]: Reached target ignition-complete.target. Apr 12 18:31:22.010224 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:31:22.022133 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:31:22.026718 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:31:22.028347 systemd[1]: Reached target initrd-fs.target. Apr 12 18:31:22.034434 systemd[1]: Reached target initrd.target. Apr 12 18:31:22.036488 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:31:22.037215 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:31:22.060000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.047040 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:31:22.065170 kernel: audit: type=1131 audit(1712946682.060:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.048563 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:31:22.056139 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:31:22.056979 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:31:22.058307 systemd[1]: Stopped target timers.target. Apr 12 18:31:22.059493 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:31:22.059598 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:31:22.061310 systemd[1]: Stopped target initrd.target. Apr 12 18:31:22.064636 systemd[1]: Stopped target basic.target. Apr 12 18:31:22.065853 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:31:22.067170 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:31:22.068468 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:31:22.078000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.069871 systemd[1]: Stopped target remote-fs.target. Apr 12 18:31:22.082812 kernel: audit: type=1131 audit(1712946682.078:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.071040 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:31:22.082000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.072492 systemd[1]: Stopped target sysinit.target. Apr 12 18:31:22.087501 kernel: audit: type=1131 audit(1712946682.082:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.086000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.073724 systemd[1]: Stopped target local-fs.target. Apr 12 18:31:22.074988 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:31:22.076231 systemd[1]: Stopped target swap.target. Apr 12 18:31:22.077432 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:31:22.077535 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:31:22.078870 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:31:22.082277 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:31:22.082374 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:31:22.083579 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:31:22.083687 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:31:22.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.087103 systemd[1]: Stopped target paths.target. Apr 12 18:31:22.098000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.088222 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:31:22.091709 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:31:22.093209 systemd[1]: Stopped target slices.target. Apr 12 18:31:22.102587 iscsid[707]: iscsid shutting down. Apr 12 18:31:22.094550 systemd[1]: Stopped target sockets.target. Apr 12 18:31:22.102000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.095831 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:31:22.095938 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:31:22.097494 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:31:22.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.097594 systemd[1]: Stopped ignition-files.service. Apr 12 18:31:22.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.099514 systemd[1]: Stopping ignition-mount.service... Apr 12 18:31:22.100964 systemd[1]: Stopping iscsid.service... Apr 12 18:31:22.101963 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:31:22.109000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.113103 ignition[857]: INFO : Ignition 2.14.0 Apr 12 18:31:22.113103 ignition[857]: INFO : Stage: umount Apr 12 18:31:22.113103 ignition[857]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:31:22.113103 ignition[857]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:31:22.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.102089 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:31:22.117000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.119045 ignition[857]: INFO : umount: umount passed Apr 12 18:31:22.119045 ignition[857]: INFO : Ignition finished successfully Apr 12 18:31:22.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.104103 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:31:22.104963 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:31:22.122000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.105094 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:31:22.124000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.106875 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:31:22.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.106973 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:31:22.109698 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:31:22.109798 systemd[1]: Stopped iscsid.service. Apr 12 18:31:22.129000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.110859 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:31:22.131000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.110925 systemd[1]: Closed iscsid.socket. Apr 12 18:31:22.112203 systemd[1]: Stopping iscsiuio.service... Apr 12 18:31:22.113774 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:31:22.113859 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:31:22.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.117097 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:31:22.117460 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:31:22.117550 systemd[1]: Stopped iscsiuio.service. Apr 12 18:31:22.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.118629 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:31:22.142000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.118731 systemd[1]: Stopped ignition-mount.service. Apr 12 18:31:22.143000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.119805 systemd[1]: Stopped target network.target. Apr 12 18:31:22.120999 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:31:22.121033 systemd[1]: Closed iscsiuio.socket. Apr 12 18:31:22.122312 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:31:22.122351 systemd[1]: Stopped ignition-disks.service. Apr 12 18:31:22.150000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.123587 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:31:22.123625 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:31:22.125066 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:31:22.125104 systemd[1]: Stopped ignition-setup.service. Apr 12 18:31:22.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.154000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:31:22.126510 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:31:22.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.128066 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:31:22.129498 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:31:22.129578 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:31:22.159000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.130724 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:31:22.160000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.130764 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:31:22.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.133886 systemd-networkd[700]: eth0: DHCPv6 lease lost Apr 12 18:31:22.162000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:31:22.134927 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:31:22.135014 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:31:22.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.136658 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:31:22.136699 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:31:22.138317 systemd[1]: Stopping network-cleanup.service... Apr 12 18:31:22.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.140195 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:31:22.140251 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:31:22.141640 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:31:22.141755 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:31:22.143638 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:31:22.143690 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:31:22.144573 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:31:22.148858 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:31:22.149263 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:31:22.149349 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:31:22.153348 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:31:22.153469 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:31:22.154970 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:31:22.155048 systemd[1]: Stopped network-cleanup.service. Apr 12 18:31:22.155976 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:31:22.156006 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:31:22.157189 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:31:22.157223 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:31:22.158443 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:31:22.158486 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:31:22.159876 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:31:22.159914 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:31:22.161070 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:31:22.161110 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:31:22.163223 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:31:22.164519 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:31:22.164578 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:31:22.168072 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:31:22.168155 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:31:22.196841 systemd-journald[250]: Received SIGTERM from PID 1 (n/a). Apr 12 18:31:22.169156 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:31:22.171262 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:31:22.177597 systemd[1]: Switching root. Apr 12 18:31:22.198984 systemd-journald[250]: Journal stopped Apr 12 18:31:24.261401 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:31:24.261455 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:31:24.261466 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:31:24.261476 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:31:24.261488 kernel: SELinux: policy capability open_perms=1 Apr 12 18:31:24.261500 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:31:24.261509 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:31:24.261519 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:31:24.261528 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:31:24.261539 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:31:24.261548 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:31:24.261558 systemd[1]: Successfully loaded SELinux policy in 39.194ms. Apr 12 18:31:24.261577 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.980ms. Apr 12 18:31:24.261588 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:31:24.261601 systemd[1]: Detected virtualization kvm. Apr 12 18:31:24.261611 systemd[1]: Detected architecture arm64. Apr 12 18:31:24.261620 systemd[1]: Detected first boot. Apr 12 18:31:24.261631 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:31:24.261641 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:31:24.261651 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:31:24.261661 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:24.261693 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:24.261706 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:24.261717 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:31:24.261727 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:31:24.261737 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:31:24.261748 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:31:24.261758 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:31:24.261769 systemd[1]: Created slice system-getty.slice. Apr 12 18:31:24.261780 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:31:24.261790 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:31:24.261800 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:31:24.261813 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:31:24.261823 systemd[1]: Created slice user.slice. Apr 12 18:31:24.261834 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:31:24.261844 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:31:24.261854 systemd[1]: Set up automount boot.automount. Apr 12 18:31:24.261865 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:31:24.261875 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:31:24.261885 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:31:24.261896 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:31:24.261906 systemd[1]: Reached target integritysetup.target. Apr 12 18:31:24.261916 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:31:24.261928 systemd[1]: Reached target remote-fs.target. Apr 12 18:31:24.261938 systemd[1]: Reached target slices.target. Apr 12 18:31:24.261949 systemd[1]: Reached target swap.target. Apr 12 18:31:24.261960 systemd[1]: Reached target torcx.target. Apr 12 18:31:24.261970 systemd[1]: Reached target veritysetup.target. Apr 12 18:31:24.261980 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:31:24.261990 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:31:24.262001 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:31:24.262011 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:31:24.262021 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:31:24.262031 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:31:24.262043 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:31:24.262053 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:31:24.262062 systemd[1]: Mounting media.mount... Apr 12 18:31:24.262072 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:31:24.262082 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:31:24.262096 systemd[1]: Mounting tmp.mount... Apr 12 18:31:24.262107 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:31:24.262118 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:31:24.262128 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:31:24.262140 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:31:24.262150 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:31:24.262166 systemd[1]: Starting modprobe@drm.service... Apr 12 18:31:24.262176 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:31:24.262187 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:31:24.262197 systemd[1]: Starting modprobe@loop.service... Apr 12 18:31:24.262208 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:31:24.262218 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:31:24.262229 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:31:24.262240 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:31:24.262251 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:31:24.262261 systemd[1]: Stopped systemd-journald.service. Apr 12 18:31:24.262271 kernel: fuse: init (API version 7.34) Apr 12 18:31:24.262281 kernel: loop: module loaded Apr 12 18:31:24.262292 systemd[1]: Starting systemd-journald.service... Apr 12 18:31:24.262303 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:31:24.262314 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:31:24.262324 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:31:24.262334 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:31:24.262345 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:31:24.262355 systemd[1]: Stopped verity-setup.service. Apr 12 18:31:24.262367 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:31:24.262376 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:31:24.262386 systemd[1]: Mounted media.mount. Apr 12 18:31:24.262397 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:31:24.262409 systemd-journald[960]: Journal started Apr 12 18:31:24.262453 systemd-journald[960]: Runtime Journal (/run/log/journal/a2136f4130d14e2c91b600f01d3801cf) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:31:22.259000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:31:22.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:22.426000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:31:22.426000 audit: BPF prog-id=10 op=LOAD Apr 12 18:31:22.426000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:31:22.427000 audit: BPF prog-id=11 op=LOAD Apr 12 18:31:22.427000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:31:22.466000 audit[890]: AVC avc: denied { associate } for pid=890 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:31:22.466000 audit[890]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=873 pid=890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:22.466000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:22.467000 audit[890]: AVC avc: denied { associate } for pid=890 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:31:22.467000 audit[890]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c5989 a2=1ed a3=0 items=2 ppid=873 pid=890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:22.467000 audit: CWD cwd="/" Apr 12 18:31:22.467000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:22.467000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:31:22.467000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:31:24.135000 audit: BPF prog-id=12 op=LOAD Apr 12 18:31:24.135000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:31:24.135000 audit: BPF prog-id=13 op=LOAD Apr 12 18:31:24.136000 audit: BPF prog-id=14 op=LOAD Apr 12 18:31:24.136000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:31:24.136000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:31:24.136000 audit: BPF prog-id=15 op=LOAD Apr 12 18:31:24.136000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:31:24.137000 audit: BPF prog-id=16 op=LOAD Apr 12 18:31:24.137000 audit: BPF prog-id=17 op=LOAD Apr 12 18:31:24.137000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:31:24.137000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:31:24.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.147000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:31:24.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.237000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.238000 audit: BPF prog-id=18 op=LOAD Apr 12 18:31:24.238000 audit: BPF prog-id=19 op=LOAD Apr 12 18:31:24.238000 audit: BPF prog-id=20 op=LOAD Apr 12 18:31:24.238000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:31:24.238000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:31:24.254000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.259000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:31:24.259000 audit[960]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc8c2d8e0 a2=4000 a3=1 items=0 ppid=1 pid=960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:24.259000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:31:24.135251 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:31:22.464780 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:24.135263 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:31:22.465041 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:24.138429 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:31:22.465060 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:22.465088 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:31:22.465098 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:31:22.465126 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:31:22.465137 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:31:22.465333 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:31:24.264232 systemd[1]: Started systemd-journald.service. Apr 12 18:31:22.465367 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:31:22.465379 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:31:24.264000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:22.466141 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:31:22.466194 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:31:22.466213 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:31:22.466227 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:31:22.466245 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:31:24.264740 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:31:22.466257 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:22Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:31:23.886277 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:23.886540 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:23.886636 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:23.886821 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:31:23.886874 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:31:23.886932 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:31:23Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:31:24.265735 systemd[1]: Mounted tmp.mount. Apr 12 18:31:24.267817 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:31:24.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.268896 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:31:24.269081 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:31:24.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.270127 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:31:24.270292 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:31:24.270000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.271354 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:31:24.271510 systemd[1]: Finished modprobe@drm.service. Apr 12 18:31:24.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.272521 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:31:24.272709 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:31:24.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.273862 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:31:24.274016 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:31:24.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.275143 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:31:24.275000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.276308 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:31:24.276459 systemd[1]: Finished modprobe@loop.service. Apr 12 18:31:24.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.277632 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:31:24.278000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.278829 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:31:24.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.280116 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:31:24.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.281568 systemd[1]: Reached target network-pre.target. Apr 12 18:31:24.283522 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:31:24.285548 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:31:24.286299 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:31:24.287765 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:31:24.289746 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:31:24.290592 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:31:24.291797 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:31:24.292628 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:31:24.293641 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:31:24.297597 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:31:24.301539 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:31:24.302735 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:31:24.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.303815 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:31:24.309204 systemd-journald[960]: Time spent on flushing to /var/log/journal/a2136f4130d14e2c91b600f01d3801cf is 13.761ms for 1028 entries. Apr 12 18:31:24.309204 systemd-journald[960]: System Journal (/var/log/journal/a2136f4130d14e2c91b600f01d3801cf) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:31:24.339929 systemd-journald[960]: Received client request to flush runtime journal. Apr 12 18:31:24.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.304864 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:31:24.316053 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:31:24.340395 udevadm[991]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Apr 12 18:31:24.318025 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:31:24.329601 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:31:24.332991 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:31:24.340864 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:31:24.341000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.668479 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:31:24.668000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.669000 audit: BPF prog-id=21 op=LOAD Apr 12 18:31:24.669000 audit: BPF prog-id=22 op=LOAD Apr 12 18:31:24.669000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:31:24.669000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:31:24.670809 systemd[1]: Starting systemd-udevd.service... Apr 12 18:31:24.690976 systemd-udevd[994]: Using default interface naming scheme 'v252'. Apr 12 18:31:24.703510 systemd[1]: Started systemd-udevd.service. Apr 12 18:31:24.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.704000 audit: BPF prog-id=23 op=LOAD Apr 12 18:31:24.707322 systemd[1]: Starting systemd-networkd.service... Apr 12 18:31:24.726000 audit: BPF prog-id=24 op=LOAD Apr 12 18:31:24.726000 audit: BPF prog-id=25 op=LOAD Apr 12 18:31:24.726000 audit: BPF prog-id=26 op=LOAD Apr 12 18:31:24.727711 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:31:24.734013 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:31:24.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.762415 systemd[1]: Started systemd-userdbd.service. Apr 12 18:31:24.770733 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:31:24.804954 systemd-networkd[1003]: lo: Link UP Apr 12 18:31:24.804965 systemd-networkd[1003]: lo: Gained carrier Apr 12 18:31:24.805336 systemd-networkd[1003]: Enumeration completed Apr 12 18:31:24.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.805426 systemd[1]: Started systemd-networkd.service. Apr 12 18:31:24.805443 systemd-networkd[1003]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:31:24.807387 systemd-networkd[1003]: eth0: Link UP Apr 12 18:31:24.807399 systemd-networkd[1003]: eth0: Gained carrier Apr 12 18:31:24.808005 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:31:24.808000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.809966 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:31:24.818217 lvm[1027]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:24.837845 systemd-networkd[1003]: eth0: DHCPv4 address 10.0.0.89/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:31:24.844398 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:31:24.844000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.845368 systemd[1]: Reached target cryptsetup.target. Apr 12 18:31:24.847176 systemd[1]: Starting lvm2-activation.service... Apr 12 18:31:24.850850 lvm[1028]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:31:24.876455 systemd[1]: Finished lvm2-activation.service. Apr 12 18:31:24.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.877372 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:31:24.878192 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:31:24.878222 systemd[1]: Reached target local-fs.target. Apr 12 18:31:24.878974 systemd[1]: Reached target machines.target. Apr 12 18:31:24.880834 systemd[1]: Starting ldconfig.service... Apr 12 18:31:24.881897 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:31:24.881948 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:24.882982 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:31:24.884749 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:31:24.886836 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:31:24.887799 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:24.887850 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:31:24.888814 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:31:24.889964 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1030 (bootctl) Apr 12 18:31:24.891046 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:31:24.898189 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:31:24.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.905890 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:31:24.908365 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:31:24.911391 systemd-tmpfiles[1033]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:31:24.926647 systemd-fsck[1039]: fsck.fat 4.2 (2021-01-31) Apr 12 18:31:24.926647 systemd-fsck[1039]: /dev/vda1: 236 files, 117047/258078 clusters Apr 12 18:31:24.928002 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:31:24.929000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:24.931299 systemd[1]: Mounting boot.mount... Apr 12 18:31:25.030129 systemd[1]: Mounted boot.mount. Apr 12 18:31:25.036029 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:31:25.037000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.039458 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:31:25.040000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.112608 ldconfig[1029]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:31:25.116784 systemd[1]: Finished ldconfig.service. Apr 12 18:31:25.116000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.128077 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:31:25.128000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.130415 systemd[1]: Starting audit-rules.service... Apr 12 18:31:25.132174 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:31:25.134069 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:31:25.135000 audit: BPF prog-id=27 op=LOAD Apr 12 18:31:25.136620 systemd[1]: Starting systemd-resolved.service... Apr 12 18:31:25.138000 audit: BPF prog-id=28 op=LOAD Apr 12 18:31:25.139567 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:31:25.141299 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:31:25.142507 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:31:25.142000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.143740 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:31:25.149000 audit[1053]: SYSTEM_BOOT pid=1053 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.154187 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:31:25.154000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.157582 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:31:25.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.159691 systemd[1]: Starting systemd-update-done.service... Apr 12 18:31:25.165347 systemd[1]: Finished systemd-update-done.service. Apr 12 18:31:25.165000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:25.174000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:31:25.174000 audit[1064]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffc527a350 a2=420 a3=0 items=0 ppid=1042 pid=1064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:25.174000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:31:25.175259 augenrules[1064]: No rules Apr 12 18:31:25.175842 systemd[1]: Finished audit-rules.service. Apr 12 18:31:25.187174 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:31:25.187812 systemd-timesyncd[1050]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:31:25.187859 systemd-timesyncd[1050]: Initial clock synchronization to Fri 2024-04-12 18:31:24.891164 UTC. Apr 12 18:31:25.188272 systemd[1]: Reached target time-set.target. Apr 12 18:31:25.193046 systemd-resolved[1046]: Positive Trust Anchors: Apr 12 18:31:25.193285 systemd-resolved[1046]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:31:25.193373 systemd-resolved[1046]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:31:25.203145 systemd-resolved[1046]: Defaulting to hostname 'linux'. Apr 12 18:31:25.204647 systemd[1]: Started systemd-resolved.service. Apr 12 18:31:25.205485 systemd[1]: Reached target network.target. Apr 12 18:31:25.206246 systemd[1]: Reached target nss-lookup.target. Apr 12 18:31:25.207024 systemd[1]: Reached target sysinit.target. Apr 12 18:31:25.207868 systemd[1]: Started motdgen.path. Apr 12 18:31:25.208564 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:31:25.209810 systemd[1]: Started logrotate.timer. Apr 12 18:31:25.210609 systemd[1]: Started mdadm.timer. Apr 12 18:31:25.211351 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:31:25.212196 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:31:25.212233 systemd[1]: Reached target paths.target. Apr 12 18:31:25.212952 systemd[1]: Reached target timers.target. Apr 12 18:31:25.214009 systemd[1]: Listening on dbus.socket. Apr 12 18:31:25.215840 systemd[1]: Starting docker.socket... Apr 12 18:31:25.218960 systemd[1]: Listening on sshd.socket. Apr 12 18:31:25.219773 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:25.220215 systemd[1]: Listening on docker.socket. Apr 12 18:31:25.221050 systemd[1]: Reached target sockets.target. Apr 12 18:31:25.221801 systemd[1]: Reached target basic.target. Apr 12 18:31:25.222557 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:31:25.222589 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:31:25.223597 systemd[1]: Starting containerd.service... Apr 12 18:31:25.225270 systemd[1]: Starting dbus.service... Apr 12 18:31:25.227025 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:31:25.229125 systemd[1]: Starting extend-filesystems.service... Apr 12 18:31:25.230092 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:31:25.231593 jq[1074]: false Apr 12 18:31:25.231137 systemd[1]: Starting motdgen.service... Apr 12 18:31:25.236075 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:31:25.238022 systemd[1]: Starting prepare-critools.service... Apr 12 18:31:25.239767 systemd[1]: Starting prepare-helm.service... Apr 12 18:31:25.241484 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:31:25.243646 systemd[1]: Starting sshd-keygen.service... Apr 12 18:31:25.246997 systemd[1]: Starting systemd-logind.service... Apr 12 18:31:25.247880 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:31:25.247946 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:31:25.248340 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:31:25.249601 systemd[1]: Starting update-engine.service... Apr 12 18:31:25.251375 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:31:25.254000 jq[1093]: true Apr 12 18:31:25.253905 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:31:25.254067 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:31:25.256969 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:31:25.259112 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:31:25.259278 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:31:25.260286 dbus-daemon[1073]: [system] SELinux support is enabled Apr 12 18:31:25.265062 systemd[1]: Started dbus.service. Apr 12 18:31:25.272285 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:31:25.272452 systemd[1]: Finished motdgen.service. Apr 12 18:31:25.274014 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:31:25.274042 systemd[1]: Reached target system-config.target. Apr 12 18:31:25.275042 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:31:25.275065 systemd[1]: Reached target user-config.target. Apr 12 18:31:25.277229 extend-filesystems[1075]: Found vda Apr 12 18:31:25.280134 tar[1096]: crictl Apr 12 18:31:25.280604 extend-filesystems[1075]: Found vda1 Apr 12 18:31:25.281386 extend-filesystems[1075]: Found vda2 Apr 12 18:31:25.282235 extend-filesystems[1075]: Found vda3 Apr 12 18:31:25.283046 extend-filesystems[1075]: Found usr Apr 12 18:31:25.283771 extend-filesystems[1075]: Found vda4 Apr 12 18:31:25.285145 tar[1095]: ./ Apr 12 18:31:25.285145 tar[1095]: ./loopback Apr 12 18:31:25.285456 extend-filesystems[1075]: Found vda6 Apr 12 18:31:25.286181 tar[1098]: linux-arm64/helm Apr 12 18:31:25.286496 extend-filesystems[1075]: Found vda7 Apr 12 18:31:25.287549 extend-filesystems[1075]: Found vda9 Apr 12 18:31:25.287549 extend-filesystems[1075]: Checking size of /dev/vda9 Apr 12 18:31:25.303744 extend-filesystems[1075]: Resized partition /dev/vda9 Apr 12 18:31:25.305356 jq[1099]: true Apr 12 18:31:25.334063 extend-filesystems[1114]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:31:25.351689 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:31:25.357171 systemd-logind[1087]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:31:25.360978 systemd-logind[1087]: New seat seat0. Apr 12 18:31:25.364437 systemd[1]: Started systemd-logind.service. Apr 12 18:31:25.377928 update_engine[1090]: I0412 18:31:25.375125 1090 main.cc:92] Flatcar Update Engine starting Apr 12 18:31:25.385633 systemd[1]: Started update-engine.service. Apr 12 18:31:25.386629 update_engine[1090]: I0412 18:31:25.385921 1090 update_check_scheduler.cc:74] Next update check in 4m23s Apr 12 18:31:25.388680 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:31:25.389119 systemd[1]: Started locksmithd.service. Apr 12 18:31:25.403893 env[1104]: time="2024-04-12T18:31:25.403782640Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:31:25.404343 extend-filesystems[1114]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:31:25.404343 extend-filesystems[1114]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:31:25.404343 extend-filesystems[1114]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:31:25.412828 extend-filesystems[1075]: Resized filesystem in /dev/vda9 Apr 12 18:31:25.407005 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:31:25.415926 bash[1130]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:31:25.407174 systemd[1]: Finished extend-filesystems.service. Apr 12 18:31:25.417790 tar[1095]: ./bandwidth Apr 12 18:31:25.408947 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:31:25.436772 env[1104]: time="2024-04-12T18:31:25.436637960Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:31:25.436915 env[1104]: time="2024-04-12T18:31:25.436887400Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.437979 env[1104]: time="2024-04-12T18:31:25.437908560Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:25.437979 env[1104]: time="2024-04-12T18:31:25.437940280Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438160 env[1104]: time="2024-04-12T18:31:25.438125840Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438160 env[1104]: time="2024-04-12T18:31:25.438158120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438230 env[1104]: time="2024-04-12T18:31:25.438174960Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:31:25.438230 env[1104]: time="2024-04-12T18:31:25.438184840Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438266 env[1104]: time="2024-04-12T18:31:25.438255680Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438535 env[1104]: time="2024-04-12T18:31:25.438511560Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438649 env[1104]: time="2024-04-12T18:31:25.438627880Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:31:25.438649 env[1104]: time="2024-04-12T18:31:25.438646400Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:31:25.438748 env[1104]: time="2024-04-12T18:31:25.438716400Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:31:25.438748 env[1104]: time="2024-04-12T18:31:25.438746960Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:31:25.441631 env[1104]: time="2024-04-12T18:31:25.441600520Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:31:25.441631 env[1104]: time="2024-04-12T18:31:25.441631200Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:31:25.441726 env[1104]: time="2024-04-12T18:31:25.441644280Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:31:25.441726 env[1104]: time="2024-04-12T18:31:25.441688920Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.441726 env[1104]: time="2024-04-12T18:31:25.441704360Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.441726 env[1104]: time="2024-04-12T18:31:25.441722440Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.441814 env[1104]: time="2024-04-12T18:31:25.441734320Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442075 env[1104]: time="2024-04-12T18:31:25.442049200Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442075 env[1104]: time="2024-04-12T18:31:25.442072880Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442131 env[1104]: time="2024-04-12T18:31:25.442087640Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442131 env[1104]: time="2024-04-12T18:31:25.442100240Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442131 env[1104]: time="2024-04-12T18:31:25.442111560Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:31:25.442249 env[1104]: time="2024-04-12T18:31:25.442228160Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:31:25.442320 env[1104]: time="2024-04-12T18:31:25.442304440Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:31:25.442524 env[1104]: time="2024-04-12T18:31:25.442504360Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:31:25.442559 env[1104]: time="2024-04-12T18:31:25.442532560Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442559 env[1104]: time="2024-04-12T18:31:25.442545320Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:31:25.442658 env[1104]: time="2024-04-12T18:31:25.442642960Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442659160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442691880Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442703360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442714920Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442726080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442737360Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442748280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.442852 env[1104]: time="2024-04-12T18:31:25.442760920Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442867400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442883080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442895000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442907760Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442920720Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442930920Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442946320Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:31:25.443022 env[1104]: time="2024-04-12T18:31:25.442977800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:31:25.443217 env[1104]: time="2024-04-12T18:31:25.443161680Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:31:25.443803 env[1104]: time="2024-04-12T18:31:25.443226600Z" level=info msg="Connect containerd service" Apr 12 18:31:25.443803 env[1104]: time="2024-04-12T18:31:25.443270600Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:31:25.443872 env[1104]: time="2024-04-12T18:31:25.443845720Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:31:25.444137 env[1104]: time="2024-04-12T18:31:25.444120760Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:31:25.444182 env[1104]: time="2024-04-12T18:31:25.444168120Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:31:25.444225 env[1104]: time="2024-04-12T18:31:25.444210640Z" level=info msg="containerd successfully booted in 0.052494s" Apr 12 18:31:25.444282 systemd[1]: Started containerd.service. Apr 12 18:31:25.445470 env[1104]: time="2024-04-12T18:31:25.445438440Z" level=info msg="Start subscribing containerd event" Apr 12 18:31:25.445518 env[1104]: time="2024-04-12T18:31:25.445487520Z" level=info msg="Start recovering state" Apr 12 18:31:25.445564 env[1104]: time="2024-04-12T18:31:25.445545440Z" level=info msg="Start event monitor" Apr 12 18:31:25.445592 env[1104]: time="2024-04-12T18:31:25.445569560Z" level=info msg="Start snapshots syncer" Apr 12 18:31:25.445592 env[1104]: time="2024-04-12T18:31:25.445580560Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:31:25.445592 env[1104]: time="2024-04-12T18:31:25.445587840Z" level=info msg="Start streaming server" Apr 12 18:31:25.449946 tar[1095]: ./ptp Apr 12 18:31:25.480051 tar[1095]: ./vlan Apr 12 18:31:25.510619 tar[1095]: ./host-device Apr 12 18:31:25.542652 tar[1095]: ./tuning Apr 12 18:31:25.568339 tar[1095]: ./vrf Apr 12 18:31:25.594469 tar[1095]: ./sbr Apr 12 18:31:25.620059 tar[1095]: ./tap Apr 12 18:31:25.649520 tar[1095]: ./dhcp Apr 12 18:31:25.721330 tar[1095]: ./static Apr 12 18:31:25.742849 tar[1095]: ./firewall Apr 12 18:31:25.764480 systemd[1]: Finished prepare-critools.service. Apr 12 18:31:25.776224 tar[1095]: ./macvlan Apr 12 18:31:25.780396 locksmithd[1132]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:31:25.806642 tar[1095]: ./dummy Apr 12 18:31:25.821568 tar[1098]: linux-arm64/LICENSE Apr 12 18:31:25.821644 tar[1098]: linux-arm64/README.md Apr 12 18:31:25.825758 systemd[1]: Finished prepare-helm.service. Apr 12 18:31:25.836161 tar[1095]: ./bridge Apr 12 18:31:25.867472 tar[1095]: ./ipvlan Apr 12 18:31:25.896071 tar[1095]: ./portmap Apr 12 18:31:25.923365 tar[1095]: ./host-local Apr 12 18:31:25.958474 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:31:26.259757 systemd-networkd[1003]: eth0: Gained IPv6LL Apr 12 18:31:26.868057 sshd_keygen[1103]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:31:26.884594 systemd[1]: Finished sshd-keygen.service. Apr 12 18:31:26.886796 systemd[1]: Starting issuegen.service... Apr 12 18:31:26.891054 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:31:26.891194 systemd[1]: Finished issuegen.service. Apr 12 18:31:26.893238 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:31:26.898750 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:31:26.900774 systemd[1]: Started getty@tty1.service. Apr 12 18:31:26.902587 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:31:26.903678 systemd[1]: Reached target getty.target. Apr 12 18:31:26.904441 systemd[1]: Reached target multi-user.target. Apr 12 18:31:26.906274 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:31:26.912373 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:31:26.912512 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:31:26.913526 systemd[1]: Startup finished in 580ms (kernel) + 5.649s (initrd) + 4.694s (userspace) = 10.924s. Apr 12 18:31:29.339121 systemd[1]: Created slice system-sshd.slice. Apr 12 18:31:29.340336 systemd[1]: Started sshd@0-10.0.0.89:22-10.0.0.1:49376.service. Apr 12 18:31:29.386785 sshd[1162]: Accepted publickey for core from 10.0.0.1 port 49376 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.388834 sshd[1162]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.396580 systemd[1]: Created slice user-500.slice. Apr 12 18:31:29.397794 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:31:29.399333 systemd-logind[1087]: New session 1 of user core. Apr 12 18:31:29.405272 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:31:29.406696 systemd[1]: Starting user@500.service... Apr 12 18:31:29.410795 (systemd)[1165]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.465548 systemd[1165]: Queued start job for default target default.target. Apr 12 18:31:29.466006 systemd[1165]: Reached target paths.target. Apr 12 18:31:29.466025 systemd[1165]: Reached target sockets.target. Apr 12 18:31:29.466037 systemd[1165]: Reached target timers.target. Apr 12 18:31:29.466048 systemd[1165]: Reached target basic.target. Apr 12 18:31:29.466099 systemd[1165]: Reached target default.target. Apr 12 18:31:29.466124 systemd[1165]: Startup finished in 50ms. Apr 12 18:31:29.466165 systemd[1]: Started user@500.service. Apr 12 18:31:29.467441 systemd[1]: Started session-1.scope. Apr 12 18:31:29.516602 systemd[1]: Started sshd@1-10.0.0.89:22-10.0.0.1:49390.service. Apr 12 18:31:29.564113 sshd[1174]: Accepted publickey for core from 10.0.0.1 port 49390 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.565215 sshd[1174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.569365 systemd[1]: Started session-2.scope. Apr 12 18:31:29.569508 systemd-logind[1087]: New session 2 of user core. Apr 12 18:31:29.621252 sshd[1174]: pam_unix(sshd:session): session closed for user core Apr 12 18:31:29.625159 systemd[1]: sshd@1-10.0.0.89:22-10.0.0.1:49390.service: Deactivated successfully. Apr 12 18:31:29.625754 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:31:29.626230 systemd-logind[1087]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:31:29.627551 systemd[1]: Started sshd@2-10.0.0.89:22-10.0.0.1:49398.service. Apr 12 18:31:29.628196 systemd-logind[1087]: Removed session 2. Apr 12 18:31:29.663359 sshd[1180]: Accepted publickey for core from 10.0.0.1 port 49398 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.664743 sshd[1180]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.667745 systemd-logind[1087]: New session 3 of user core. Apr 12 18:31:29.668508 systemd[1]: Started session-3.scope. Apr 12 18:31:29.715185 sshd[1180]: pam_unix(sshd:session): session closed for user core Apr 12 18:31:29.718283 systemd[1]: sshd@2-10.0.0.89:22-10.0.0.1:49398.service: Deactivated successfully. Apr 12 18:31:29.718845 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:31:29.719346 systemd-logind[1087]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:31:29.720367 systemd[1]: Started sshd@3-10.0.0.89:22-10.0.0.1:49414.service. Apr 12 18:31:29.721055 systemd-logind[1087]: Removed session 3. Apr 12 18:31:29.756437 sshd[1186]: Accepted publickey for core from 10.0.0.1 port 49414 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.757741 sshd[1186]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.760819 systemd-logind[1087]: New session 4 of user core. Apr 12 18:31:29.761567 systemd[1]: Started session-4.scope. Apr 12 18:31:29.815251 sshd[1186]: pam_unix(sshd:session): session closed for user core Apr 12 18:31:29.818342 systemd[1]: sshd@3-10.0.0.89:22-10.0.0.1:49414.service: Deactivated successfully. Apr 12 18:31:29.818909 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:31:29.819424 systemd-logind[1087]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:31:29.820429 systemd[1]: Started sshd@4-10.0.0.89:22-10.0.0.1:49416.service. Apr 12 18:31:29.821105 systemd-logind[1087]: Removed session 4. Apr 12 18:31:29.856835 sshd[1192]: Accepted publickey for core from 10.0.0.1 port 49416 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.857908 sshd[1192]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.861067 systemd-logind[1087]: New session 5 of user core. Apr 12 18:31:29.861812 systemd[1]: Started session-5.scope. Apr 12 18:31:29.919575 sudo[1195]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:31:29.919789 sudo[1195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:31:29.935823 dbus-daemon[1073]: avc: received setenforce notice (enforcing=1) Apr 12 18:31:29.936759 sudo[1195]: pam_unix(sudo:session): session closed for user root Apr 12 18:31:29.938489 sshd[1192]: pam_unix(sshd:session): session closed for user core Apr 12 18:31:29.941128 systemd[1]: sshd@4-10.0.0.89:22-10.0.0.1:49416.service: Deactivated successfully. Apr 12 18:31:29.941732 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:31:29.942257 systemd-logind[1087]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:31:29.943317 systemd[1]: Started sshd@5-10.0.0.89:22-10.0.0.1:49432.service. Apr 12 18:31:29.943849 systemd-logind[1087]: Removed session 5. Apr 12 18:31:29.980534 sshd[1199]: Accepted publickey for core from 10.0.0.1 port 49432 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:29.981673 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:29.984772 systemd-logind[1087]: New session 6 of user core. Apr 12 18:31:29.985530 systemd[1]: Started session-6.scope. Apr 12 18:31:30.035840 sudo[1203]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:31:30.036050 sudo[1203]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:31:30.038661 sudo[1203]: pam_unix(sudo:session): session closed for user root Apr 12 18:31:30.042566 sudo[1202]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:31:30.042778 sudo[1202]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:31:30.050386 systemd[1]: Stopping audit-rules.service... Apr 12 18:31:30.050000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:31:30.052091 kernel: kauditd_printk_skb: 130 callbacks suppressed Apr 12 18:31:30.052124 kernel: audit: type=1305 audit(1712946690.050:163): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:31:30.050000 audit[1206]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff30c63b0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:30.053990 auditctl[1206]: No rules Apr 12 18:31:30.054197 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:31:30.054352 systemd[1]: Stopped audit-rules.service. Apr 12 18:31:30.055752 systemd[1]: Starting audit-rules.service... Apr 12 18:31:30.057011 kernel: audit: type=1300 audit(1712946690.050:163): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff30c63b0 a2=420 a3=0 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:30.057153 kernel: audit: type=1327 audit(1712946690.050:163): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:31:30.050000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:31:30.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.060395 kernel: audit: type=1131 audit(1712946690.053:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.070155 augenrules[1223]: No rules Apr 12 18:31:30.069000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.070740 systemd[1]: Finished audit-rules.service. Apr 12 18:31:30.071809 sudo[1202]: pam_unix(sudo:session): session closed for user root Apr 12 18:31:30.071000 audit[1202]: USER_END pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.074196 sshd[1199]: pam_unix(sshd:session): session closed for user core Apr 12 18:31:30.077151 kernel: audit: type=1130 audit(1712946690.069:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.077222 kernel: audit: type=1106 audit(1712946690.071:166): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.077241 kernel: audit: type=1104 audit(1712946690.071:167): pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.071000 audit[1202]: CRED_DISP pid=1202 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.078863 kernel: audit: type=1106 audit(1712946690.075:168): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.075000 audit[1199]: USER_END pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.077374 systemd[1]: Started sshd@6-10.0.0.89:22-10.0.0.1:49438.service. Apr 12 18:31:30.077798 systemd[1]: sshd@5-10.0.0.89:22-10.0.0.1:49432.service: Deactivated successfully. Apr 12 18:31:30.078583 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:31:30.078690 systemd-logind[1087]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:31:30.079681 systemd-logind[1087]: Removed session 6. Apr 12 18:31:30.075000 audit[1199]: CRED_DISP pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.084477 kernel: audit: type=1104 audit(1712946690.075:169): pid=1199 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.084506 kernel: audit: type=1130 audit(1712946690.076:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.076000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.89:22-10.0.0.1:49432 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.112000 audit[1228]: USER_ACCT pid=1228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.114489 sshd[1228]: Accepted publickey for core from 10.0.0.1 port 49438 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:31:30.113000 audit[1228]: CRED_ACQ pid=1228 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.113000 audit[1228]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe30fe060 a2=3 a3=1 items=0 ppid=1 pid=1228 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:30.113000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:31:30.115903 sshd[1228]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:31:30.119249 systemd-logind[1087]: New session 7 of user core. Apr 12 18:31:30.119598 systemd[1]: Started session-7.scope. Apr 12 18:31:30.122000 audit[1228]: USER_START pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.123000 audit[1231]: CRED_ACQ pid=1231 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:31:30.168000 audit[1232]: USER_ACCT pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.168000 audit[1232]: CRED_REFR pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.169307 sudo[1232]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:31:30.169496 sudo[1232]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:31:30.171000 audit[1232]: USER_START pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.864249 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:31:30.869619 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:31:30.868000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:30.869941 systemd[1]: Reached target network-online.target. Apr 12 18:31:30.871139 systemd[1]: Starting docker.service... Apr 12 18:31:30.945319 env[1251]: time="2024-04-12T18:31:30.945258927Z" level=info msg="Starting up" Apr 12 18:31:30.946998 env[1251]: time="2024-04-12T18:31:30.946972384Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:31:30.947097 env[1251]: time="2024-04-12T18:31:30.947081911Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:31:30.947166 env[1251]: time="2024-04-12T18:31:30.947150429Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:31:30.947216 env[1251]: time="2024-04-12T18:31:30.947203921Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:31:30.949255 env[1251]: time="2024-04-12T18:31:30.949222794Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:31:30.949255 env[1251]: time="2024-04-12T18:31:30.949245450Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:31:30.949365 env[1251]: time="2024-04-12T18:31:30.949259811Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:31:30.949365 env[1251]: time="2024-04-12T18:31:30.949271081Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:31:30.954046 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2823411679-merged.mount: Deactivated successfully. Apr 12 18:31:30.973872 env[1251]: time="2024-04-12T18:31:30.973842648Z" level=info msg="Loading containers: start." Apr 12 18:31:31.015000 audit[1285]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1285 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.015000 audit[1285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffdc78cd10 a2=0 a3=1 items=0 ppid=1251 pid=1285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:31:31.018000 audit[1287]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1287 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.018000 audit[1287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff0681ab0 a2=0 a3=1 items=0 ppid=1251 pid=1287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:31:31.020000 audit[1289]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.020000 audit[1289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc8a64370 a2=0 a3=1 items=0 ppid=1251 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.020000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:31:31.022000 audit[1291]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.022000 audit[1291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffcd4221f0 a2=0 a3=1 items=0 ppid=1251 pid=1291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.022000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:31:31.024000 audit[1293]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.024000 audit[1293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc67cfa30 a2=0 a3=1 items=0 ppid=1251 pid=1293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.024000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:31:31.047000 audit[1298]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1298 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.047000 audit[1298]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd36d4320 a2=0 a3=1 items=0 ppid=1251 pid=1298 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.047000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:31:31.053000 audit[1300]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.053000 audit[1300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc75f46b0 a2=0 a3=1 items=0 ppid=1251 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.053000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:31:31.054000 audit[1302]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.054000 audit[1302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe4f20930 a2=0 a3=1 items=0 ppid=1251 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.054000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:31:31.055000 audit[1304]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.055000 audit[1304]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=fffffffb94c0 a2=0 a3=1 items=0 ppid=1251 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.055000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:31:31.062000 audit[1308]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.062000 audit[1308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff3cce240 a2=0 a3=1 items=0 ppid=1251 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.062000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:31:31.063000 audit[1309]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1309 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.063000 audit[1309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc5c46fb0 a2=0 a3=1 items=0 ppid=1251 pid=1309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.063000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:31:31.073689 kernel: Initializing XFRM netlink socket Apr 12 18:31:31.095197 env[1251]: time="2024-04-12T18:31:31.095154049Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:31:31.106000 audit[1317]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.106000 audit[1317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=fffffa09a910 a2=0 a3=1 items=0 ppid=1251 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.106000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:31:31.123000 audit[1320]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.123000 audit[1320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffdbc372b0 a2=0 a3=1 items=0 ppid=1251 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.123000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:31:31.126000 audit[1323]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.126000 audit[1323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd0b19830 a2=0 a3=1 items=0 ppid=1251 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.126000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:31:31.128000 audit[1325]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.128000 audit[1325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffcb0fea50 a2=0 a3=1 items=0 ppid=1251 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.128000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:31:31.129000 audit[1327]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1327 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.129000 audit[1327]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=fffff9418c50 a2=0 a3=1 items=0 ppid=1251 pid=1327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.129000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:31:31.131000 audit[1329]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.131000 audit[1329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffffb2896c0 a2=0 a3=1 items=0 ppid=1251 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.131000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:31:31.133000 audit[1331]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.133000 audit[1331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffe335c750 a2=0 a3=1 items=0 ppid=1251 pid=1331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.133000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:31:31.139000 audit[1334]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.139000 audit[1334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffdbe6af80 a2=0 a3=1 items=0 ppid=1251 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.139000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:31:31.140000 audit[1336]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.140000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff9d431c0 a2=0 a3=1 items=0 ppid=1251 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:31:31.142000 audit[1338]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.142000 audit[1338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffe2eec480 a2=0 a3=1 items=0 ppid=1251 pid=1338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.142000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:31:31.144000 audit[1340]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.144000 audit[1340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffaf18970 a2=0 a3=1 items=0 ppid=1251 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.144000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:31:31.145661 systemd-networkd[1003]: docker0: Link UP Apr 12 18:31:31.152000 audit[1344]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.152000 audit[1344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffce4642b0 a2=0 a3=1 items=0 ppid=1251 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:31:31.152000 audit[1345]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1345 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:31.152000 audit[1345]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffd148040 a2=0 a3=1 items=0 ppid=1251 pid=1345 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:31.152000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:31:31.153823 env[1251]: time="2024-04-12T18:31:31.153781802Z" level=info msg="Loading containers: done." Apr 12 18:31:31.174991 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2476819017-merged.mount: Deactivated successfully. Apr 12 18:31:31.178384 env[1251]: time="2024-04-12T18:31:31.178334447Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:31:31.178532 env[1251]: time="2024-04-12T18:31:31.178504511Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:31:31.178631 env[1251]: time="2024-04-12T18:31:31.178607357Z" level=info msg="Daemon has completed initialization" Apr 12 18:31:31.189000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.189972 systemd[1]: Started docker.service. Apr 12 18:31:31.197736 env[1251]: time="2024-04-12T18:31:31.197603860Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:31:31.214008 systemd[1]: Reloading. Apr 12 18:31:31.258090 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2024-04-12T18:31:31Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:31.258121 /usr/lib/systemd/system-generators/torcx-generator[1396]: time="2024-04-12T18:31:31Z" level=info msg="torcx already run" Apr 12 18:31:31.311877 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:31.311896 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:31.326654 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.373000 audit: BPF prog-id=34 op=LOAD Apr 12 18:31:31.373000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit: BPF prog-id=35 op=LOAD Apr 12 18:31:31.375000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit: BPF prog-id=36 op=LOAD Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit: BPF prog-id=37 op=LOAD Apr 12 18:31:31.375000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:31:31.375000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.375000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit: BPF prog-id=38 op=LOAD Apr 12 18:31:31.376000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit: BPF prog-id=39 op=LOAD Apr 12 18:31:31.376000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit: BPF prog-id=40 op=LOAD Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.376000 audit: BPF prog-id=41 op=LOAD Apr 12 18:31:31.376000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:31:31.376000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit: BPF prog-id=42 op=LOAD Apr 12 18:31:31.378000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.378000 audit: BPF prog-id=43 op=LOAD Apr 12 18:31:31.378000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit: BPF prog-id=44 op=LOAD Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit: BPF prog-id=45 op=LOAD Apr 12 18:31:31.380000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:31:31.380000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.380000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit: BPF prog-id=46 op=LOAD Apr 12 18:31:31.381000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit: BPF prog-id=47 op=LOAD Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:31.381000 audit: BPF prog-id=48 op=LOAD Apr 12 18:31:31.381000 audit: BPF prog-id=30 op=UNLOAD Apr 12 18:31:31.381000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:31:31.387961 systemd[1]: Started kubelet.service. Apr 12 18:31:31.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:31.509458 kubelet[1431]: E0412 18:31:31.509403 1431 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:31:31.512226 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:31:31.512358 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:31:31.511000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:31:31.754476 env[1104]: time="2024-04-12T18:31:31.754164872Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\"" Apr 12 18:31:32.261884 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3228450002.mount: Deactivated successfully. Apr 12 18:31:34.141928 env[1104]: time="2024-04-12T18:31:34.141871879Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:34.144023 env[1104]: time="2024-04-12T18:31:34.143981420Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:34.146524 env[1104]: time="2024-04-12T18:31:34.146478165Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:34.147885 env[1104]: time="2024-04-12T18:31:34.147854368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:7e7f3c806333528451a1e0bfdf17da0341adaea7d50a703db9c2005c474a97b9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:34.148795 env[1104]: time="2024-04-12T18:31:34.148766045Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.8\" returns image reference \"sha256:883d43b86efe04c7ca7bcd566f873179fa9c1dbceb67e32cd5d30213c3bc17de\"" Apr 12 18:31:34.157255 env[1104]: time="2024-04-12T18:31:34.157229324Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\"" Apr 12 18:31:36.177320 env[1104]: time="2024-04-12T18:31:36.177266873Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:36.179520 env[1104]: time="2024-04-12T18:31:36.179489463Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:36.184663 env[1104]: time="2024-04-12T18:31:36.184620844Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:36.185356 env[1104]: time="2024-04-12T18:31:36.185332793Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:f3d0e8da9d1532e081e719a985e89a0cfe1a29d127773ad8e2c2fee1dd10fd00,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:36.186248 env[1104]: time="2024-04-12T18:31:36.186214073Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.8\" returns image reference \"sha256:7beedd93d8e53aab4b98613d37758450bbbac01a94f42cdb7670da900d1e11d8\"" Apr 12 18:31:36.197297 env[1104]: time="2024-04-12T18:31:36.197264636Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\"" Apr 12 18:31:37.453704 env[1104]: time="2024-04-12T18:31:37.453645831Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:37.454761 env[1104]: time="2024-04-12T18:31:37.454730217Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:37.456362 env[1104]: time="2024-04-12T18:31:37.456334092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:37.458532 env[1104]: time="2024-04-12T18:31:37.458489738Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:4d61604f259d3c91d8b3ec7a6a999f5eae9aff371567151cd5165eaa698c6d7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:37.459338 env[1104]: time="2024-04-12T18:31:37.459306230Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.8\" returns image reference \"sha256:36dcd04414a4b2b645ad6da4fd60a5d1479f6eb9da01a928082abb025958a687\"" Apr 12 18:31:37.468310 env[1104]: time="2024-04-12T18:31:37.468283759Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\"" Apr 12 18:31:38.503458 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1986008775.mount: Deactivated successfully. Apr 12 18:31:38.945860 env[1104]: time="2024-04-12T18:31:38.945746368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.947035 env[1104]: time="2024-04-12T18:31:38.946998230Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.948636 env[1104]: time="2024-04-12T18:31:38.948599940Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.949735 env[1104]: time="2024-04-12T18:31:38.949707408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:9e9dd46799712c58e1a49f973374ffa9ad4e5a6175896e5d805a8738bf5c5865,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:38.950091 env[1104]: time="2024-04-12T18:31:38.950062814Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.8\" returns image reference \"sha256:837f825eec6c170d5e5bbfbd7bb0a4afac97759d0f0c57b80e4712d417fd690b\"" Apr 12 18:31:38.959012 env[1104]: time="2024-04-12T18:31:38.958982231Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:31:39.387942 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2630394367.mount: Deactivated successfully. Apr 12 18:31:39.392177 env[1104]: time="2024-04-12T18:31:39.392140834Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:39.393456 env[1104]: time="2024-04-12T18:31:39.393424552Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:39.394928 env[1104]: time="2024-04-12T18:31:39.394898577Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:39.396210 env[1104]: time="2024-04-12T18:31:39.396172917Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:39.396801 env[1104]: time="2024-04-12T18:31:39.396778414Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:31:39.405633 env[1104]: time="2024-04-12T18:31:39.405607946Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Apr 12 18:31:39.973701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3171769248.mount: Deactivated successfully. Apr 12 18:31:41.763145 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:31:41.763326 systemd[1]: Stopped kubelet.service. Apr 12 18:31:41.764240 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:31:41.764330 kernel: audit: type=1130 audit(1712946701.762:380): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.764813 systemd[1]: Started kubelet.service. Apr 12 18:31:41.762000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.768886 kernel: audit: type=1131 audit(1712946701.762:381): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.768947 kernel: audit: type=1130 audit(1712946701.764:382): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:41.806497 kubelet[1486]: E0412 18:31:41.806446 1486 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:31:41.809084 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:31:41.809217 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:31:41.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:31:41.812689 kernel: audit: type=1131 audit(1712946701.808:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:31:44.093250 env[1104]: time="2024-04-12T18:31:44.093203109Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:44.095789 env[1104]: time="2024-04-12T18:31:44.095743487Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:44.097731 env[1104]: time="2024-04-12T18:31:44.097695324Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:44.099971 env[1104]: time="2024-04-12T18:31:44.099937983Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:44.100851 env[1104]: time="2024-04-12T18:31:44.100815832Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Apr 12 18:31:44.110277 env[1104]: time="2024-04-12T18:31:44.110249511Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Apr 12 18:31:44.645631 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2329989939.mount: Deactivated successfully. Apr 12 18:31:45.180749 env[1104]: time="2024-04-12T18:31:45.180697613Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:45.182065 env[1104]: time="2024-04-12T18:31:45.182027262Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:45.183551 env[1104]: time="2024-04-12T18:31:45.183515805Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:45.184963 env[1104]: time="2024-04-12T18:31:45.184930245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:45.185515 env[1104]: time="2024-04-12T18:31:45.185476638Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Apr 12 18:31:50.524595 systemd[1]: Stopped kubelet.service. Apr 12 18:31:50.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.524000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.529964 kernel: audit: type=1130 audit(1712946710.524:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.530048 kernel: audit: type=1131 audit(1712946710.524:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.537564 systemd[1]: Reloading. Apr 12 18:31:50.600002 /usr/lib/systemd/system-generators/torcx-generator[1602]: time="2024-04-12T18:31:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:50.600032 /usr/lib/systemd/system-generators/torcx-generator[1602]: time="2024-04-12T18:31:50Z" level=info msg="torcx already run" Apr 12 18:31:50.655223 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:50.655245 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:50.670341 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:50.726464 kernel: audit: type=1400 audit(1712946710.721:386): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726576 kernel: audit: type=1400 audit(1712946710.721:387): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.729038 kernel: audit: type=1400 audit(1712946710.721:388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.731416 kernel: audit: type=1400 audit(1712946710.721:389): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.731493 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.734251 kernel: audit: type=1400 audit(1712946710.721:390): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.734330 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737224 kernel: audit: type=1400 audit(1712946710.721:391): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.721000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.723000 audit: BPF prog-id=49 op=LOAD Apr 12 18:31:50.723000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit: BPF prog-id=50 op=LOAD Apr 12 18:31:50.725000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit: BPF prog-id=51 op=LOAD Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.725000 audit: BPF prog-id=52 op=LOAD Apr 12 18:31:50.725000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:31:50.725000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit: BPF prog-id=53 op=LOAD Apr 12 18:31:50.728000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.730000 audit: BPF prog-id=54 op=LOAD Apr 12 18:31:50.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.737000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit: BPF prog-id=57 op=LOAD Apr 12 18:31:50.738000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.738000 audit: BPF prog-id=58 op=LOAD Apr 12 18:31:50.738000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit: BPF prog-id=59 op=LOAD Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit: BPF prog-id=60 op=LOAD Apr 12 18:31:50.739000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:31:50.739000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit: BPF prog-id=61 op=LOAD Apr 12 18:31:50.740000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit: BPF prog-id=62 op=LOAD Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:50.740000 audit: BPF prog-id=63 op=LOAD Apr 12 18:31:50.740000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:31:50.740000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:31:50.752177 systemd[1]: Started kubelet.service. Apr 12 18:31:50.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:50.790914 kubelet[1640]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:31:50.790914 kubelet[1640]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:31:50.790914 kubelet[1640]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:31:50.791279 kubelet[1640]: I0412 18:31:50.790955 1640 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:31:51.382600 kubelet[1640]: I0412 18:31:51.382561 1640 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:31:51.382600 kubelet[1640]: I0412 18:31:51.382596 1640 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:31:51.382861 kubelet[1640]: I0412 18:31:51.382842 1640 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:31:51.387889 kubelet[1640]: I0412 18:31:51.387863 1640 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:31:51.388205 kubelet[1640]: E0412 18:31:51.388186 1640 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.89:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.392629 kubelet[1640]: W0412 18:31:51.392613 1640 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:31:51.393303 kubelet[1640]: I0412 18:31:51.393290 1640 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:31:51.393501 kubelet[1640]: I0412 18:31:51.393490 1640 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:31:51.393643 kubelet[1640]: I0412 18:31:51.393628 1640 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:31:51.393719 kubelet[1640]: I0412 18:31:51.393651 1640 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:31:51.393719 kubelet[1640]: I0412 18:31:51.393660 1640 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:31:51.393775 kubelet[1640]: I0412 18:31:51.393766 1640 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:31:51.393983 kubelet[1640]: I0412 18:31:51.393971 1640 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:31:51.394009 kubelet[1640]: I0412 18:31:51.393989 1640 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:31:51.394009 kubelet[1640]: I0412 18:31:51.394004 1640 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:31:51.394058 kubelet[1640]: I0412 18:31:51.394017 1640 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:31:51.394679 kubelet[1640]: W0412 18:31:51.394629 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.394742 kubelet[1640]: E0412 18:31:51.394704 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.89:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.394824 kubelet[1640]: I0412 18:31:51.394781 1640 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:31:51.395175 kubelet[1640]: W0412 18:31:51.395163 1640 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:31:51.395910 kubelet[1640]: I0412 18:31:51.395889 1640 server.go:1232] "Started kubelet" Apr 12 18:31:51.396441 kubelet[1640]: I0412 18:31:51.396222 1640 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:31:51.396521 kubelet[1640]: I0412 18:31:51.396494 1640 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:31:51.396564 kubelet[1640]: I0412 18:31:51.396549 1640 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:31:51.396000 audit[1640]: AVC avc: denied { mac_admin } for pid=1640 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:51.396000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:51.396000 audit[1640]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e9b890 a1=4000e3d278 a2=4000e9b860 a3=25 items=0 ppid=1 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.396000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:51.396000 audit[1640]: AVC avc: denied { mac_admin } for pid=1640 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:51.396000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:51.396000 audit[1640]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000dfc380 a1=4000e3d290 a2=4000e9b920 a3=25 items=0 ppid=1 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.396000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:51.397079 kubelet[1640]: I0412 18:31:51.396781 1640 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:31:51.397079 kubelet[1640]: I0412 18:31:51.396815 1640 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:31:51.397079 kubelet[1640]: I0412 18:31:51.396877 1640 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:31:51.397214 kubelet[1640]: I0412 18:31:51.397185 1640 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:31:51.397306 kubelet[1640]: E0412 18:31:51.397289 1640 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:31:51.397385 kubelet[1640]: E0412 18:31:51.397374 1640 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:31:51.397775 kubelet[1640]: W0412 18:31:51.397737 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.397868 kubelet[1640]: E0412 18:31:51.397856 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.89:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.398210 kubelet[1640]: E0412 18:31:51.398089 1640 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"localhost.17c59bf55bec8728", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"localhost", UID:"localhost", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"localhost"}, FirstTimestamp:time.Date(2024, time.April, 12, 18, 31, 51, 395862312, time.Local), LastTimestamp:time.Date(2024, time.April, 12, 18, 31, 51, 395862312, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"localhost"}': 'Post "https://10.0.0.89:6443/api/v1/namespaces/default/events": dial tcp 10.0.0.89:6443: connect: connection refused'(may retry after sleeping) Apr 12 18:31:51.398934 kubelet[1640]: E0412 18:31:51.398910 1640 kubelet_node_status.go:458] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:31:51.399057 kubelet[1640]: I0412 18:31:51.399043 1640 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:31:51.398000 audit[1652]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1652 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.398000 audit[1652]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb6e73e0 a2=0 a3=1 items=0 ppid=1640 pid=1652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.398000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:31:51.399469 kubelet[1640]: I0412 18:31:51.399453 1640 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:31:51.399619 kubelet[1640]: I0412 18:31:51.399543 1640 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:31:51.399000 audit[1653]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1653 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.399000 audit[1653]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe8340190 a2=0 a3=1 items=0 ppid=1640 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:31:51.400102 kubelet[1640]: W0412 18:31:51.399903 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.400102 kubelet[1640]: E0412 18:31:51.399945 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.400102 kubelet[1640]: E0412 18:31:51.399959 1640 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="200ms" Apr 12 18:31:51.405000 audit[1655]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1655 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.405000 audit[1655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc80a86d0 a2=0 a3=1 items=0 ppid=1640 pid=1655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:31:51.406000 audit[1657]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.406000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffd15b210 a2=0 a3=1 items=0 ppid=1640 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:31:51.417380 kubelet[1640]: I0412 18:31:51.417359 1640 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:31:51.417529 kubelet[1640]: I0412 18:31:51.417517 1640 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:31:51.417606 kubelet[1640]: I0412 18:31:51.417596 1640 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:31:51.417000 audit[1665]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1665 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.417000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffddbb3bc0 a2=0 a3=1 items=0 ppid=1640 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:31:51.418545 kubelet[1640]: I0412 18:31:51.418525 1640 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:31:51.419491 kubelet[1640]: I0412 18:31:51.419470 1640 policy_none.go:49] "None policy: Start" Apr 12 18:31:51.418000 audit[1666]: NETFILTER_CFG table=mangle:31 family=2 entries=1 op=nft_register_chain pid=1666 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.418000 audit[1666]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe210df90 a2=0 a3=1 items=0 ppid=1640 pid=1666 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:31:51.418000 audit[1667]: NETFILTER_CFG table=mangle:32 family=10 entries=2 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:31:51.418000 audit[1667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffcef3f5d0 a2=0 a3=1 items=0 ppid=1640 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.418000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:31:51.420028 kubelet[1640]: I0412 18:31:51.420013 1640 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:31:51.420128 kubelet[1640]: I0412 18:31:51.420117 1640 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:31:51.420189 kubelet[1640]: I0412 18:31:51.420180 1640 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:31:51.420288 kubelet[1640]: E0412 18:31:51.420277 1640 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:31:51.419000 audit[1669]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1669 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.419000 audit[1669]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe16958b0 a2=0 a3=1 items=0 ppid=1640 pid=1669 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.419000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:31:51.420787 kubelet[1640]: W0412 18:31:51.420557 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.420787 kubelet[1640]: E0412 18:31:51.420604 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:51.421285 kubelet[1640]: I0412 18:31:51.421263 1640 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:31:51.421403 kubelet[1640]: I0412 18:31:51.421390 1640 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:31:51.420000 audit[1670]: NETFILTER_CFG table=mangle:34 family=10 entries=1 op=nft_register_chain pid=1670 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:31:51.420000 audit[1670]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe650fb50 a2=0 a3=1 items=0 ppid=1640 pid=1670 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.420000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:31:51.421000 audit[1671]: NETFILTER_CFG table=filter:35 family=2 entries=1 op=nft_register_chain pid=1671 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:31:51.421000 audit[1671]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc922bb0 a2=0 a3=1 items=0 ppid=1640 pid=1671 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:31:51.421000 audit[1672]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1672 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:31:51.421000 audit[1672]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffded286a0 a2=0 a3=1 items=0 ppid=1640 pid=1672 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:31:51.422000 audit[1673]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1673 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:31:51.422000 audit[1673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffff8fdd00 a2=0 a3=1 items=0 ppid=1640 pid=1673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.422000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:31:51.426887 systemd[1]: Created slice kubepods.slice. Apr 12 18:31:51.430466 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:31:51.442730 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:31:51.444630 kubelet[1640]: I0412 18:31:51.444557 1640 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:31:51.444630 kubelet[1640]: I0412 18:31:51.444632 1640 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:31:51.443000 audit[1640]: AVC avc: denied { mac_admin } for pid=1640 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:51.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:51.443000 audit[1640]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001142990 a1=40011664e0 a2=4001142960 a3=25 items=0 ppid=1 pid=1640 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:51.443000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:51.444922 kubelet[1640]: I0412 18:31:51.444899 1640 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:31:51.446091 kubelet[1640]: E0412 18:31:51.446027 1640 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:31:51.501443 kubelet[1640]: I0412 18:31:51.501409 1640 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:31:51.501768 kubelet[1640]: E0412 18:31:51.501750 1640 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Apr 12 18:31:51.520989 kubelet[1640]: I0412 18:31:51.520950 1640 topology_manager.go:215] "Topology Admit Handler" podUID="fe07cdd1e042315302b90fb817f23bff" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:31:51.521966 kubelet[1640]: I0412 18:31:51.521938 1640 topology_manager.go:215] "Topology Admit Handler" podUID="7ea520b1e9b7ab03da4e0d60de4cd055" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:31:51.522873 kubelet[1640]: I0412 18:31:51.522839 1640 topology_manager.go:215] "Topology Admit Handler" podUID="7bb06e2cba933e89936d947f3ee7de1d" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:31:51.527610 systemd[1]: Created slice kubepods-burstable-podfe07cdd1e042315302b90fb817f23bff.slice. Apr 12 18:31:51.540947 systemd[1]: Created slice kubepods-burstable-pod7ea520b1e9b7ab03da4e0d60de4cd055.slice. Apr 12 18:31:51.544062 systemd[1]: Created slice kubepods-burstable-pod7bb06e2cba933e89936d947f3ee7de1d.slice. Apr 12 18:31:51.600679 kubelet[1640]: E0412 18:31:51.600644 1640 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="400ms" Apr 12 18:31:51.600781 kubelet[1640]: I0412 18:31:51.600649 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:51.600781 kubelet[1640]: I0412 18:31:51.600741 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7bb06e2cba933e89936d947f3ee7de1d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"7bb06e2cba933e89936d947f3ee7de1d\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:31:51.600781 kubelet[1640]: I0412 18:31:51.600767 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:51.600848 kubelet[1640]: I0412 18:31:51.600787 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:51.600848 kubelet[1640]: I0412 18:31:51.600807 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:51.600848 kubelet[1640]: I0412 18:31:51.600828 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:51.600925 kubelet[1640]: I0412 18:31:51.600861 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:51.600925 kubelet[1640]: I0412 18:31:51.600884 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:51.600925 kubelet[1640]: I0412 18:31:51.600904 1640 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:51.702999 kubelet[1640]: I0412 18:31:51.702901 1640 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:31:51.705392 kubelet[1640]: E0412 18:31:51.705364 1640 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Apr 12 18:31:51.839966 kubelet[1640]: E0412 18:31:51.839941 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:51.840577 env[1104]: time="2024-04-12T18:31:51.840539028Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:fe07cdd1e042315302b90fb817f23bff,Namespace:kube-system,Attempt:0,}" Apr 12 18:31:51.843191 kubelet[1640]: E0412 18:31:51.843171 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:51.843950 env[1104]: time="2024-04-12T18:31:51.843542910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7ea520b1e9b7ab03da4e0d60de4cd055,Namespace:kube-system,Attempt:0,}" Apr 12 18:31:51.845788 kubelet[1640]: E0412 18:31:51.845769 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:51.846113 env[1104]: time="2024-04-12T18:31:51.846077889Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:7bb06e2cba933e89936d947f3ee7de1d,Namespace:kube-system,Attempt:0,}" Apr 12 18:31:52.001139 kubelet[1640]: E0412 18:31:52.001050 1640 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.89:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.89:6443: connect: connection refused" interval="800ms" Apr 12 18:31:52.106646 kubelet[1640]: I0412 18:31:52.106611 1640 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:31:52.106993 kubelet[1640]: E0412 18:31:52.106974 1640 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.0.0.89:6443/api/v1/nodes\": dial tcp 10.0.0.89:6443: connect: connection refused" node="localhost" Apr 12 18:31:52.276134 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3567138429.mount: Deactivated successfully. Apr 12 18:31:52.278854 env[1104]: time="2024-04-12T18:31:52.278815646Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.281262 env[1104]: time="2024-04-12T18:31:52.281227425Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.282434 env[1104]: time="2024-04-12T18:31:52.282403350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.283436 env[1104]: time="2024-04-12T18:31:52.283403037Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.284873 env[1104]: time="2024-04-12T18:31:52.284817926Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.285507 env[1104]: time="2024-04-12T18:31:52.285483758Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.288626 env[1104]: time="2024-04-12T18:31:52.288598528Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.291844 env[1104]: time="2024-04-12T18:31:52.291810665Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.294126 env[1104]: time="2024-04-12T18:31:52.294088678Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.294827 env[1104]: time="2024-04-12T18:31:52.294792587Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.295544 env[1104]: time="2024-04-12T18:31:52.295509680Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.296267 env[1104]: time="2024-04-12T18:31:52.296237801Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:31:52.321043 env[1104]: time="2024-04-12T18:31:52.320811112Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:52.321043 env[1104]: time="2024-04-12T18:31:52.320849947Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:52.321043 env[1104]: time="2024-04-12T18:31:52.320860655Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:52.321457 env[1104]: time="2024-04-12T18:31:52.321403669Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71936dc23ec1368f8ad31c9315c0b44d3d6fe8a81c6d1303deae849f13c409d0 pid=1689 runtime=io.containerd.runc.v2 Apr 12 18:31:52.321800 env[1104]: time="2024-04-12T18:31:52.321625413Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:52.321800 env[1104]: time="2024-04-12T18:31:52.321654420Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:52.321800 env[1104]: time="2024-04-12T18:31:52.321684266Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:52.321899 env[1104]: time="2024-04-12T18:31:52.321842243Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60b108e6be5611775ea014ec64ecb411ade6a9bc98755262df283b47fa7fa05b pid=1701 runtime=io.containerd.runc.v2 Apr 12 18:31:52.323123 env[1104]: time="2024-04-12T18:31:52.323015930Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:31:52.323123 env[1104]: time="2024-04-12T18:31:52.323053527Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:31:52.323123 env[1104]: time="2024-04-12T18:31:52.323096677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:31:52.323524 env[1104]: time="2024-04-12T18:31:52.323481753Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a6f187ea8e62c160e43b7d61a732dbb878fc29f056847fd2dd5452ccdda60005 pid=1700 runtime=io.containerd.runc.v2 Apr 12 18:31:52.332886 kubelet[1640]: W0412 18:31:52.332750 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:52.332886 kubelet[1640]: E0412 18:31:52.332816 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.89:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:52.334883 systemd[1]: Started cri-containerd-60b108e6be5611775ea014ec64ecb411ade6a9bc98755262df283b47fa7fa05b.scope. Apr 12 18:31:52.335815 systemd[1]: Started cri-containerd-71936dc23ec1368f8ad31c9315c0b44d3d6fe8a81c6d1303deae849f13c409d0.scope. Apr 12 18:31:52.346914 systemd[1]: Started cri-containerd-a6f187ea8e62c160e43b7d61a732dbb878fc29f056847fd2dd5452ccdda60005.scope. Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.368000 audit: BPF prog-id=64 op=LOAD Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1701 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623130386536626535363131373735656130313465633634656362 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1701 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623130386536626535363131373735656130313465633634656362 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.369000 audit: BPF prog-id=65 op=LOAD Apr 12 18:31:52.369000 audit[1721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1701 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.369000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623130386536626535363131373735656130313465633634656362 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.370000 audit: BPF prog-id=66 op=LOAD Apr 12 18:31:52.370000 audit[1721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1701 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.370000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623130386536626535363131373735656130313465633634656362 Apr 12 18:31:52.371000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:31:52.371000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { perfmon } for pid=1721 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit[1721]: AVC avc: denied { bpf } for pid=1721 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.371000 audit: BPF prog-id=67 op=LOAD Apr 12 18:31:52.371000 audit[1721]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1701 pid=1721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.371000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630623130386536626535363131373735656130313465633634656362 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit: BPF prog-id=68 op=LOAD Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663138376561386536326331363065343362376436316137333264 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663138376561386536326331363065343362376436316137333264 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.372000 audit: BPF prog-id=69 op=LOAD Apr 12 18:31:52.372000 audit[1729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.372000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663138376561386536326331363065343362376436316137333264 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.374000 audit: BPF prog-id=70 op=LOAD Apr 12 18:31:52.374000 audit[1729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.374000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663138376561386536326331363065343362376436316137333264 Apr 12 18:31:52.375000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:31:52.375000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { perfmon } for pid=1729 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit[1729]: AVC avc: denied { bpf } for pid=1729 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.375000 audit: BPF prog-id=71 op=LOAD Apr 12 18:31:52.375000 audit[1729]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1700 pid=1729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136663138376561386536326331363065343362376436316137333264 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.377000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.378000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.378000 audit: BPF prog-id=72 op=LOAD Apr 12 18:31:52.378000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.378000 audit[1720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393336646332336563313336386638616433316339333135633062 Apr 12 18:31:52.378000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.378000 audit[1720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.378000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393336646332336563313336386638616433316339333135633062 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit: BPF prog-id=73 op=LOAD Apr 12 18:31:52.379000 audit[1720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393336646332336563313336386638616433316339333135633062 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.379000 audit: BPF prog-id=74 op=LOAD Apr 12 18:31:52.379000 audit[1720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.379000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393336646332336563313336386638616433316339333135633062 Apr 12 18:31:52.380000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:31:52.380000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { perfmon } for pid=1720 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit[1720]: AVC avc: denied { bpf } for pid=1720 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.380000 audit: BPF prog-id=75 op=LOAD Apr 12 18:31:52.380000 audit[1720]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1689 pid=1720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.380000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731393336646332336563313336386638616433316339333135633062 Apr 12 18:31:52.402227 env[1104]: time="2024-04-12T18:31:52.397258022Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:7ea520b1e9b7ab03da4e0d60de4cd055,Namespace:kube-system,Attempt:0,} returns sandbox id \"60b108e6be5611775ea014ec64ecb411ade6a9bc98755262df283b47fa7fa05b\"" Apr 12 18:31:52.402227 env[1104]: time="2024-04-12T18:31:52.400914128Z" level=info msg="CreateContainer within sandbox \"60b108e6be5611775ea014ec64ecb411ade6a9bc98755262df283b47fa7fa05b\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:31:52.402355 kubelet[1640]: E0412 18:31:52.398461 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:52.404659 env[1104]: time="2024-04-12T18:31:52.404615381Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:fe07cdd1e042315302b90fb817f23bff,Namespace:kube-system,Attempt:0,} returns sandbox id \"a6f187ea8e62c160e43b7d61a732dbb878fc29f056847fd2dd5452ccdda60005\"" Apr 12 18:31:52.405277 kubelet[1640]: E0412 18:31:52.405256 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:52.407421 env[1104]: time="2024-04-12T18:31:52.407385347Z" level=info msg="CreateContainer within sandbox \"a6f187ea8e62c160e43b7d61a732dbb878fc29f056847fd2dd5452ccdda60005\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:31:52.415009 env[1104]: time="2024-04-12T18:31:52.414944793Z" level=info msg="CreateContainer within sandbox \"60b108e6be5611775ea014ec64ecb411ade6a9bc98755262df283b47fa7fa05b\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"36bdfc00b0981943867749971b5f0921444042039478da3994a64e8893f433e0\"" Apr 12 18:31:52.415631 env[1104]: time="2024-04-12T18:31:52.415596401Z" level=info msg="StartContainer for \"36bdfc00b0981943867749971b5f0921444042039478da3994a64e8893f433e0\"" Apr 12 18:31:52.415916 kubelet[1640]: W0412 18:31:52.415866 1640 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:52.415954 kubelet[1640]: E0412 18:31:52.415923 1640 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.89:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.89:6443: connect: connection refused Apr 12 18:31:52.419040 env[1104]: time="2024-04-12T18:31:52.419008987Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:7bb06e2cba933e89936d947f3ee7de1d,Namespace:kube-system,Attempt:0,} returns sandbox id \"71936dc23ec1368f8ad31c9315c0b44d3d6fe8a81c6d1303deae849f13c409d0\"" Apr 12 18:31:52.419139 env[1104]: time="2024-04-12T18:31:52.419038993Z" level=info msg="CreateContainer within sandbox \"a6f187ea8e62c160e43b7d61a732dbb878fc29f056847fd2dd5452ccdda60005\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"2902953bdf098b0d8ee4452ea0e167a141c9b44c3ca5f33932781ba8906ab8dd\"" Apr 12 18:31:52.419545 env[1104]: time="2024-04-12T18:31:52.419517281Z" level=info msg="StartContainer for \"2902953bdf098b0d8ee4452ea0e167a141c9b44c3ca5f33932781ba8906ab8dd\"" Apr 12 18:31:52.419591 kubelet[1640]: E0412 18:31:52.419576 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:52.421042 env[1104]: time="2024-04-12T18:31:52.420998294Z" level=info msg="CreateContainer within sandbox \"71936dc23ec1368f8ad31c9315c0b44d3d6fe8a81c6d1303deae849f13c409d0\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:31:52.437795 env[1104]: time="2024-04-12T18:31:52.437750102Z" level=info msg="CreateContainer within sandbox \"71936dc23ec1368f8ad31c9315c0b44d3d6fe8a81c6d1303deae849f13c409d0\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"396faa45c6472137eeb1104d048b9fb6be3108f843b59ed4fd92b7477ef0b1d0\"" Apr 12 18:31:52.439531 systemd[1]: Started cri-containerd-2902953bdf098b0d8ee4452ea0e167a141c9b44c3ca5f33932781ba8906ab8dd.scope. Apr 12 18:31:52.440604 env[1104]: time="2024-04-12T18:31:52.440569212Z" level=info msg="StartContainer for \"396faa45c6472137eeb1104d048b9fb6be3108f843b59ed4fd92b7477ef0b1d0\"" Apr 12 18:31:52.445868 systemd[1]: Started cri-containerd-36bdfc00b0981943867749971b5f0921444042039478da3994a64e8893f433e0.scope. Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit: BPF prog-id=76 op=LOAD Apr 12 18:31:52.469000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.469000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1700 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.469000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303239353362646630393862306438656534343532656130653136 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1700 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303239353362646630393862306438656534343532656130653136 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.470000 audit: BPF prog-id=77 op=LOAD Apr 12 18:31:52.470000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1700 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303239353362646630393862306438656534343532656130653136 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.471000 audit: BPF prog-id=78 op=LOAD Apr 12 18:31:52.471000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1700 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.471000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303239353362646630393862306438656534343532656130653136 Apr 12 18:31:52.472000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:31:52.472000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { perfmon } for pid=1814 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit[1814]: AVC avc: denied { bpf } for pid=1814 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.472000 audit: BPF prog-id=79 op=LOAD Apr 12 18:31:52.472000 audit[1814]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1700 pid=1814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239303239353362646630393862306438656534343532656130653136 Apr 12 18:31:52.479130 systemd[1]: Started cri-containerd-396faa45c6472137eeb1104d048b9fb6be3108f843b59ed4fd92b7477ef0b1d0.scope. Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit: BPF prog-id=80 op=LOAD Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1701 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626466633030623039383139343338363737343939373162356630 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1701 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626466633030623039383139343338363737343939373162356630 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.484000 audit: BPF prog-id=81 op=LOAD Apr 12 18:31:52.484000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1701 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.484000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626466633030623039383139343338363737343939373162356630 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit: BPF prog-id=82 op=LOAD Apr 12 18:31:52.485000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1701 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626466633030623039383139343338363737343939373162356630 Apr 12 18:31:52.485000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:31:52.485000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { perfmon } for pid=1823 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit[1823]: AVC avc: denied { bpf } for pid=1823 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.485000 audit: BPF prog-id=83 op=LOAD Apr 12 18:31:52.485000 audit[1823]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1701 pid=1823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.485000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336626466633030623039383139343338363737343939373162356630 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.500000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.501000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.501000 audit: BPF prog-id=84 op=LOAD Apr 12 18:31:52.503065 env[1104]: time="2024-04-12T18:31:52.503022375Z" level=info msg="StartContainer for \"2902953bdf098b0d8ee4452ea0e167a141c9b44c3ca5f33932781ba8906ab8dd\" returns successfully" Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=1689 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366661613435633634373231333765656231313034643034386239 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=1689 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366661613435633634373231333765656231313034643034386239 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.502000 audit: BPF prog-id=85 op=LOAD Apr 12 18:31:52.502000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=1689 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.502000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366661613435633634373231333765656231313034643034386239 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.503000 audit: BPF prog-id=86 op=LOAD Apr 12 18:31:52.503000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=1689 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.503000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366661613435633634373231333765656231313034643034386239 Apr 12 18:31:52.505000 audit: BPF prog-id=86 op=UNLOAD Apr 12 18:31:52.505000 audit: BPF prog-id=85 op=UNLOAD Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { perfmon } for pid=1852 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit[1852]: AVC avc: denied { bpf } for pid=1852 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:52.505000 audit: BPF prog-id=87 op=LOAD Apr 12 18:31:52.505000 audit[1852]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=1689 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:52.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339366661613435633634373231333765656231313034643034386239 Apr 12 18:31:52.526013 env[1104]: time="2024-04-12T18:31:52.525558754Z" level=info msg="StartContainer for \"36bdfc00b0981943867749971b5f0921444042039478da3994a64e8893f433e0\" returns successfully" Apr 12 18:31:52.554903 env[1104]: time="2024-04-12T18:31:52.554799445Z" level=info msg="StartContainer for \"396faa45c6472137eeb1104d048b9fb6be3108f843b59ed4fd92b7477ef0b1d0\" returns successfully" Apr 12 18:31:52.908875 kubelet[1640]: I0412 18:31:52.908784 1640 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:31:53.431495 kubelet[1640]: E0412 18:31:53.431469 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:53.433144 kubelet[1640]: E0412 18:31:53.433112 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:53.434558 kubelet[1640]: E0412 18:31:53.434525 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:53.927000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.927000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40091a5620 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.927000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.927000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.927000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40031708c0 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.927000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.928000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.928000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40091a56b0 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.928000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.929000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.929000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40091a56e0 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.929000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.956000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.956000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=40070a85a0 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.956000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:53.956000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4003571770 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:31:53.956000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:31:53.993486 kubelet[1640]: E0412 18:31:53.993454 1640 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:31:54.090031 kubelet[1640]: I0412 18:31:54.089996 1640 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:31:54.396377 kubelet[1640]: I0412 18:31:54.396337 1640 apiserver.go:52] "Watching apiserver" Apr 12 18:31:54.400342 kubelet[1640]: I0412 18:31:54.400317 1640 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:31:54.431000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:54.431000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40005dcec0 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:31:54.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:54.431000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:31:54.431000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40004a66f0 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:31:54.431000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:54.439878 kubelet[1640]: E0412 18:31:54.439850 1640 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:54.440474 kubelet[1640]: E0412 18:31:54.440456 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:54.440638 kubelet[1640]: E0412 18:31:54.440623 1640 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-scheduler-localhost" Apr 12 18:31:54.440964 kubelet[1640]: E0412 18:31:54.440948 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:54.442087 kubelet[1640]: E0412 18:31:54.442067 1640 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" is forbidden: no PriorityClass with name system-node-critical was found" pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:54.442581 kubelet[1640]: E0412 18:31:54.442568 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:55.440831 kubelet[1640]: E0412 18:31:55.440798 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:56.438984 kubelet[1640]: E0412 18:31:56.438959 1640 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:56.831924 systemd[1]: Reloading. Apr 12 18:31:56.894556 /usr/lib/systemd/system-generators/torcx-generator[1939]: time="2024-04-12T18:31:56Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:31:56.894585 /usr/lib/systemd/system-generators/torcx-generator[1939]: time="2024-04-12T18:31:56Z" level=info msg="torcx already run" Apr 12 18:31:56.945184 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:31:56.945325 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:31:56.961031 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020863 kernel: kauditd_printk_skb: 621 callbacks suppressed Apr 12 18:31:57.020912 kernel: audit: type=1400 audit(1712946717.018:669): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.025433 kernel: audit: type=1400 audit(1712946717.018:670): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.027776 kernel: audit: type=1400 audit(1712946717.018:671): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.027832 kernel: audit: type=1400 audit(1712946717.018:672): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.032421 kernel: audit: type=1400 audit(1712946717.018:673): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.032477 kernel: audit: type=1400 audit(1712946717.018:674): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.035288 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:31:57.035351 kernel: audit: type=1400 audit(1712946717.018:675): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.037437 kernel: audit: audit_lost=22 audit_rate_limit=0 audit_backlog_limit=64 Apr 12 18:31:57.037522 kernel: audit: type=1400 audit(1712946717.018:676): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.019000 audit: BPF prog-id=88 op=LOAD Apr 12 18:31:57.019000 audit: BPF prog-id=84 op=UNLOAD Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.021000 audit: BPF prog-id=89 op=LOAD Apr 12 18:31:57.021000 audit: BPF prog-id=64 op=UNLOAD Apr 12 18:31:57.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.021000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.021000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.023000 audit: BPF prog-id=90 op=LOAD Apr 12 18:31:57.023000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.024000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit: BPF prog-id=91 op=LOAD Apr 12 18:31:57.026000 audit: BPF prog-id=72 op=UNLOAD Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.026000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit: BPF prog-id=92 op=LOAD Apr 12 18:31:57.028000 audit: BPF prog-id=76 op=UNLOAD Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.028000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.030000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.030000 audit: BPF prog-id=93 op=LOAD Apr 12 18:31:57.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit: BPF prog-id=95 op=LOAD Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.038000 audit: BPF prog-id=96 op=LOAD Apr 12 18:31:57.038000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:31:57.038000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.039000 audit: BPF prog-id=97 op=LOAD Apr 12 18:31:57.039000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit: BPF prog-id=98 op=LOAD Apr 12 18:31:57.040000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit: BPF prog-id=99 op=LOAD Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.040000 audit: BPF prog-id=100 op=LOAD Apr 12 18:31:57.040000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:31:57.040000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit: BPF prog-id=101 op=LOAD Apr 12 18:31:57.042000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.042000 audit: BPF prog-id=102 op=LOAD Apr 12 18:31:57.042000 audit: BPF prog-id=80 op=UNLOAD Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit: BPF prog-id=103 op=LOAD Apr 12 18:31:57.043000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit: BPF prog-id=104 op=LOAD Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.043000 audit: BPF prog-id=105 op=LOAD Apr 12 18:31:57.043000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:31:57.043000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit: BPF prog-id=106 op=LOAD Apr 12 18:31:57.044000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit: BPF prog-id=107 op=LOAD Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.044000 audit: BPF prog-id=108 op=LOAD Apr 12 18:31:57.044000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:31:57.044000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:31:57.059348 systemd[1]: Stopping kubelet.service... Apr 12 18:31:57.080955 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:31:57.081165 systemd[1]: Stopped kubelet.service. Apr 12 18:31:57.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:57.081000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:31:57.082872 systemd[1]: Started kubelet.service. Apr 12 18:31:57.148105 kubelet[1977]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:31:57.148105 kubelet[1977]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:31:57.148105 kubelet[1977]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:31:57.148443 kubelet[1977]: I0412 18:31:57.148152 1977 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:31:57.152241 kubelet[1977]: I0412 18:31:57.152213 1977 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Apr 12 18:31:57.152342 kubelet[1977]: I0412 18:31:57.152330 1977 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:31:57.152562 kubelet[1977]: I0412 18:31:57.152543 1977 server.go:895] "Client rotation is on, will bootstrap in background" Apr 12 18:31:57.154146 kubelet[1977]: I0412 18:31:57.154121 1977 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:31:57.155679 kubelet[1977]: I0412 18:31:57.155633 1977 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:31:57.159956 kubelet[1977]: W0412 18:31:57.159929 1977 machine.go:65] Cannot read vendor id correctly, set empty. Apr 12 18:31:57.160836 kubelet[1977]: I0412 18:31:57.160814 1977 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:31:57.161125 kubelet[1977]: I0412 18:31:57.161109 1977 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:31:57.161350 kubelet[1977]: I0412 18:31:57.161332 1977 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:31:57.161474 kubelet[1977]: I0412 18:31:57.161460 1977 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:31:57.161529 kubelet[1977]: I0412 18:31:57.161520 1977 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:31:57.161616 kubelet[1977]: I0412 18:31:57.161606 1977 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:31:57.161777 kubelet[1977]: I0412 18:31:57.161764 1977 kubelet.go:393] "Attempting to sync node with API server" Apr 12 18:31:57.161862 kubelet[1977]: I0412 18:31:57.161851 1977 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:31:57.161932 kubelet[1977]: I0412 18:31:57.161921 1977 kubelet.go:309] "Adding apiserver pod source" Apr 12 18:31:57.162014 kubelet[1977]: I0412 18:31:57.162003 1977 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:31:57.162804 kubelet[1977]: I0412 18:31:57.162782 1977 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:31:57.166821 kubelet[1977]: I0412 18:31:57.166797 1977 server.go:1232] "Started kubelet" Apr 12 18:31:57.167149 kubelet[1977]: I0412 18:31:57.167077 1977 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:31:57.167448 kubelet[1977]: E0412 18:31:57.167417 1977 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Apr 12 18:31:57.167448 kubelet[1977]: E0412 18:31:57.167444 1977 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:31:57.168855 kubelet[1977]: I0412 18:31:57.168823 1977 server.go:462] "Adding debug handlers to kubelet server" Apr 12 18:31:57.171000 audit[1977]: AVC avc: denied { mac_admin } for pid=1977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:57.171000 audit[1977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000560e40 a1=4000a4e210 a2=4000560e10 a3=25 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:57.171000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:57.171000 audit[1977]: AVC avc: denied { mac_admin } for pid=1977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.171000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:57.171000 audit[1977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40002f4c20 a1=4000a4e228 a2=4000560ed0 a3=25 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:57.171000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:57.173267 kubelet[1977]: I0412 18:31:57.172956 1977 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:31:57.173267 kubelet[1977]: I0412 18:31:57.172991 1977 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:31:57.173267 kubelet[1977]: I0412 18:31:57.173022 1977 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:31:57.173662 kubelet[1977]: I0412 18:31:57.167105 1977 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Apr 12 18:31:57.173893 kubelet[1977]: I0412 18:31:57.173875 1977 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:31:57.178024 kubelet[1977]: I0412 18:31:57.178002 1977 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:31:57.183602 kubelet[1977]: I0412 18:31:57.183575 1977 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:31:57.183795 kubelet[1977]: I0412 18:31:57.183778 1977 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:31:57.191774 kubelet[1977]: I0412 18:31:57.191739 1977 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:31:57.192636 kubelet[1977]: I0412 18:31:57.192597 1977 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:31:57.192636 kubelet[1977]: I0412 18:31:57.192623 1977 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:31:57.192736 kubelet[1977]: I0412 18:31:57.192648 1977 kubelet.go:2303] "Starting kubelet main sync loop" Apr 12 18:31:57.192736 kubelet[1977]: E0412 18:31:57.192710 1977 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:31:57.227869 kubelet[1977]: I0412 18:31:57.227842 1977 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:31:57.228035 kubelet[1977]: I0412 18:31:57.228021 1977 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:31:57.228102 kubelet[1977]: I0412 18:31:57.228093 1977 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:31:57.228286 kubelet[1977]: I0412 18:31:57.228273 1977 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:31:57.228363 kubelet[1977]: I0412 18:31:57.228352 1977 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:31:57.228414 kubelet[1977]: I0412 18:31:57.228405 1977 policy_none.go:49] "None policy: Start" Apr 12 18:31:57.229145 kubelet[1977]: I0412 18:31:57.229127 1977 memory_manager.go:169] "Starting memorymanager" policy="None" Apr 12 18:31:57.229236 kubelet[1977]: I0412 18:31:57.229225 1977 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:31:57.229408 kubelet[1977]: I0412 18:31:57.229394 1977 state_mem.go:75] "Updated machine memory state" Apr 12 18:31:57.233630 kubelet[1977]: I0412 18:31:57.233593 1977 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:31:57.231000 audit[1977]: AVC avc: denied { mac_admin } for pid=1977 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:31:57.231000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:31:57.231000 audit[1977]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40005617d0 a1=40012fc0f0 a2=40005617a0 a3=25 items=0 ppid=1 pid=1977 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:31:57.231000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:31:57.234870 kubelet[1977]: I0412 18:31:57.234736 1977 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:31:57.235143 kubelet[1977]: I0412 18:31:57.235109 1977 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:31:57.281743 kubelet[1977]: I0412 18:31:57.281704 1977 kubelet_node_status.go:70] "Attempting to register node" node="localhost" Apr 12 18:31:57.288879 kubelet[1977]: I0412 18:31:57.288840 1977 kubelet_node_status.go:108] "Node was previously registered" node="localhost" Apr 12 18:31:57.288980 kubelet[1977]: I0412 18:31:57.288933 1977 kubelet_node_status.go:73] "Successfully registered node" node="localhost" Apr 12 18:31:57.292906 kubelet[1977]: I0412 18:31:57.292875 1977 topology_manager.go:215] "Topology Admit Handler" podUID="fe07cdd1e042315302b90fb817f23bff" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:31:57.293045 kubelet[1977]: I0412 18:31:57.293027 1977 topology_manager.go:215] "Topology Admit Handler" podUID="7ea520b1e9b7ab03da4e0d60de4cd055" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:31:57.293218 kubelet[1977]: I0412 18:31:57.293200 1977 topology_manager.go:215] "Topology Admit Handler" podUID="7bb06e2cba933e89936d947f3ee7de1d" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:31:57.298792 kubelet[1977]: E0412 18:31:57.298753 1977 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:57.385438 kubelet[1977]: I0412 18:31:57.385330 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:57.385438 kubelet[1977]: I0412 18:31:57.385377 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:57.385438 kubelet[1977]: I0412 18:31:57.385412 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/fe07cdd1e042315302b90fb817f23bff-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"fe07cdd1e042315302b90fb817f23bff\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:57.385438 kubelet[1977]: I0412 18:31:57.385432 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:57.385438 kubelet[1977]: I0412 18:31:57.385453 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:57.385657 kubelet[1977]: I0412 18:31:57.385504 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:57.385657 kubelet[1977]: I0412 18:31:57.385544 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:57.385657 kubelet[1977]: I0412 18:31:57.385566 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7ea520b1e9b7ab03da4e0d60de4cd055-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"7ea520b1e9b7ab03da4e0d60de4cd055\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:31:57.385657 kubelet[1977]: I0412 18:31:57.385587 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/7bb06e2cba933e89936d947f3ee7de1d-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"7bb06e2cba933e89936d947f3ee7de1d\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:31:57.479000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521021 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:31:57.479000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000f1d200 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:31:57.479000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:31:57.600109 kubelet[1977]: E0412 18:31:57.600063 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:57.600621 kubelet[1977]: E0412 18:31:57.600600 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:57.600851 kubelet[1977]: E0412 18:31:57.600829 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:58.162650 kubelet[1977]: I0412 18:31:58.162607 1977 apiserver.go:52] "Watching apiserver" Apr 12 18:31:58.184476 kubelet[1977]: I0412 18:31:58.184435 1977 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:31:58.203187 kubelet[1977]: E0412 18:31:58.203145 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:58.203658 kubelet[1977]: E0412 18:31:58.203636 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:58.209034 kubelet[1977]: E0412 18:31:58.208998 1977 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:31:58.209493 kubelet[1977]: E0412 18:31:58.209451 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:31:58.262191 kubelet[1977]: I0412 18:31:58.262148 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=3.262077566 podCreationTimestamp="2024-04-12 18:31:55 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:31:58.244221438 +0000 UTC m=+1.155670358" watchObservedRunningTime="2024-04-12 18:31:58.262077566 +0000 UTC m=+1.173526486" Apr 12 18:31:58.262321 kubelet[1977]: I0412 18:31:58.262255 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.262239385 podCreationTimestamp="2024-04-12 18:31:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:31:58.262069885 +0000 UTC m=+1.173518805" watchObservedRunningTime="2024-04-12 18:31:58.262239385 +0000 UTC m=+1.173688305" Apr 12 18:31:58.269652 kubelet[1977]: I0412 18:31:58.269613 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=1.269580843 podCreationTimestamp="2024-04-12 18:31:57 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:31:58.269169555 +0000 UTC m=+1.180618475" watchObservedRunningTime="2024-04-12 18:31:58.269580843 +0000 UTC m=+1.181029763" Apr 12 18:31:59.204511 kubelet[1977]: E0412 18:31:59.204472 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:00.488900 kubelet[1977]: E0412 18:32:00.488862 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:01.908687 sudo[1232]: pam_unix(sudo:session): session closed for user root Apr 12 18:32:01.907000 audit[1232]: USER_END pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:01.907000 audit[1232]: CRED_DISP pid=1232 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:32:01.910168 sshd[1228]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:01.909000 audit[1228]: USER_END pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:01.909000 audit[1228]: CRED_DISP pid=1228 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:01.912929 systemd[1]: sshd@6-10.0.0.89:22-10.0.0.1:49438.service: Deactivated successfully. Apr 12 18:32:01.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.89:22-10.0.0.1:49438 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:01.913644 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:32:01.913831 systemd[1]: session-7.scope: Consumed 7.108s CPU time. Apr 12 18:32:01.914213 systemd-logind[1087]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:32:01.914992 systemd-logind[1087]: Removed session 7. Apr 12 18:32:02.772149 kubelet[1977]: E0412 18:32:02.772118 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:03.209471 kubelet[1977]: E0412 18:32:03.209442 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:04.172483 kubelet[1977]: E0412 18:32:04.172453 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:04.211381 kubelet[1977]: E0412 18:32:04.211356 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:10.021000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.023197 kernel: kauditd_printk_skb: 278 callbacks suppressed Apr 12 18:32:10.023268 kernel: audit: type=1400 audit(1712946730.021:913): avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.021000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e99d80 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.030382 kernel: audit: type=1300 audit(1712946730.021:913): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e99d80 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.030438 kernel: audit: type=1327 audit(1712946730.021:913): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.024000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.037541 kernel: audit: type=1400 audit(1712946730.024:914): avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.037616 kernel: audit: type=1300 audit(1712946730.024:914): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e99f40 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.024000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e99f40 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.045271 kernel: audit: type=1327 audit(1712946730.024:914): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.045348 kernel: audit: type=1400 audit(1712946730.025:915): avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.025000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.025000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f4a060 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.052105 kernel: audit: type=1300 audit(1712946730.025:915): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f4a060 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.052174 kernel: audit: type=1327 audit(1712946730.025:915): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.025000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.026000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.058455 kernel: audit: type=1400 audit(1712946730.026:916): avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:10.026000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40000fe420 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:10.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:10.265870 kubelet[1977]: I0412 18:32:10.265840 1977 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:32:10.266237 env[1104]: time="2024-04-12T18:32:10.266197895Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:32:10.266454 kubelet[1977]: I0412 18:32:10.266377 1977 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:32:10.497054 kubelet[1977]: E0412 18:32:10.497017 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:10.991134 update_engine[1090]: I0412 18:32:10.991080 1090 update_attempter.cc:509] Updating boot flags... Apr 12 18:32:11.149204 kubelet[1977]: I0412 18:32:11.149160 1977 topology_manager.go:215] "Topology Admit Handler" podUID="216df5cc-489c-4c54-9ac8-2edb9dac1b01" podNamespace="kube-system" podName="kube-proxy-zfvnt" Apr 12 18:32:11.156147 systemd[1]: Created slice kubepods-besteffort-pod216df5cc_489c_4c54_9ac8_2edb9dac1b01.slice. Apr 12 18:32:11.177787 kubelet[1977]: I0412 18:32:11.177745 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/216df5cc-489c-4c54-9ac8-2edb9dac1b01-kube-proxy\") pod \"kube-proxy-zfvnt\" (UID: \"216df5cc-489c-4c54-9ac8-2edb9dac1b01\") " pod="kube-system/kube-proxy-zfvnt" Apr 12 18:32:11.177787 kubelet[1977]: I0412 18:32:11.177789 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/216df5cc-489c-4c54-9ac8-2edb9dac1b01-xtables-lock\") pod \"kube-proxy-zfvnt\" (UID: \"216df5cc-489c-4c54-9ac8-2edb9dac1b01\") " pod="kube-system/kube-proxy-zfvnt" Apr 12 18:32:11.177913 kubelet[1977]: I0412 18:32:11.177821 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/216df5cc-489c-4c54-9ac8-2edb9dac1b01-lib-modules\") pod \"kube-proxy-zfvnt\" (UID: \"216df5cc-489c-4c54-9ac8-2edb9dac1b01\") " pod="kube-system/kube-proxy-zfvnt" Apr 12 18:32:11.177913 kubelet[1977]: I0412 18:32:11.177843 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vgds9\" (UniqueName: \"kubernetes.io/projected/216df5cc-489c-4c54-9ac8-2edb9dac1b01-kube-api-access-vgds9\") pod \"kube-proxy-zfvnt\" (UID: \"216df5cc-489c-4c54-9ac8-2edb9dac1b01\") " pod="kube-system/kube-proxy-zfvnt" Apr 12 18:32:11.297578 kubelet[1977]: I0412 18:32:11.297527 1977 topology_manager.go:215] "Topology Admit Handler" podUID="7fbda85d-29fd-4128-ac3d-445786a6f704" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-sxt9p" Apr 12 18:32:11.308424 systemd[1]: Created slice kubepods-besteffort-pod7fbda85d_29fd_4128_ac3d_445786a6f704.slice. Apr 12 18:32:11.379575 kubelet[1977]: I0412 18:32:11.379536 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7qfxk\" (UniqueName: \"kubernetes.io/projected/7fbda85d-29fd-4128-ac3d-445786a6f704-kube-api-access-7qfxk\") pod \"tigera-operator-6bfc79cb9c-sxt9p\" (UID: \"7fbda85d-29fd-4128-ac3d-445786a6f704\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-sxt9p" Apr 12 18:32:11.379798 kubelet[1977]: I0412 18:32:11.379781 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7fbda85d-29fd-4128-ac3d-445786a6f704-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-sxt9p\" (UID: \"7fbda85d-29fd-4128-ac3d-445786a6f704\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-sxt9p" Apr 12 18:32:11.464188 kubelet[1977]: E0412 18:32:11.464161 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:11.464853 env[1104]: time="2024-04-12T18:32:11.464815138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zfvnt,Uid:216df5cc-489c-4c54-9ac8-2edb9dac1b01,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:11.477377 env[1104]: time="2024-04-12T18:32:11.477313902Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:11.477455 env[1104]: time="2024-04-12T18:32:11.477389666Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:11.477455 env[1104]: time="2024-04-12T18:32:11.477417308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:11.477686 env[1104]: time="2024-04-12T18:32:11.477646561Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419 pid=2088 runtime=io.containerd.runc.v2 Apr 12 18:32:11.494754 systemd[1]: Started cri-containerd-ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419.scope. Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.522000 audit: BPF prog-id=109 op=LOAD Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373435343366366531656134346134313864336363363731366535 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373435343366366531656134346134313864336363363731366535 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit: BPF prog-id=110 op=LOAD Apr 12 18:32:11.523000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373435343366366531656134346134313864336363363731366535 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit: BPF prog-id=111 op=LOAD Apr 12 18:32:11.523000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373435343366366531656134346134313864336363363731366535 Apr 12 18:32:11.523000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:32:11.523000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { perfmon } for pid=2097 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit[2097]: AVC avc: denied { bpf } for pid=2097 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.523000 audit: BPF prog-id=112 op=LOAD Apr 12 18:32:11.523000 audit[2097]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2088 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.523000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261373435343366366531656134346134313864336363363731366535 Apr 12 18:32:11.533718 env[1104]: time="2024-04-12T18:32:11.533302544Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-zfvnt,Uid:216df5cc-489c-4c54-9ac8-2edb9dac1b01,Namespace:kube-system,Attempt:0,} returns sandbox id \"ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419\"" Apr 12 18:32:11.533914 kubelet[1977]: E0412 18:32:11.533896 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:11.537104 env[1104]: time="2024-04-12T18:32:11.537031440Z" level=info msg="CreateContainer within sandbox \"ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:32:11.554131 env[1104]: time="2024-04-12T18:32:11.554026104Z" level=info msg="CreateContainer within sandbox \"ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d3dea2322bc256a566b719dfc70e056c05f106849b5608c55ee8afcaf56b63d3\"" Apr 12 18:32:11.556645 env[1104]: time="2024-04-12T18:32:11.555149889Z" level=info msg="StartContainer for \"d3dea2322bc256a566b719dfc70e056c05f106849b5608c55ee8afcaf56b63d3\"" Apr 12 18:32:11.569114 systemd[1]: Started cri-containerd-d3dea2322bc256a566b719dfc70e056c05f106849b5608c55ee8afcaf56b63d3.scope. Apr 12 18:32:11.612223 env[1104]: time="2024-04-12T18:32:11.612172271Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-sxt9p,Uid:7fbda85d-29fd-4128-ac3d-445786a6f704,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:32:11.624018 env[1104]: time="2024-04-12T18:32:11.623948513Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:11.624018 env[1104]: time="2024-04-12T18:32:11.624003636Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:11.624018 env[1104]: time="2024-04-12T18:32:11.624014677Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:11.625008 env[1104]: time="2024-04-12T18:32:11.624253130Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8c153c20448d0e3d77d17f30a077ad4da5423660a28b5de5c1a700108e6c2aa3 pid=2155 runtime=io.containerd.runc.v2 Apr 12 18:32:11.638851 systemd[1]: Started cri-containerd-8c153c20448d0e3d77d17f30a077ad4da5423660a28b5de5c1a700108e6c2aa3.scope. Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646561323332326263323536613536366237313964666337306530 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit: BPF prog-id=113 op=LOAD Apr 12 18:32:11.645000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646561323332326263323536613536366237313964666337306530 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit: BPF prog-id=114 op=LOAD Apr 12 18:32:11.645000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646561323332326263323536613536366237313964666337306530 Apr 12 18:32:11.645000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:32:11.645000 audit: BPF prog-id=113 op=UNLOAD Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { perfmon } for pid=2130 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit[2130]: AVC avc: denied { bpf } for pid=2130 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.645000 audit: BPF prog-id=115 op=LOAD Apr 12 18:32:11.645000 audit[2130]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2088 pid=2130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.645000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646561323332326263323536613536366237313964666337306530 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit: BPF prog-id=116 op=LOAD Apr 12 18:32:11.650000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.650000 audit[2166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2155 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.650000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313533633230343438643065336437376431376633306130373761 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2155 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313533633230343438643065336437376431376633306130373761 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.651000 audit: BPF prog-id=117 op=LOAD Apr 12 18:32:11.651000 audit[2166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2155 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313533633230343438643065336437376431376633306130373761 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit: BPF prog-id=118 op=LOAD Apr 12 18:32:11.652000 audit[2166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2155 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313533633230343438643065336437376431376633306130373761 Apr 12 18:32:11.652000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:32:11.652000 audit: BPF prog-id=117 op=UNLOAD Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { perfmon } for pid=2166 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit[2166]: AVC avc: denied { bpf } for pid=2166 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:11.652000 audit: BPF prog-id=119 op=LOAD Apr 12 18:32:11.652000 audit[2166]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2155 pid=2166 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3863313533633230343438643065336437376431376633306130373761 Apr 12 18:32:11.666347 env[1104]: time="2024-04-12T18:32:11.666303765Z" level=info msg="StartContainer for \"d3dea2322bc256a566b719dfc70e056c05f106849b5608c55ee8afcaf56b63d3\" returns successfully" Apr 12 18:32:11.678992 env[1104]: time="2024-04-12T18:32:11.678764447Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-sxt9p,Uid:7fbda85d-29fd-4128-ac3d-445786a6f704,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"8c153c20448d0e3d77d17f30a077ad4da5423660a28b5de5c1a700108e6c2aa3\"" Apr 12 18:32:11.684660 env[1104]: time="2024-04-12T18:32:11.682794680Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:32:11.775000 audit[2225]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2225 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.775000 audit[2225]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6c708e0 a2=0 a3=1 items=0 ppid=2141 pid=2225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:32:11.775000 audit[2226]: NETFILTER_CFG table=mangle:39 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.775000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd3b79430 a2=0 a3=1 items=0 ppid=2141 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.775000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:32:11.776000 audit[2227]: NETFILTER_CFG table=nat:40 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.776000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe9434650 a2=0 a3=1 items=0 ppid=2141 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.776000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:32:11.777000 audit[2228]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.777000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeab403c0 a2=0 a3=1 items=0 ppid=2141 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:32:11.779000 audit[2229]: NETFILTER_CFG table=filter:42 family=10 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.779000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe5aed000 a2=0 a3=1 items=0 ppid=2141 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.779000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:32:11.781000 audit[2230]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.781000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe10478c0 a2=0 a3=1 items=0 ppid=2141 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.781000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:32:11.877000 audit[2231]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2231 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.877000 audit[2231]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdaac0820 a2=0 a3=1 items=0 ppid=2141 pid=2231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.877000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:32:11.881000 audit[2233]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2233 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.881000 audit[2233]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffede178e0 a2=0 a3=1 items=0 ppid=2141 pid=2233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.881000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:32:11.884000 audit[2236]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.884000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc12d9060 a2=0 a3=1 items=0 ppid=2141 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.884000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:32:11.885000 audit[2237]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2237 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.885000 audit[2237]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffee06d410 a2=0 a3=1 items=0 ppid=2141 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.885000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:32:11.887000 audit[2239]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.887000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffeeb96880 a2=0 a3=1 items=0 ppid=2141 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.887000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:32:11.888000 audit[2240]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2240 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.888000 audit[2240]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcf6cdb0 a2=0 a3=1 items=0 ppid=2141 pid=2240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.888000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:32:11.890000 audit[2242]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2242 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.890000 audit[2242]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe4dde750 a2=0 a3=1 items=0 ppid=2141 pid=2242 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.890000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:32:11.893000 audit[2245]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.893000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff2229910 a2=0 a3=1 items=0 ppid=2141 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.893000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:32:11.894000 audit[2246]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2246 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.894000 audit[2246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc53f4c50 a2=0 a3=1 items=0 ppid=2141 pid=2246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.894000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:32:11.896000 audit[2248]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.896000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea950190 a2=0 a3=1 items=0 ppid=2141 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.896000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:32:11.897000 audit[2249]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.897000 audit[2249]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd04431e0 a2=0 a3=1 items=0 ppid=2141 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.897000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:32:11.900000 audit[2251]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.900000 audit[2251]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4471720 a2=0 a3=1 items=0 ppid=2141 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.900000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:32:11.903000 audit[2254]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.903000 audit[2254]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe4c405a0 a2=0 a3=1 items=0 ppid=2141 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.903000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:32:11.906000 audit[2257]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.906000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd38bb450 a2=0 a3=1 items=0 ppid=2141 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.906000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:32:11.907000 audit[2258]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2258 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.907000 audit[2258]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdf0400a0 a2=0 a3=1 items=0 ppid=2141 pid=2258 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.907000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:32:11.909000 audit[2260]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.909000 audit[2260]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdd07d610 a2=0 a3=1 items=0 ppid=2141 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.909000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:32:11.913000 audit[2263]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.913000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff243ff40 a2=0 a3=1 items=0 ppid=2141 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.913000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:32:11.914000 audit[2264]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2264 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.914000 audit[2264]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd618020 a2=0 a3=1 items=0 ppid=2141 pid=2264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.914000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:32:11.916000 audit[2266]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2266 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:32:11.916000 audit[2266]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffff43f2a50 a2=0 a3=1 items=0 ppid=2141 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:32:11.933000 audit[2272]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:11.933000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff3dd3a50 a2=0 a3=1 items=0 ppid=2141 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.933000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:11.947000 audit[2272]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:11.947000 audit[2272]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff3dd3a50 a2=0 a3=1 items=0 ppid=2141 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:11.949000 audit[2276]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.949000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc46b41d0 a2=0 a3=1 items=0 ppid=2141 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:32:11.951000 audit[2278]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.951000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe30dd370 a2=0 a3=1 items=0 ppid=2141 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:32:11.955000 audit[2281]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.955000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffee67db90 a2=0 a3=1 items=0 ppid=2141 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:32:11.956000 audit[2282]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.956000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe1c89bd0 a2=0 a3=1 items=0 ppid=2141 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.956000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:32:11.958000 audit[2284]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.958000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe7cf3260 a2=0 a3=1 items=0 ppid=2141 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.958000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:32:11.959000 audit[2285]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.959000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8e50310 a2=0 a3=1 items=0 ppid=2141 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:32:11.961000 audit[2287]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.961000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd407a780 a2=0 a3=1 items=0 ppid=2141 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.961000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:32:11.964000 audit[2290]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.964000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd566fd20 a2=0 a3=1 items=0 ppid=2141 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.964000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:32:11.966000 audit[2291]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.966000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffdd088f0 a2=0 a3=1 items=0 ppid=2141 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:32:11.968000 audit[2293]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.968000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffa9642f0 a2=0 a3=1 items=0 ppid=2141 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.968000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:32:11.969000 audit[2294]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.969000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdea28970 a2=0 a3=1 items=0 ppid=2141 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:32:11.971000 audit[2296]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.971000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc4338820 a2=0 a3=1 items=0 ppid=2141 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:32:11.974000 audit[2299]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.974000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffd3bb790 a2=0 a3=1 items=0 ppid=2141 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.974000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:32:11.977000 audit[2302]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.977000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffed38b350 a2=0 a3=1 items=0 ppid=2141 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.977000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:32:11.978000 audit[2303]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.978000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe13e3dc0 a2=0 a3=1 items=0 ppid=2141 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.978000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:32:11.980000 audit[2305]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.980000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=fffff5f42cc0 a2=0 a3=1 items=0 ppid=2141 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.980000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:32:11.983000 audit[2308]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.983000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffecf631e0 a2=0 a3=1 items=0 ppid=2141 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:32:11.984000 audit[2309]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.984000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa2059e0 a2=0 a3=1 items=0 ppid=2141 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.984000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:32:11.986000 audit[2311]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.986000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffea3aae50 a2=0 a3=1 items=0 ppid=2141 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.986000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:32:11.987000 audit[2312]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.987000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc30eca80 a2=0 a3=1 items=0 ppid=2141 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:32:11.990000 audit[2314]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.990000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc29fefc0 a2=0 a3=1 items=0 ppid=2141 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.990000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:32:11.994000 audit[2317]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:32:11.994000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc85624e0 a2=0 a3=1 items=0 ppid=2141 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.994000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:32:11.996000 audit[2319]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:32:11.996000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffcd9617b0 a2=0 a3=1 items=0 ppid=2141 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.996000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:11.997000 audit[2319]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:32:11.997000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffcd9617b0 a2=0 a3=1 items=0 ppid=2141 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:11.997000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:12.225709 kubelet[1977]: E0412 18:32:12.225294 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:12.293385 systemd[1]: run-containerd-runc-k8s.io-ba74543f6e1ea44a418d3cc6716e549cc8e6632f7d46098ba60d0e842ec82419-runc.JomXhz.mount: Deactivated successfully. Apr 12 18:32:13.060092 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2043239298.mount: Deactivated successfully. Apr 12 18:32:13.682277 env[1104]: time="2024-04-12T18:32:13.682222861Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:13.683552 env[1104]: time="2024-04-12T18:32:13.683528089Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:13.685061 env[1104]: time="2024-04-12T18:32:13.685032048Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:13.686988 env[1104]: time="2024-04-12T18:32:13.686963390Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:13.687507 env[1104]: time="2024-04-12T18:32:13.687454095Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:32:13.690315 env[1104]: time="2024-04-12T18:32:13.690273763Z" level=info msg="CreateContainer within sandbox \"8c153c20448d0e3d77d17f30a077ad4da5423660a28b5de5c1a700108e6c2aa3\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:32:13.700184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3555850896.mount: Deactivated successfully. Apr 12 18:32:13.704054 env[1104]: time="2024-04-12T18:32:13.704001323Z" level=info msg="CreateContainer within sandbox \"8c153c20448d0e3d77d17f30a077ad4da5423660a28b5de5c1a700108e6c2aa3\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"8809b55e49d4b9260cab88c2c30e143d724aaed26bc56d203792df52a3db2d47\"" Apr 12 18:32:13.706138 env[1104]: time="2024-04-12T18:32:13.704598635Z" level=info msg="StartContainer for \"8809b55e49d4b9260cab88c2c30e143d724aaed26bc56d203792df52a3db2d47\"" Apr 12 18:32:13.721535 systemd[1]: Started cri-containerd-8809b55e49d4b9260cab88c2c30e143d724aaed26bc56d203792df52a3db2d47.scope. Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.743000 audit: BPF prog-id=120 op=LOAD Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2155 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:13.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303962353565343964346239323630636162383863326333306531 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2155 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:13.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303962353565343964346239323630636162383863326333306531 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit: BPF prog-id=121 op=LOAD Apr 12 18:32:13.744000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2155 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:13.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303962353565343964346239323630636162383863326333306531 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit: BPF prog-id=122 op=LOAD Apr 12 18:32:13.744000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2155 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:13.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303962353565343964346239323630636162383863326333306531 Apr 12 18:32:13.744000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:32:13.744000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { perfmon } for pid=2327 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit[2327]: AVC avc: denied { bpf } for pid=2327 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:13.744000 audit: BPF prog-id=123 op=LOAD Apr 12 18:32:13.744000 audit[2327]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2155 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:13.744000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3838303962353565343964346239323630636162383863326333306531 Apr 12 18:32:13.762270 env[1104]: time="2024-04-12T18:32:13.762219498Z" level=info msg="StartContainer for \"8809b55e49d4b9260cab88c2c30e143d724aaed26bc56d203792df52a3db2d47\" returns successfully" Apr 12 18:32:14.237189 kubelet[1977]: I0412 18:32:14.237151 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-zfvnt" podStartSLOduration=3.23711619 podCreationTimestamp="2024-04-12 18:32:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:32:12.233351066 +0000 UTC m=+15.144799986" watchObservedRunningTime="2024-04-12 18:32:14.23711619 +0000 UTC m=+17.148565110" Apr 12 18:32:14.237569 kubelet[1977]: I0412 18:32:14.237240 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-sxt9p" podStartSLOduration=1.230818282 podCreationTimestamp="2024-04-12 18:32:11 +0000 UTC" firstStartedPulling="2024-04-12 18:32:11.681484244 +0000 UTC m=+14.592933164" lastFinishedPulling="2024-04-12 18:32:13.687889358 +0000 UTC m=+16.599338278" observedRunningTime="2024-04-12 18:32:14.236966903 +0000 UTC m=+17.148415823" watchObservedRunningTime="2024-04-12 18:32:14.237223396 +0000 UTC m=+17.148672316" Apr 12 18:32:16.175000 audit[2359]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.178018 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 18:32:16.178112 kernel: audit: type=1325 audit(1712946736.175:1028): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.175000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc4ca8830 a2=0 a3=1 items=0 ppid=2141 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.183015 kernel: audit: type=1300 audit(1712946736.175:1028): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc4ca8830 a2=0 a3=1 items=0 ppid=2141 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.183056 kernel: audit: type=1327 audit(1712946736.175:1028): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.175000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.176000 audit[2359]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.176000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc4ca8830 a2=0 a3=1 items=0 ppid=2141 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.190919 kernel: audit: type=1325 audit(1712946736.176:1029): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.190997 kernel: audit: type=1300 audit(1712946736.176:1029): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc4ca8830 a2=0 a3=1 items=0 ppid=2141 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.191018 kernel: audit: type=1327 audit(1712946736.176:1029): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.176000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.190000 audit[2361]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.190000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffebe96d00 a2=0 a3=1 items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.202936 kernel: audit: type=1325 audit(1712946736.190:1030): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.202980 kernel: audit: type=1300 audit(1712946736.190:1030): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffebe96d00 a2=0 a3=1 items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.202997 kernel: audit: type=1327 audit(1712946736.190:1030): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.196000 audit[2361]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.196000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffebe96d00 a2=0 a3=1 items=0 ppid=2141 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.221711 kernel: audit: type=1325 audit(1712946736.196:1031): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:16.196000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:16.303173 kubelet[1977]: I0412 18:32:16.303124 1977 topology_manager.go:215] "Topology Admit Handler" podUID="d448d154-77a2-4767-8388-3084ae723bdd" podNamespace="calico-system" podName="calico-typha-6756d88d84-njkfk" Apr 12 18:32:16.308260 systemd[1]: Created slice kubepods-besteffort-podd448d154_77a2_4767_8388_3084ae723bdd.slice. Apr 12 18:32:16.316439 kubelet[1977]: I0412 18:32:16.316403 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d448d154-77a2-4767-8388-3084ae723bdd-tigera-ca-bundle\") pod \"calico-typha-6756d88d84-njkfk\" (UID: \"d448d154-77a2-4767-8388-3084ae723bdd\") " pod="calico-system/calico-typha-6756d88d84-njkfk" Apr 12 18:32:16.316439 kubelet[1977]: I0412 18:32:16.316445 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4b8k8\" (UniqueName: \"kubernetes.io/projected/d448d154-77a2-4767-8388-3084ae723bdd-kube-api-access-4b8k8\") pod \"calico-typha-6756d88d84-njkfk\" (UID: \"d448d154-77a2-4767-8388-3084ae723bdd\") " pod="calico-system/calico-typha-6756d88d84-njkfk" Apr 12 18:32:16.316439 kubelet[1977]: I0412 18:32:16.316466 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/d448d154-77a2-4767-8388-3084ae723bdd-typha-certs\") pod \"calico-typha-6756d88d84-njkfk\" (UID: \"d448d154-77a2-4767-8388-3084ae723bdd\") " pod="calico-system/calico-typha-6756d88d84-njkfk" Apr 12 18:32:16.364146 kubelet[1977]: I0412 18:32:16.364098 1977 topology_manager.go:215] "Topology Admit Handler" podUID="c85291fc-dca1-4c92-9b70-7a7b5a6ab199" podNamespace="calico-system" podName="calico-node-z4hbr" Apr 12 18:32:16.369838 systemd[1]: Created slice kubepods-besteffort-podc85291fc_dca1_4c92_9b70_7a7b5a6ab199.slice. Apr 12 18:32:16.417509 kubelet[1977]: I0412 18:32:16.417445 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-xtables-lock\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417509 kubelet[1977]: I0412 18:32:16.417494 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-policysync\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417509 kubelet[1977]: I0412 18:32:16.417514 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-tigera-ca-bundle\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417766 kubelet[1977]: I0412 18:32:16.417556 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-lib-modules\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417766 kubelet[1977]: I0412 18:32:16.417575 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-cni-bin-dir\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417766 kubelet[1977]: I0412 18:32:16.417593 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-cni-net-dir\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417766 kubelet[1977]: I0412 18:32:16.417613 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xwb28\" (UniqueName: \"kubernetes.io/projected/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-kube-api-access-xwb28\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417766 kubelet[1977]: I0412 18:32:16.417645 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-flexvol-driver-host\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417889 kubelet[1977]: I0412 18:32:16.417685 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-node-certs\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417889 kubelet[1977]: I0412 18:32:16.417740 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-var-run-calico\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417889 kubelet[1977]: I0412 18:32:16.417782 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-cni-log-dir\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.417889 kubelet[1977]: I0412 18:32:16.417873 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c85291fc-dca1-4c92-9b70-7a7b5a6ab199-var-lib-calico\") pod \"calico-node-z4hbr\" (UID: \"c85291fc-dca1-4c92-9b70-7a7b5a6ab199\") " pod="calico-system/calico-node-z4hbr" Apr 12 18:32:16.466469 kubelet[1977]: I0412 18:32:16.466365 1977 topology_manager.go:215] "Topology Admit Handler" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" podNamespace="calico-system" podName="csi-node-driver-nr57f" Apr 12 18:32:16.467330 kubelet[1977]: E0412 18:32:16.466609 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:16.518892 kubelet[1977]: I0412 18:32:16.518859 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/b1677d6a-ea95-438c-86be-ab5b4e76f6a3-varrun\") pod \"csi-node-driver-nr57f\" (UID: \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\") " pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:16.518892 kubelet[1977]: I0412 18:32:16.518901 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/b1677d6a-ea95-438c-86be-ab5b4e76f6a3-kubelet-dir\") pod \"csi-node-driver-nr57f\" (UID: \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\") " pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:16.519212 kubelet[1977]: I0412 18:32:16.519191 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bjhbq\" (UniqueName: \"kubernetes.io/projected/b1677d6a-ea95-438c-86be-ab5b4e76f6a3-kube-api-access-bjhbq\") pod \"csi-node-driver-nr57f\" (UID: \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\") " pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:16.519258 kubelet[1977]: I0412 18:32:16.519223 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/b1677d6a-ea95-438c-86be-ab5b4e76f6a3-registration-dir\") pod \"csi-node-driver-nr57f\" (UID: \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\") " pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:16.519258 kubelet[1977]: I0412 18:32:16.519251 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/b1677d6a-ea95-438c-86be-ab5b4e76f6a3-socket-dir\") pod \"csi-node-driver-nr57f\" (UID: \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\") " pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:16.519893 kubelet[1977]: E0412 18:32:16.519874 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.519893 kubelet[1977]: W0412 18:32:16.519892 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.520008 kubelet[1977]: E0412 18:32:16.519915 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.520994 kubelet[1977]: E0412 18:32:16.520980 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.521042 kubelet[1977]: W0412 18:32:16.520995 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.521042 kubelet[1977]: E0412 18:32:16.521016 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.521218 kubelet[1977]: E0412 18:32:16.521206 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.521218 kubelet[1977]: W0412 18:32:16.521218 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.521296 kubelet[1977]: E0412 18:32:16.521236 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.521663 kubelet[1977]: E0412 18:32:16.521638 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.521663 kubelet[1977]: W0412 18:32:16.521652 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.521782 kubelet[1977]: E0412 18:32:16.521701 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.521847 kubelet[1977]: E0412 18:32:16.521829 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.521847 kubelet[1977]: W0412 18:32:16.521842 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.521915 kubelet[1977]: E0412 18:32:16.521856 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.526543 kubelet[1977]: E0412 18:32:16.526524 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.526543 kubelet[1977]: W0412 18:32:16.526538 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.526636 kubelet[1977]: E0412 18:32:16.526567 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.534439 kubelet[1977]: E0412 18:32:16.534420 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.534548 kubelet[1977]: W0412 18:32:16.534532 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.534611 kubelet[1977]: E0412 18:32:16.534601 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.610982 kubelet[1977]: E0412 18:32:16.610938 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:16.611369 env[1104]: time="2024-04-12T18:32:16.611321898Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6756d88d84-njkfk,Uid:d448d154-77a2-4767-8388-3084ae723bdd,Namespace:calico-system,Attempt:0,}" Apr 12 18:32:16.619825 kubelet[1977]: E0412 18:32:16.619791 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.619825 kubelet[1977]: W0412 18:32:16.619819 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.619959 kubelet[1977]: E0412 18:32:16.619841 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.620076 kubelet[1977]: E0412 18:32:16.620057 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.620076 kubelet[1977]: W0412 18:32:16.620070 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.620129 kubelet[1977]: E0412 18:32:16.620085 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.622524 kubelet[1977]: E0412 18:32:16.622500 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.622524 kubelet[1977]: W0412 18:32:16.622525 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.622606 kubelet[1977]: E0412 18:32:16.622543 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.622784 kubelet[1977]: E0412 18:32:16.622762 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.622784 kubelet[1977]: W0412 18:32:16.622780 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.622881 kubelet[1977]: E0412 18:32:16.622868 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.622962 kubelet[1977]: E0412 18:32:16.622946 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.622962 kubelet[1977]: W0412 18:32:16.622959 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623051 kubelet[1977]: E0412 18:32:16.623035 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623118 kubelet[1977]: E0412 18:32:16.623102 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623118 kubelet[1977]: W0412 18:32:16.623112 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623169 kubelet[1977]: E0412 18:32:16.623125 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623293 kubelet[1977]: E0412 18:32:16.623278 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623293 kubelet[1977]: W0412 18:32:16.623291 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623373 kubelet[1977]: E0412 18:32:16.623301 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623451 kubelet[1977]: E0412 18:32:16.623436 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623451 kubelet[1977]: W0412 18:32:16.623449 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623505 kubelet[1977]: E0412 18:32:16.623464 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623658 kubelet[1977]: E0412 18:32:16.623643 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623658 kubelet[1977]: W0412 18:32:16.623655 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623743 kubelet[1977]: E0412 18:32:16.623673 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623840 kubelet[1977]: E0412 18:32:16.623824 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623840 kubelet[1977]: W0412 18:32:16.623836 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.623899 kubelet[1977]: E0412 18:32:16.623850 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.623994 kubelet[1977]: E0412 18:32:16.623980 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.623994 kubelet[1977]: W0412 18:32:16.623991 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624054 kubelet[1977]: E0412 18:32:16.624002 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624138 kubelet[1977]: E0412 18:32:16.624124 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624138 kubelet[1977]: W0412 18:32:16.624135 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624214 kubelet[1977]: E0412 18:32:16.624200 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624309 kubelet[1977]: E0412 18:32:16.624293 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624309 kubelet[1977]: W0412 18:32:16.624303 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624371 kubelet[1977]: E0412 18:32:16.624342 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624463 kubelet[1977]: E0412 18:32:16.624449 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624463 kubelet[1977]: W0412 18:32:16.624460 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624526 kubelet[1977]: E0412 18:32:16.624489 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624625 kubelet[1977]: E0412 18:32:16.624608 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624625 kubelet[1977]: W0412 18:32:16.624619 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624716 kubelet[1977]: E0412 18:32:16.624660 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624782 kubelet[1977]: E0412 18:32:16.624765 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624782 kubelet[1977]: W0412 18:32:16.624776 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.624850 kubelet[1977]: E0412 18:32:16.624791 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.624949 kubelet[1977]: E0412 18:32:16.624936 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.624949 kubelet[1977]: W0412 18:32:16.624946 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625050 kubelet[1977]: E0412 18:32:16.624960 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.625093 kubelet[1977]: E0412 18:32:16.625082 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.625093 kubelet[1977]: W0412 18:32:16.625090 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625139 kubelet[1977]: E0412 18:32:16.625107 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.625279 kubelet[1977]: E0412 18:32:16.625265 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.625279 kubelet[1977]: W0412 18:32:16.625276 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625340 kubelet[1977]: E0412 18:32:16.625289 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.625438 kubelet[1977]: E0412 18:32:16.625424 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.625438 kubelet[1977]: W0412 18:32:16.625434 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625501 kubelet[1977]: E0412 18:32:16.625453 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.625622 kubelet[1977]: E0412 18:32:16.625607 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.625622 kubelet[1977]: W0412 18:32:16.625619 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625711 kubelet[1977]: E0412 18:32:16.625634 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.625834 kubelet[1977]: E0412 18:32:16.625818 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.625834 kubelet[1977]: W0412 18:32:16.625830 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.625903 kubelet[1977]: E0412 18:32:16.625844 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.626003 kubelet[1977]: E0412 18:32:16.625989 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.626003 kubelet[1977]: W0412 18:32:16.626000 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.626063 kubelet[1977]: E0412 18:32:16.626011 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.626178 kubelet[1977]: E0412 18:32:16.626163 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.626178 kubelet[1977]: W0412 18:32:16.626175 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.626240 kubelet[1977]: E0412 18:32:16.626186 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.649888 kubelet[1977]: E0412 18:32:16.649856 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.649888 kubelet[1977]: W0412 18:32:16.649872 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.650027 kubelet[1977]: E0412 18:32:16.649895 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.650252 kubelet[1977]: E0412 18:32:16.650238 1977 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:32:16.650252 kubelet[1977]: W0412 18:32:16.650252 1977 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:32:16.650318 kubelet[1977]: E0412 18:32:16.650267 1977 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:32:16.670032 env[1104]: time="2024-04-12T18:32:16.669941046Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:16.670032 env[1104]: time="2024-04-12T18:32:16.670030930Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:16.670314 env[1104]: time="2024-04-12T18:32:16.670057731Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:16.670772 env[1104]: time="2024-04-12T18:32:16.670436428Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/eb07b73d1b1f8133e60412239b0edf6a5efb3d7ec951a4d77c04b2dc5ccaedda pid=2408 runtime=io.containerd.runc.v2 Apr 12 18:32:16.672563 kubelet[1977]: E0412 18:32:16.672538 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:16.673035 env[1104]: time="2024-04-12T18:32:16.672999785Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z4hbr,Uid:c85291fc-dca1-4c92-9b70-7a7b5a6ab199,Namespace:calico-system,Attempt:0,}" Apr 12 18:32:16.682786 systemd[1]: Started cri-containerd-eb07b73d1b1f8133e60412239b0edf6a5efb3d7ec951a4d77c04b2dc5ccaedda.scope. Apr 12 18:32:16.701061 env[1104]: time="2024-04-12T18:32:16.700973858Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:16.701061 env[1104]: time="2024-04-12T18:32:16.701027261Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:16.701061 env[1104]: time="2024-04-12T18:32:16.701037821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:16.701559 env[1104]: time="2024-04-12T18:32:16.701410518Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7 pid=2437 runtime=io.containerd.runc.v2 Apr 12 18:32:16.719021 systemd[1]: Started cri-containerd-0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7.scope. Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.729000 audit: BPF prog-id=124 op=LOAD Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562303762373364316231663831333365363034313232333962306564 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562303762373364316231663831333365363034313232333962306564 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit: BPF prog-id=125 op=LOAD Apr 12 18:32:16.731000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562303762373364316231663831333365363034313232333962306564 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit: BPF prog-id=126 op=LOAD Apr 12 18:32:16.731000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562303762373364316231663831333365363034313232333962306564 Apr 12 18:32:16.731000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:32:16.731000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { perfmon } for pid=2419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit[2419]: AVC avc: denied { bpf } for pid=2419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.731000 audit: BPF prog-id=127 op=LOAD Apr 12 18:32:16.731000 audit[2419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2408 pid=2419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.731000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562303762373364316231663831333365363034313232333962306564 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.741000 audit: BPF prog-id=128 op=LOAD Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343731353361373037386339616535653864383636383139663333 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343731353361373037386339616535653864383636383139663333 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit: BPF prog-id=129 op=LOAD Apr 12 18:32:16.742000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343731353361373037386339616535653864383636383139663333 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit: BPF prog-id=130 op=LOAD Apr 12 18:32:16.742000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343731353361373037386339616535653864383636383139663333 Apr 12 18:32:16.742000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:32:16.742000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { perfmon } for pid=2452 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit[2452]: AVC avc: denied { bpf } for pid=2452 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:16.742000 audit: BPF prog-id=131 op=LOAD Apr 12 18:32:16.742000 audit[2452]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=2452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:16.742000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036343731353361373037386339616535653864383636383139663333 Apr 12 18:32:16.760932 env[1104]: time="2024-04-12T18:32:16.760493687Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-z4hbr,Uid:c85291fc-dca1-4c92-9b70-7a7b5a6ab199,Namespace:calico-system,Attempt:0,} returns sandbox id \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\"" Apr 12 18:32:16.761472 kubelet[1977]: E0412 18:32:16.761281 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:16.762587 env[1104]: time="2024-04-12T18:32:16.762455537Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:32:16.762846 env[1104]: time="2024-04-12T18:32:16.762782272Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-6756d88d84-njkfk,Uid:d448d154-77a2-4767-8388-3084ae723bdd,Namespace:calico-system,Attempt:0,} returns sandbox id \"eb07b73d1b1f8133e60412239b0edf6a5efb3d7ec951a4d77c04b2dc5ccaedda\"" Apr 12 18:32:16.763368 kubelet[1977]: E0412 18:32:16.763228 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:17.222000 audit[2482]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:17.222000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe8061410 a2=0 a3=1 items=0 ppid=2141 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:17.223000 audit[2482]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2482 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:17.223000 audit[2482]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe8061410 a2=0 a3=1 items=0 ppid=2141 pid=2482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:17.789338 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2296397198.mount: Deactivated successfully. Apr 12 18:32:17.878975 env[1104]: time="2024-04-12T18:32:17.878926772Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:17.880508 env[1104]: time="2024-04-12T18:32:17.880449598Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:17.881979 env[1104]: time="2024-04-12T18:32:17.881946143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:17.885318 env[1104]: time="2024-04-12T18:32:17.885282248Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:17.885773 env[1104]: time="2024-04-12T18:32:17.885741028Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:32:17.888206 env[1104]: time="2024-04-12T18:32:17.888176614Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:32:17.889163 env[1104]: time="2024-04-12T18:32:17.889127136Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:32:17.899391 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount113660724.mount: Deactivated successfully. Apr 12 18:32:17.902713 env[1104]: time="2024-04-12T18:32:17.902638163Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799\"" Apr 12 18:32:17.903159 env[1104]: time="2024-04-12T18:32:17.903132345Z" level=info msg="StartContainer for \"ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799\"" Apr 12 18:32:17.917355 systemd[1]: Started cri-containerd-ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799.scope. Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333539373931633463323234646565636431643138303566343935 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit: BPF prog-id=132 op=LOAD Apr 12 18:32:17.948000 audit[2490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333539373931633463323234646565636431643138303566343935 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit: BPF prog-id=133 op=LOAD Apr 12 18:32:17.948000 audit[2490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333539373931633463323234646565636431643138303566343935 Apr 12 18:32:17.948000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:32:17.948000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { perfmon } for pid=2490 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit[2490]: AVC avc: denied { bpf } for pid=2490 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:17.948000 audit: BPF prog-id=134 op=LOAD Apr 12 18:32:17.948000 audit[2490]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:17.948000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563333539373931633463323234646565636431643138303566343935 Apr 12 18:32:17.962014 env[1104]: time="2024-04-12T18:32:17.961971623Z" level=info msg="StartContainer for \"ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799\" returns successfully" Apr 12 18:32:17.975591 systemd[1]: cri-containerd-ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799.scope: Deactivated successfully. Apr 12 18:32:17.979000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:32:18.018129 env[1104]: time="2024-04-12T18:32:18.018071871Z" level=info msg="shim disconnected" id=ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799 Apr 12 18:32:18.018129 env[1104]: time="2024-04-12T18:32:18.018121953Z" level=warning msg="cleaning up after shim disconnected" id=ec359791c4c224deecd1d1805f495b30d2bcc858145bd2334b0065a3177d1799 namespace=k8s.io Apr 12 18:32:18.018129 env[1104]: time="2024-04-12T18:32:18.018131794Z" level=info msg="cleaning up dead shim" Apr 12 18:32:18.025093 env[1104]: time="2024-04-12T18:32:18.025061282Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:32:18Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2528 runtime=io.containerd.runc.v2\n" Apr 12 18:32:18.193801 kubelet[1977]: E0412 18:32:18.193651 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:18.238826 kubelet[1977]: E0412 18:32:18.238781 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:18.821153 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1498753715.mount: Deactivated successfully. Apr 12 18:32:19.691823 env[1104]: time="2024-04-12T18:32:19.691776069Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:19.693337 env[1104]: time="2024-04-12T18:32:19.693298449Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:19.694942 env[1104]: time="2024-04-12T18:32:19.694910353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:19.696113 env[1104]: time="2024-04-12T18:32:19.696078240Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:19.696717 env[1104]: time="2024-04-12T18:32:19.696690144Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:32:19.697734 env[1104]: time="2024-04-12T18:32:19.697707025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:32:19.707842 env[1104]: time="2024-04-12T18:32:19.707802666Z" level=info msg="CreateContainer within sandbox \"eb07b73d1b1f8133e60412239b0edf6a5efb3d7ec951a4d77c04b2dc5ccaedda\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:32:19.718683 env[1104]: time="2024-04-12T18:32:19.718633937Z" level=info msg="CreateContainer within sandbox \"eb07b73d1b1f8133e60412239b0edf6a5efb3d7ec951a4d77c04b2dc5ccaedda\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"663ee81793ff801a66c2610b714cc13d5a45c7e26f2abeb9ecde2ad5fd4ed601\"" Apr 12 18:32:19.719103 env[1104]: time="2024-04-12T18:32:19.719070875Z" level=info msg="StartContainer for \"663ee81793ff801a66c2610b714cc13d5a45c7e26f2abeb9ecde2ad5fd4ed601\"" Apr 12 18:32:19.734340 systemd[1]: Started cri-containerd-663ee81793ff801a66c2610b714cc13d5a45c7e26f2abeb9ecde2ad5fd4ed601.scope. Apr 12 18:32:19.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.780000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit: BPF prog-id=135 op=LOAD Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2408 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:19.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336565383137393366663830316136366332363130623731346363 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2408 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:19.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336565383137393366663830316136366332363130623731346363 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit: BPF prog-id=136 op=LOAD Apr 12 18:32:19.781000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2408 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:19.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336565383137393366663830316136366332363130623731346363 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit: BPF prog-id=137 op=LOAD Apr 12 18:32:19.781000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2408 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:19.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336565383137393366663830316136366332363130623731346363 Apr 12 18:32:19.781000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:32:19.781000 audit: BPF prog-id=136 op=UNLOAD Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { perfmon } for pid=2555 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit[2555]: AVC avc: denied { bpf } for pid=2555 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:19.781000 audit: BPF prog-id=138 op=LOAD Apr 12 18:32:19.781000 audit[2555]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2408 pid=2555 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:19.781000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3636336565383137393366663830316136366332363130623731346363 Apr 12 18:32:19.804734 env[1104]: time="2024-04-12T18:32:19.804689562Z" level=info msg="StartContainer for \"663ee81793ff801a66c2610b714cc13d5a45c7e26f2abeb9ecde2ad5fd4ed601\" returns successfully" Apr 12 18:32:20.193751 kubelet[1977]: E0412 18:32:20.193706 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:20.243659 kubelet[1977]: E0412 18:32:20.243613 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:20.253352 kubelet[1977]: I0412 18:32:20.253304 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-6756d88d84-njkfk" podStartSLOduration=1.319843782 podCreationTimestamp="2024-04-12 18:32:16 +0000 UTC" firstStartedPulling="2024-04-12 18:32:16.763643791 +0000 UTC m=+19.675092671" lastFinishedPulling="2024-04-12 18:32:19.697069359 +0000 UTC m=+22.608518279" observedRunningTime="2024-04-12 18:32:20.252514681 +0000 UTC m=+23.163963601" watchObservedRunningTime="2024-04-12 18:32:20.25326939 +0000 UTC m=+23.164718310" Apr 12 18:32:20.813896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount918307223.mount: Deactivated successfully. Apr 12 18:32:21.245060 kubelet[1977]: I0412 18:32:21.244954 1977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:32:21.245813 kubelet[1977]: E0412 18:32:21.245797 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:22.193401 kubelet[1977]: E0412 18:32:22.193330 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:22.777975 env[1104]: time="2024-04-12T18:32:22.777929689Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:22.781014 env[1104]: time="2024-04-12T18:32:22.780980356Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:22.783582 env[1104]: time="2024-04-12T18:32:22.783545166Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:22.785267 env[1104]: time="2024-04-12T18:32:22.785237586Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:22.785981 env[1104]: time="2024-04-12T18:32:22.785951691Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:32:22.788273 env[1104]: time="2024-04-12T18:32:22.788226651Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:32:22.798987 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2408426593.mount: Deactivated successfully. Apr 12 18:32:22.804100 env[1104]: time="2024-04-12T18:32:22.804067446Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96\"" Apr 12 18:32:22.804735 env[1104]: time="2024-04-12T18:32:22.804709229Z" level=info msg="StartContainer for \"e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96\"" Apr 12 18:32:22.823859 systemd[1]: run-containerd-runc-k8s.io-e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96-runc.vVtDKS.mount: Deactivated successfully. Apr 12 18:32:22.825179 systemd[1]: Started cri-containerd-e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96.scope. Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862694 kernel: kauditd_printk_skb: 223 callbacks suppressed Apr 12 18:32:22.862748 kernel: audit: type=1400 audit(1712946742.861:1095): avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:22.868324 kernel: audit: type=1300 audit(1712946742.861:1095): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2437 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:22.868414 kernel: audit: type=1327 audit(1712946742.861:1095): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303463613861313439366134656138323762363638386230613761 Apr 12 18:32:22.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303463613861313439366134656138323762363638386230613761 Apr 12 18:32:22.871580 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.876758 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.876829 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.878901 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.881120 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.885633 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.888226 kernel: audit: type=1400 audit(1712946742.861:1096): avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.861000 audit: BPF prog-id=139 op=LOAD Apr 12 18:32:22.861000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2437 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:22.861000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303463613861313439366134656138323762363638386230613761 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.862000 audit: BPF prog-id=140 op=LOAD Apr 12 18:32:22.862000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2437 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:22.862000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303463613861313439366134656138323762363638386230613761 Apr 12 18:32:22.864000 audit: BPF prog-id=140 op=UNLOAD Apr 12 18:32:22.864000 audit: BPF prog-id=139 op=UNLOAD Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { perfmon } for pid=2596 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit[2596]: AVC avc: denied { bpf } for pid=2596 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:22.864000 audit: BPF prog-id=141 op=LOAD Apr 12 18:32:22.864000 audit[2596]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2437 pid=2596 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:22.864000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533303463613861313439366134656138323762363638386230613761 Apr 12 18:32:22.890122 env[1104]: time="2024-04-12T18:32:22.890079303Z" level=info msg="StartContainer for \"e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96\" returns successfully" Apr 12 18:32:23.250359 kubelet[1977]: E0412 18:32:23.250248 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:23.347958 env[1104]: time="2024-04-12T18:32:23.347888081Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:32:23.349635 systemd[1]: cri-containerd-e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96.scope: Deactivated successfully. Apr 12 18:32:23.354000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:32:23.357542 kubelet[1977]: I0412 18:32:23.357507 1977 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Apr 12 18:32:23.379711 kubelet[1977]: I0412 18:32:23.379410 1977 topology_manager.go:215] "Topology Admit Handler" podUID="f554b727-0400-454c-b147-27f8dea3f62b" podNamespace="kube-system" podName="coredns-5dd5756b68-ftzvh" Apr 12 18:32:23.387363 kubelet[1977]: I0412 18:32:23.386838 1977 topology_manager.go:215] "Topology Admit Handler" podUID="4dc3eb30-239a-4d91-bcac-915a1ba8b158" podNamespace="kube-system" podName="coredns-5dd5756b68-w8xs5" Apr 12 18:32:23.387363 kubelet[1977]: I0412 18:32:23.387011 1977 topology_manager.go:215] "Topology Admit Handler" podUID="e8aefbd7-2049-443e-9baa-8d91d587ae90" podNamespace="calico-system" podName="calico-kube-controllers-667cd57589-xfzc9" Apr 12 18:32:23.394694 systemd[1]: Created slice kubepods-burstable-podf554b727_0400_454c_b147_27f8dea3f62b.slice. Apr 12 18:32:23.395753 env[1104]: time="2024-04-12T18:32:23.395704612Z" level=info msg="shim disconnected" id=e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96 Apr 12 18:32:23.395753 env[1104]: time="2024-04-12T18:32:23.395748454Z" level=warning msg="cleaning up after shim disconnected" id=e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96 namespace=k8s.io Apr 12 18:32:23.395884 env[1104]: time="2024-04-12T18:32:23.395759694Z" level=info msg="cleaning up dead shim" Apr 12 18:32:23.398789 systemd[1]: Created slice kubepods-besteffort-pode8aefbd7_2049_443e_9baa_8d91d587ae90.slice. Apr 12 18:32:23.402791 systemd[1]: Created slice kubepods-burstable-pod4dc3eb30_239a_4d91_bcac_915a1ba8b158.slice. Apr 12 18:32:23.405423 env[1104]: time="2024-04-12T18:32:23.405378898Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:32:23Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2637 runtime=io.containerd.runc.v2\n" Apr 12 18:32:23.472990 kubelet[1977]: I0412 18:32:23.472938 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4jkxf\" (UniqueName: \"kubernetes.io/projected/4dc3eb30-239a-4d91-bcac-915a1ba8b158-kube-api-access-4jkxf\") pod \"coredns-5dd5756b68-w8xs5\" (UID: \"4dc3eb30-239a-4d91-bcac-915a1ba8b158\") " pod="kube-system/coredns-5dd5756b68-w8xs5" Apr 12 18:32:23.472990 kubelet[1977]: I0412 18:32:23.472994 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/f554b727-0400-454c-b147-27f8dea3f62b-config-volume\") pod \"coredns-5dd5756b68-ftzvh\" (UID: \"f554b727-0400-454c-b147-27f8dea3f62b\") " pod="kube-system/coredns-5dd5756b68-ftzvh" Apr 12 18:32:23.473184 kubelet[1977]: I0412 18:32:23.473018 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kkq7r\" (UniqueName: \"kubernetes.io/projected/f554b727-0400-454c-b147-27f8dea3f62b-kube-api-access-kkq7r\") pod \"coredns-5dd5756b68-ftzvh\" (UID: \"f554b727-0400-454c-b147-27f8dea3f62b\") " pod="kube-system/coredns-5dd5756b68-ftzvh" Apr 12 18:32:23.473184 kubelet[1977]: I0412 18:32:23.473055 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4dc3eb30-239a-4d91-bcac-915a1ba8b158-config-volume\") pod \"coredns-5dd5756b68-w8xs5\" (UID: \"4dc3eb30-239a-4d91-bcac-915a1ba8b158\") " pod="kube-system/coredns-5dd5756b68-w8xs5" Apr 12 18:32:23.473184 kubelet[1977]: I0412 18:32:23.473088 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/e8aefbd7-2049-443e-9baa-8d91d587ae90-tigera-ca-bundle\") pod \"calico-kube-controllers-667cd57589-xfzc9\" (UID: \"e8aefbd7-2049-443e-9baa-8d91d587ae90\") " pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" Apr 12 18:32:23.473184 kubelet[1977]: I0412 18:32:23.473183 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-nckp2\" (UniqueName: \"kubernetes.io/projected/e8aefbd7-2049-443e-9baa-8d91d587ae90-kube-api-access-nckp2\") pod \"calico-kube-controllers-667cd57589-xfzc9\" (UID: \"e8aefbd7-2049-443e-9baa-8d91d587ae90\") " pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" Apr 12 18:32:23.697487 kubelet[1977]: E0412 18:32:23.697439 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:23.698374 env[1104]: time="2024-04-12T18:32:23.698325049Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ftzvh,Uid:f554b727-0400-454c-b147-27f8dea3f62b,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:23.701603 env[1104]: time="2024-04-12T18:32:23.701566238Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-667cd57589-xfzc9,Uid:e8aefbd7-2049-443e-9baa-8d91d587ae90,Namespace:calico-system,Attempt:0,}" Apr 12 18:32:23.705004 kubelet[1977]: E0412 18:32:23.704979 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:23.706205 env[1104]: time="2024-04-12T18:32:23.706158153Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-w8xs5,Uid:4dc3eb30-239a-4d91-bcac-915a1ba8b158,Namespace:kube-system,Attempt:0,}" Apr 12 18:32:23.801837 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e304ca8a1496a4ea827b6688b0a7a388f2173b9ed938d744d230fe06a4a36d96-rootfs.mount: Deactivated successfully. Apr 12 18:32:23.938034 env[1104]: time="2024-04-12T18:32:23.937958963Z" level=error msg="Failed to destroy network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.940007 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067-shm.mount: Deactivated successfully. Apr 12 18:32:23.941001 env[1104]: time="2024-04-12T18:32:23.940951744Z" level=error msg="encountered an error cleaning up failed sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.941100 env[1104]: time="2024-04-12T18:32:23.941016266Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ftzvh,Uid:f554b727-0400-454c-b147-27f8dea3f62b,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.941636 kubelet[1977]: E0412 18:32:23.941604 1977 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.941762 kubelet[1977]: E0412 18:32:23.941678 1977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ftzvh" Apr 12 18:32:23.941762 kubelet[1977]: E0412 18:32:23.941701 1977 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-ftzvh" Apr 12 18:32:23.941762 kubelet[1977]: E0412 18:32:23.941757 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-ftzvh_kube-system(f554b727-0400-454c-b147-27f8dea3f62b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-ftzvh_kube-system(f554b727-0400-454c-b147-27f8dea3f62b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ftzvh" podUID="f554b727-0400-454c-b147-27f8dea3f62b" Apr 12 18:32:23.944696 env[1104]: time="2024-04-12T18:32:23.943145738Z" level=error msg="Failed to destroy network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.944696 env[1104]: time="2024-04-12T18:32:23.943467949Z" level=error msg="encountered an error cleaning up failed sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.944696 env[1104]: time="2024-04-12T18:32:23.943519511Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-w8xs5,Uid:4dc3eb30-239a-4d91-bcac-915a1ba8b158,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.944967 kubelet[1977]: E0412 18:32:23.943701 1977 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.944967 kubelet[1977]: E0412 18:32:23.943736 1977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-w8xs5" Apr 12 18:32:23.944967 kubelet[1977]: E0412 18:32:23.943788 1977 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-w8xs5" Apr 12 18:32:23.944705 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05-shm.mount: Deactivated successfully. Apr 12 18:32:23.945116 kubelet[1977]: E0412 18:32:23.943834 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-w8xs5_kube-system(4dc3eb30-239a-4d91-bcac-915a1ba8b158)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-w8xs5_kube-system(4dc3eb30-239a-4d91-bcac-915a1ba8b158)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-w8xs5" podUID="4dc3eb30-239a-4d91-bcac-915a1ba8b158" Apr 12 18:32:23.945380 env[1104]: time="2024-04-12T18:32:23.945287730Z" level=error msg="Failed to destroy network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.947205 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043-shm.mount: Deactivated successfully. Apr 12 18:32:23.948158 env[1104]: time="2024-04-12T18:32:23.948038423Z" level=error msg="encountered an error cleaning up failed sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.948158 env[1104]: time="2024-04-12T18:32:23.948107585Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-667cd57589-xfzc9,Uid:e8aefbd7-2049-443e-9baa-8d91d587ae90,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.949050 kubelet[1977]: E0412 18:32:23.948918 1977 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:23.949050 kubelet[1977]: E0412 18:32:23.948952 1977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" Apr 12 18:32:23.949050 kubelet[1977]: E0412 18:32:23.948968 1977 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" Apr 12 18:32:23.949203 kubelet[1977]: E0412 18:32:23.949014 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-667cd57589-xfzc9_calico-system(e8aefbd7-2049-443e-9baa-8d91d587ae90)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-667cd57589-xfzc9_calico-system(e8aefbd7-2049-443e-9baa-8d91d587ae90)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" podUID="e8aefbd7-2049-443e-9baa-8d91d587ae90" Apr 12 18:32:24.198099 systemd[1]: Created slice kubepods-besteffort-podb1677d6a_ea95_438c_86be_ab5b4e76f6a3.slice. Apr 12 18:32:24.200495 env[1104]: time="2024-04-12T18:32:24.200455309Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nr57f,Uid:b1677d6a-ea95-438c-86be-ab5b4e76f6a3,Namespace:calico-system,Attempt:0,}" Apr 12 18:32:24.248130 env[1104]: time="2024-04-12T18:32:24.248074972Z" level=error msg="Failed to destroy network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.248456 env[1104]: time="2024-04-12T18:32:24.248414303Z" level=error msg="encountered an error cleaning up failed sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.248512 env[1104]: time="2024-04-12T18:32:24.248472305Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nr57f,Uid:b1677d6a-ea95-438c-86be-ab5b4e76f6a3,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.249104 kubelet[1977]: E0412 18:32:24.248781 1977 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.249104 kubelet[1977]: E0412 18:32:24.248840 1977 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:24.249104 kubelet[1977]: E0412 18:32:24.248860 1977 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-nr57f" Apr 12 18:32:24.249269 kubelet[1977]: E0412 18:32:24.248919 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-nr57f_calico-system(b1677d6a-ea95-438c-86be-ab5b4e76f6a3)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-nr57f_calico-system(b1677d6a-ea95-438c-86be-ab5b4e76f6a3)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:24.253647 kubelet[1977]: I0412 18:32:24.253620 1977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:24.254429 env[1104]: time="2024-04-12T18:32:24.254396017Z" level=info msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" Apr 12 18:32:24.258116 kubelet[1977]: E0412 18:32:24.257782 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:24.259603 env[1104]: time="2024-04-12T18:32:24.259574025Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:32:24.261136 kubelet[1977]: I0412 18:32:24.260814 1977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:24.261705 env[1104]: time="2024-04-12T18:32:24.261627491Z" level=info msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" Apr 12 18:32:24.266335 kubelet[1977]: I0412 18:32:24.266302 1977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:24.266996 env[1104]: time="2024-04-12T18:32:24.266959024Z" level=info msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" Apr 12 18:32:24.267977 kubelet[1977]: I0412 18:32:24.267955 1977 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:24.269216 env[1104]: time="2024-04-12T18:32:24.269186136Z" level=info msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" Apr 12 18:32:24.299092 env[1104]: time="2024-04-12T18:32:24.299026863Z" level=error msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" failed" error="failed to destroy network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.299921 kubelet[1977]: E0412 18:32:24.299738 1977 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:24.299921 kubelet[1977]: E0412 18:32:24.299821 1977 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067"} Apr 12 18:32:24.299921 kubelet[1977]: E0412 18:32:24.299867 1977 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f554b727-0400-454c-b147-27f8dea3f62b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:32:24.299921 kubelet[1977]: E0412 18:32:24.299894 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f554b727-0400-454c-b147-27f8dea3f62b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-ftzvh" podUID="f554b727-0400-454c-b147-27f8dea3f62b" Apr 12 18:32:24.303561 env[1104]: time="2024-04-12T18:32:24.303499328Z" level=error msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" failed" error="failed to destroy network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.303945 kubelet[1977]: E0412 18:32:24.303822 1977 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:24.303945 kubelet[1977]: E0412 18:32:24.303864 1977 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05"} Apr 12 18:32:24.303945 kubelet[1977]: E0412 18:32:24.303896 1977 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4dc3eb30-239a-4d91-bcac-915a1ba8b158\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:32:24.303945 kubelet[1977]: E0412 18:32:24.303921 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4dc3eb30-239a-4d91-bcac-915a1ba8b158\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-w8xs5" podUID="4dc3eb30-239a-4d91-bcac-915a1ba8b158" Apr 12 18:32:24.307561 env[1104]: time="2024-04-12T18:32:24.307520618Z" level=error msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" failed" error="failed to destroy network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.308006 kubelet[1977]: E0412 18:32:24.307865 1977 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:24.308006 kubelet[1977]: E0412 18:32:24.307893 1977 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e"} Apr 12 18:32:24.308006 kubelet[1977]: E0412 18:32:24.307924 1977 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:32:24.308006 kubelet[1977]: E0412 18:32:24.307969 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"b1677d6a-ea95-438c-86be-ab5b4e76f6a3\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-nr57f" podUID="b1677d6a-ea95-438c-86be-ab5b4e76f6a3" Apr 12 18:32:24.310954 env[1104]: time="2024-04-12T18:32:24.310915368Z" level=error msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" failed" error="failed to destroy network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:32:24.311126 kubelet[1977]: E0412 18:32:24.311103 1977 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:24.311175 kubelet[1977]: E0412 18:32:24.311133 1977 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043"} Apr 12 18:32:24.311175 kubelet[1977]: E0412 18:32:24.311166 1977 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e8aefbd7-2049-443e-9baa-8d91d587ae90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:32:24.311345 kubelet[1977]: E0412 18:32:24.311192 1977 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e8aefbd7-2049-443e-9baa-8d91d587ae90\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" podUID="e8aefbd7-2049-443e-9baa-8d91d587ae90" Apr 12 18:32:24.797603 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e-shm.mount: Deactivated successfully. Apr 12 18:32:28.769241 systemd[1]: Started sshd@7-10.0.0.89:22-10.0.0.1:55192.service. Apr 12 18:32:28.768000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:55192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:28.773425 kernel: kauditd_printk_skb: 34 callbacks suppressed Apr 12 18:32:28.773498 kernel: audit: type=1130 audit(1712946748.768:1102): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:55192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:28.820000 audit[2901]: USER_ACCT pid=2901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.825042 sshd[2901]: Accepted publickey for core from 10.0.0.1 port 55192 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:28.825699 kernel: audit: type=1101 audit(1712946748.820:1103): pid=2901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.825000 audit[2901]: CRED_ACQ pid=2901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.831093 kernel: audit: type=1103 audit(1712946748.825:1104): pid=2901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.831147 kernel: audit: type=1006 audit(1712946748.828:1105): pid=2901 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=8 res=1 Apr 12 18:32:28.828000 audit[2901]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3d66080 a2=3 a3=1 items=0 ppid=1 pid=2901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:28.834604 kernel: audit: type=1300 audit(1712946748.828:1105): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3d66080 a2=3 a3=1 items=0 ppid=1 pid=2901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:28.834841 sshd[2901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:28.828000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:28.836097 kernel: audit: type=1327 audit(1712946748.828:1105): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:28.847424 systemd-logind[1087]: New session 8 of user core. Apr 12 18:32:28.848344 systemd[1]: Started session-8.scope. Apr 12 18:32:28.854000 audit[2901]: USER_START pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.858000 audit[2903]: CRED_ACQ pid=2903 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.862228 kernel: audit: type=1105 audit(1712946748.854:1106): pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.862289 kernel: audit: type=1103 audit(1712946748.858:1107): pid=2903 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.991913 sshd[2901]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:28.992000 audit[2901]: USER_END pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.995000 audit[2901]: CRED_DISP pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.999306 kernel: audit: type=1106 audit(1712946748.992:1108): pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:28.999366 kernel: audit: type=1104 audit(1712946748.995:1109): pid=2901 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:29.000831 systemd[1]: sshd@7-10.0.0.89:22-10.0.0.1:55192.service: Deactivated successfully. Apr 12 18:32:29.000000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.89:22-10.0.0.1:55192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:29.001585 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:32:29.002160 systemd-logind[1087]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:32:29.002836 systemd-logind[1087]: Removed session 8. Apr 12 18:32:29.495831 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1293756183.mount: Deactivated successfully. Apr 12 18:32:29.772350 env[1104]: time="2024-04-12T18:32:29.772242833Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:29.773592 env[1104]: time="2024-04-12T18:32:29.773537868Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:29.775337 env[1104]: time="2024-04-12T18:32:29.775298596Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:29.776521 env[1104]: time="2024-04-12T18:32:29.776491668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:29.777022 env[1104]: time="2024-04-12T18:32:29.776995482Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:32:29.788565 env[1104]: time="2024-04-12T18:32:29.788511513Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:32:29.799647 env[1104]: time="2024-04-12T18:32:29.799605813Z" level=info msg="CreateContainer within sandbox \"0647153a7078c9ae5e8d866819f33541dd1f740b2f0b7213d3986e617cdfe4d7\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc\"" Apr 12 18:32:29.800851 env[1104]: time="2024-04-12T18:32:29.800823166Z" level=info msg="StartContainer for \"6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc\"" Apr 12 18:32:29.818736 systemd[1]: Started cri-containerd-6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc.scope. Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2437 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:29.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663373332356663653566366266653233613234336632613864653233 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit: BPF prog-id=142 op=LOAD Apr 12 18:32:29.858000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2437 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:29.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663373332356663653566366266653233613234336632613864653233 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit: BPF prog-id=143 op=LOAD Apr 12 18:32:29.858000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2437 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:29.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663373332356663653566366266653233613234336632613864653233 Apr 12 18:32:29.858000 audit: BPF prog-id=143 op=UNLOAD Apr 12 18:32:29.858000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { perfmon } for pid=2924 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit[2924]: AVC avc: denied { bpf } for pid=2924 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:29.858000 audit: BPF prog-id=144 op=LOAD Apr 12 18:32:29.858000 audit[2924]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2437 pid=2924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:29.858000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663373332356663653566366266653233613234336632613864653233 Apr 12 18:32:29.875133 env[1104]: time="2024-04-12T18:32:29.875092735Z" level=info msg="StartContainer for \"6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc\" returns successfully" Apr 12 18:32:30.060679 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:32:30.060884 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:32:30.281732 kubelet[1977]: E0412 18:32:30.281696 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:31.283353 kubelet[1977]: E0412 18:32:31.283317 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:31.401000 audit[3106]: AVC avc: denied { write } for pid=3106 comm="tee" name="fd" dev="proc" ino=18071 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.401000 audit[3106]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd7a44980 a2=241 a3=1b6 items=1 ppid=3057 pid=3106 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.401000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:32:31.401000 audit: PATH item=0 name="/dev/fd/63" inode=19644 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.401000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.422000 audit[3114]: AVC avc: denied { write } for pid=3114 comm="tee" name="fd" dev="proc" ino=18970 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.422000 audit[3114]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff402f98f a2=241 a3=1b6 items=1 ppid=3062 pid=3114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.422000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:32:31.422000 audit: PATH item=0 name="/dev/fd/63" inode=19648 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.422000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.431000 audit[3125]: AVC avc: denied { write } for pid=3125 comm="tee" name="fd" dev="proc" ino=19660 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.431000 audit[3118]: AVC avc: denied { write } for pid=3118 comm="tee" name="fd" dev="proc" ino=17137 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.431000 audit[3118]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc181f98f a2=241 a3=1b6 items=1 ppid=3056 pid=3118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.431000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:32:31.431000 audit: PATH item=0 name="/dev/fd/63" inode=17131 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.431000 audit[3125]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc51c797f a2=241 a3=1b6 items=1 ppid=3070 pid=3125 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.431000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:32:31.431000 audit: PATH item=0 name="/dev/fd/63" inode=17134 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.431000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.432000 audit[3124]: AVC avc: denied { write } for pid=3124 comm="tee" name="fd" dev="proc" ino=17141 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.432000 audit[3124]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc92e398f a2=241 a3=1b6 items=1 ppid=3064 pid=3124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.432000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:32:31.432000 audit: PATH item=0 name="/dev/fd/63" inode=19654 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.432000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.439000 audit[3136]: AVC avc: denied { write } for pid=3136 comm="tee" name="fd" dev="proc" ino=19664 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.439000 audit[3136]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe9fce990 a2=241 a3=1b6 items=1 ppid=3066 pid=3136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.439000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:32:31.439000 audit: PATH item=0 name="/dev/fd/63" inode=18076 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.439000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.451000 audit[3134]: AVC avc: denied { write } for pid=3134 comm="tee" name="fd" dev="proc" ino=19669 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:32:31.451000 audit[3134]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd22e5991 a2=241 a3=1b6 items=1 ppid=3065 pid=3134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:31.451000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:32:31.451000 audit: PATH item=0 name="/dev/fd/63" inode=18974 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:32:31.451000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:32:31.496102 systemd[1]: run-containerd-runc-k8s.io-6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc-runc.fzrRWt.mount: Deactivated successfully. Apr 12 18:32:32.285600 kubelet[1977]: E0412 18:32:32.285563 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:32.299574 systemd[1]: run-containerd-runc-k8s.io-6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc-runc.fBP74h.mount: Deactivated successfully. Apr 12 18:32:33.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:33.996716 systemd[1]: Started sshd@8-10.0.0.89:22-10.0.0.1:50872.service. Apr 12 18:32:34.000308 kernel: kauditd_printk_skb: 79 callbacks suppressed Apr 12 18:32:34.000470 kernel: audit: type=1130 audit(1712946753.996:1124): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:34.039000 audit[3219]: USER_ACCT pid=3219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.042753 sshd[3219]: Accepted publickey for core from 10.0.0.1 port 50872 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:34.043704 kernel: audit: type=1101 audit(1712946754.039:1125): pid=3219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.043000 audit[3219]: CRED_ACQ pid=3219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.046855 sshd[3219]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:34.048469 kernel: audit: type=1103 audit(1712946754.043:1126): pid=3219 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.048525 kernel: audit: type=1006 audit(1712946754.043:1127): pid=3219 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:32:34.048548 kernel: audit: type=1300 audit(1712946754.043:1127): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff593a980 a2=3 a3=1 items=0 ppid=1 pid=3219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:34.043000 audit[3219]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff593a980 a2=3 a3=1 items=0 ppid=1 pid=3219 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:34.043000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:34.052584 kernel: audit: type=1327 audit(1712946754.043:1127): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:34.054297 systemd-logind[1087]: New session 9 of user core. Apr 12 18:32:34.054358 systemd[1]: Started session-9.scope. Apr 12 18:32:34.056000 audit[3219]: USER_START pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.058000 audit[3221]: CRED_ACQ pid=3221 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.063661 kernel: audit: type=1105 audit(1712946754.056:1128): pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.063738 kernel: audit: type=1103 audit(1712946754.058:1129): pid=3221 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.178645 sshd[3219]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:34.178000 audit[3219]: USER_END pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.178000 audit[3219]: CRED_DISP pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.183805 systemd-logind[1087]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:32:34.184037 systemd[1]: sshd@8-10.0.0.89:22-10.0.0.1:50872.service: Deactivated successfully. Apr 12 18:32:34.184801 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:32:34.185408 systemd-logind[1087]: Removed session 9. Apr 12 18:32:34.185779 kernel: audit: type=1106 audit(1712946754.178:1130): pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.185832 kernel: audit: type=1104 audit(1712946754.178:1131): pid=3219 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:34.182000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.89:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:37.194338 env[1104]: time="2024-04-12T18:32:37.194279613Z" level=info msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" Apr 12 18:32:37.195384 env[1104]: time="2024-04-12T18:32:37.194279573Z" level=info msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" Apr 12 18:32:37.301114 kubelet[1977]: I0412 18:32:37.300750 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-z4hbr" podStartSLOduration=8.284943905 podCreationTimestamp="2024-04-12 18:32:16 +0000 UTC" firstStartedPulling="2024-04-12 18:32:16.762206565 +0000 UTC m=+19.673655485" lastFinishedPulling="2024-04-12 18:32:29.777916227 +0000 UTC m=+32.689365147" observedRunningTime="2024-04-12 18:32:30.294558062 +0000 UTC m=+33.206006942" watchObservedRunningTime="2024-04-12 18:32:37.300653567 +0000 UTC m=+40.212102487" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.302 [INFO][3341] k8s.go 585: Cleaning up netns ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.303 [INFO][3341] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" iface="eth0" netns="/var/run/netns/cni-f83c3a8d-a7b9-d416-c2ed-10b1d5115f7e" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.303 [INFO][3341] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" iface="eth0" netns="/var/run/netns/cni-f83c3a8d-a7b9-d416-c2ed-10b1d5115f7e" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.303 [INFO][3341] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" iface="eth0" netns="/var/run/netns/cni-f83c3a8d-a7b9-d416-c2ed-10b1d5115f7e" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.303 [INFO][3341] k8s.go 592: Releasing IP address(es) ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.303 [INFO][3341] utils.go 188: Calico CNI releasing IP address ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.390 [INFO][3357] ipam_plugin.go 415: Releasing address using handleID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.394 [INFO][3357] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.394 [INFO][3357] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.404 [WARNING][3357] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.405 [INFO][3357] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.407 [INFO][3357] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:37.413484 env[1104]: 2024-04-12 18:32:37.408 [INFO][3341] k8s.go 598: Teardown processing complete. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:37.414803 env[1104]: time="2024-04-12T18:32:37.414760007Z" level=info msg="TearDown network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" successfully" Apr 12 18:32:37.414911 env[1104]: time="2024-04-12T18:32:37.414891410Z" level=info msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" returns successfully" Apr 12 18:32:37.415332 kubelet[1977]: E0412 18:32:37.415307 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:37.415327 systemd[1]: run-netns-cni\x2df83c3a8d\x2da7b9\x2dd416\x2dc2ed\x2d10b1d5115f7e.mount: Deactivated successfully. Apr 12 18:32:37.416769 env[1104]: time="2024-04-12T18:32:37.416740369Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ftzvh,Uid:f554b727-0400-454c-b147-27f8dea3f62b,Namespace:kube-system,Attempt:1,}" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.301 [INFO][3340] k8s.go 585: Cleaning up netns ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.302 [INFO][3340] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" iface="eth0" netns="/var/run/netns/cni-9a7a2707-19e6-3b3c-4ded-f19fae665bda" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.302 [INFO][3340] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" iface="eth0" netns="/var/run/netns/cni-9a7a2707-19e6-3b3c-4ded-f19fae665bda" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.302 [INFO][3340] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" iface="eth0" netns="/var/run/netns/cni-9a7a2707-19e6-3b3c-4ded-f19fae665bda" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.302 [INFO][3340] k8s.go 592: Releasing IP address(es) ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.302 [INFO][3340] utils.go 188: Calico CNI releasing IP address ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.390 [INFO][3358] ipam_plugin.go 415: Releasing address using handleID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.394 [INFO][3358] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.407 [INFO][3358] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.417 [WARNING][3358] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.417 [INFO][3358] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.419 [INFO][3358] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:37.422556 env[1104]: 2024-04-12 18:32:37.420 [INFO][3340] k8s.go 598: Teardown processing complete. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:37.423809 env[1104]: time="2024-04-12T18:32:37.423773040Z" level=info msg="TearDown network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" successfully" Apr 12 18:32:37.423899 env[1104]: time="2024-04-12T18:32:37.423882802Z" level=info msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" returns successfully" Apr 12 18:32:37.424247 systemd[1]: run-netns-cni\x2d9a7a2707\x2d19e6\x2d3b3c\x2d4ded\x2df19fae665bda.mount: Deactivated successfully. Apr 12 18:32:37.424712 env[1104]: time="2024-04-12T18:32:37.424567897Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-667cd57589-xfzc9,Uid:e8aefbd7-2049-443e-9baa-8d91d587ae90,Namespace:calico-system,Attempt:1,}" Apr 12 18:32:37.563148 systemd-networkd[1003]: calie302bce5366: Link UP Apr 12 18:32:37.565142 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:32:37.565357 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie302bce5366: link becomes ready Apr 12 18:32:37.565218 systemd-networkd[1003]: calie302bce5366: Gained carrier Apr 12 18:32:37.577881 systemd-networkd[1003]: calibdb86cc5711: Link UP Apr 12 18:32:37.579698 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibdb86cc5711: link becomes ready Apr 12 18:32:37.579951 systemd-networkd[1003]: calibdb86cc5711: Gained carrier Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.457 [INFO][3371] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.474 [INFO][3371] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--ftzvh-eth0 coredns-5dd5756b68- kube-system f554b727-0400-454c-b147-27f8dea3f62b 758 0 2024-04-12 18:32:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-ftzvh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie302bce5366 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.474 [INFO][3371] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.504 [INFO][3399] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" HandleID="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.519 [INFO][3399] ipam_plugin.go 268: Auto assigning IP ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" HandleID="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40005a25b0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-ftzvh", "timestamp":"2024-04-12 18:32:37.504663609 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.519 [INFO][3399] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.519 [INFO][3399] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.519 [INFO][3399] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.521 [INFO][3399] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.527 [INFO][3399] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.532 [INFO][3399] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.534 [INFO][3399] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.536 [INFO][3399] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.536 [INFO][3399] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.538 [INFO][3399] ipam.go 1682: Creating new handle: k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.541 [INFO][3399] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.545 [INFO][3399] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.546 [INFO][3399] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" host="localhost" Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.546 [INFO][3399] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:37.591778 env[1104]: 2024-04-12 18:32:37.546 [INFO][3399] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" HandleID="k8s-pod-network.5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.549 [INFO][3371] k8s.go 385: Populated endpoint ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ftzvh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f554b727-0400-454c-b147-27f8dea3f62b", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-ftzvh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie302bce5366", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.549 [INFO][3371] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.549 [INFO][3371] dataplane_linux.go 68: Setting the host side veth name to calie302bce5366 ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.565 [INFO][3371] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.565 [INFO][3371] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ftzvh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f554b727-0400-454c-b147-27f8dea3f62b", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c", Pod:"coredns-5dd5756b68-ftzvh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie302bce5366", MAC:"4e:04:64:4d:c1:22", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:37.592328 env[1104]: 2024-04-12 18:32:37.578 [INFO][3371] k8s.go 498: Wrote updated endpoint to datastore ContainerID="5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c" Namespace="kube-system" Pod="coredns-5dd5756b68-ftzvh" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.462 [INFO][3381] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.478 [INFO][3381] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0 calico-kube-controllers-667cd57589- calico-system e8aefbd7-2049-443e-9baa-8d91d587ae90 759 0 2024-04-12 18:32:16 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:667cd57589 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-667cd57589-xfzc9 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calibdb86cc5711 [] []}} ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.478 [INFO][3381] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.512 [INFO][3400] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" HandleID="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.527 [INFO][3400] ipam_plugin.go 268: Auto assigning IP ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" HandleID="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000d1350), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-667cd57589-xfzc9", "timestamp":"2024-04-12 18:32:37.512927346 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.527 [INFO][3400] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.546 [INFO][3400] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.546 [INFO][3400] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.548 [INFO][3400] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.552 [INFO][3400] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.556 [INFO][3400] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.559 [INFO][3400] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.562 [INFO][3400] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.562 [INFO][3400] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.565 [INFO][3400] ipam.go 1682: Creating new handle: k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.568 [INFO][3400] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.573 [INFO][3400] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.573 [INFO][3400] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" host="localhost" Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.573 [INFO][3400] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:37.593951 env[1104]: 2024-04-12 18:32:37.573 [INFO][3400] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" HandleID="k8s-pod-network.f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.575 [INFO][3381] k8s.go 385: Populated endpoint ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0", GenerateName:"calico-kube-controllers-667cd57589-", Namespace:"calico-system", SelfLink:"", UID:"e8aefbd7-2049-443e-9baa-8d91d587ae90", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"667cd57589", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-667cd57589-xfzc9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibdb86cc5711", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.575 [INFO][3381] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.575 [INFO][3381] dataplane_linux.go 68: Setting the host side veth name to calibdb86cc5711 ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.583 [INFO][3381] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.583 [INFO][3381] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0", GenerateName:"calico-kube-controllers-667cd57589-", Namespace:"calico-system", SelfLink:"", UID:"e8aefbd7-2049-443e-9baa-8d91d587ae90", ResourceVersion:"759", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"667cd57589", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a", Pod:"calico-kube-controllers-667cd57589-xfzc9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibdb86cc5711", MAC:"26:01:74:97:65:aa", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:37.594459 env[1104]: 2024-04-12 18:32:37.592 [INFO][3381] k8s.go 498: Wrote updated endpoint to datastore ContainerID="f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a" Namespace="calico-system" Pod="calico-kube-controllers-667cd57589-xfzc9" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:37.605999 env[1104]: time="2024-04-12T18:32:37.605932734Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:37.605999 env[1104]: time="2024-04-12T18:32:37.605974935Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:37.605999 env[1104]: time="2024-04-12T18:32:37.605985655Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:37.606441 env[1104]: time="2024-04-12T18:32:37.606276581Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c pid=3455 runtime=io.containerd.runc.v2 Apr 12 18:32:37.607988 env[1104]: time="2024-04-12T18:32:37.607928297Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:37.607988 env[1104]: time="2024-04-12T18:32:37.607962417Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:37.607988 env[1104]: time="2024-04-12T18:32:37.607972618Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:37.608752 env[1104]: time="2024-04-12T18:32:37.608093780Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a pid=3464 runtime=io.containerd.runc.v2 Apr 12 18:32:37.617296 systemd[1]: Started cri-containerd-5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c.scope. Apr 12 18:32:37.633001 systemd[1]: Started cri-containerd-f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a.scope. Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit: BPF prog-id=145 op=LOAD Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014fb38 a2=10 a3=0 items=0 ppid=3455 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563616365626130636337333965393833326632656237663964353664 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014f5a0 a2=3c a3=0 items=0 ppid=3455 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563616365626130636337333965393833326632656237663964353664 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit: BPF prog-id=146 op=LOAD Apr 12 18:32:37.658000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014f8e0 a2=78 a3=0 items=0 ppid=3455 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563616365626130636337333965393833326632656237663964353664 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.658000 audit: BPF prog-id=147 op=LOAD Apr 12 18:32:37.658000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014f670 a2=78 a3=0 items=0 ppid=3455 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.658000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563616365626130636337333965393833326632656237663964353664 Apr 12 18:32:37.659000 audit: BPF prog-id=147 op=UNLOAD Apr 12 18:32:37.659000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { perfmon } for pid=3477 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit: BPF prog-id=148 op=LOAD Apr 12 18:32:37.659000 audit[3477]: AVC avc: denied { bpf } for pid=3477 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit: BPF prog-id=149 op=LOAD Apr 12 18:32:37.659000 audit[3477]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014fb40 a2=78 a3=0 items=0 ppid=3455 pid=3477 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563616365626130636337333965393833326632656237663964353664 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3464 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376635353833326339333236653861346162643131326534363731 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3464 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376635353833326339333236653861346162643131326534363731 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit: BPF prog-id=150 op=LOAD Apr 12 18:32:37.659000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3464 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376635353833326339333236653861346162643131326534363731 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.659000 audit: BPF prog-id=151 op=LOAD Apr 12 18:32:37.659000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3464 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.659000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376635353833326339333236653861346162643131326534363731 Apr 12 18:32:37.660000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:32:37.660000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { perfmon } for pid=3481 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit[3481]: AVC avc: denied { bpf } for pid=3481 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.660000 audit: BPF prog-id=152 op=LOAD Apr 12 18:32:37.660000 audit[3481]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3464 pid=3481 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.660000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639376635353833326339333236653861346162643131326534363731 Apr 12 18:32:37.660395 systemd-resolved[1046]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:32:37.661710 systemd-resolved[1046]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:32:37.680132 env[1104]: time="2024-04-12T18:32:37.680078439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-667cd57589-xfzc9,Uid:e8aefbd7-2049-443e-9baa-8d91d587ae90,Namespace:calico-system,Attempt:1,} returns sandbox id \"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a\"" Apr 12 18:32:37.680132 env[1104]: time="2024-04-12T18:32:37.680125600Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-ftzvh,Uid:f554b727-0400-454c-b147-27f8dea3f62b,Namespace:kube-system,Attempt:1,} returns sandbox id \"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c\"" Apr 12 18:32:37.681887 kubelet[1977]: E0412 18:32:37.681864 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:37.685162 env[1104]: time="2024-04-12T18:32:37.684882862Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:32:37.686300 env[1104]: time="2024-04-12T18:32:37.686240251Z" level=info msg="CreateContainer within sandbox \"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:32:37.703436 env[1104]: time="2024-04-12T18:32:37.703388498Z" level=info msg="CreateContainer within sandbox \"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"8b71fc2eddf612186526511cf84663ae67ca12e3d4f444a735f6f3398d31a28b\"" Apr 12 18:32:37.703961 env[1104]: time="2024-04-12T18:32:37.703928109Z" level=info msg="StartContainer for \"8b71fc2eddf612186526511cf84663ae67ca12e3d4f444a735f6f3398d31a28b\"" Apr 12 18:32:37.718818 systemd[1]: Started cri-containerd-8b71fc2eddf612186526511cf84663ae67ca12e3d4f444a735f6f3398d31a28b.scope. Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.744000 audit: BPF prog-id=153 op=LOAD Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3455 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862373166633265646466363132313836353236353131636638343636 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3455 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862373166633265646466363132313836353236353131636638343636 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.747000 audit: BPF prog-id=154 op=LOAD Apr 12 18:32:37.747000 audit[3532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3455 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.747000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862373166633265646466363132313836353236353131636638343636 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.748000 audit: BPF prog-id=155 op=LOAD Apr 12 18:32:37.748000 audit[3532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3455 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.748000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862373166633265646466363132313836353236353131636638343636 Apr 12 18:32:37.748000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:32:37.748000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { perfmon } for pid=3532 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit[3532]: AVC avc: denied { bpf } for pid=3532 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:37.749000 audit: BPF prog-id=156 op=LOAD Apr 12 18:32:37.749000 audit[3532]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3455 pid=3532 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:37.749000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862373166633265646466363132313836353236353131636638343636 Apr 12 18:32:37.768776 env[1104]: time="2024-04-12T18:32:37.768725214Z" level=info msg="StartContainer for \"8b71fc2eddf612186526511cf84663ae67ca12e3d4f444a735f6f3398d31a28b\" returns successfully" Apr 12 18:32:38.194086 env[1104]: time="2024-04-12T18:32:38.194042886Z" level=info msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" Apr 12 18:32:38.202812 env[1104]: time="2024-04-12T18:32:38.195207351Z" level=info msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.264 [INFO][3619] k8s.go 585: Cleaning up netns ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.264 [INFO][3619] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" iface="eth0" netns="/var/run/netns/cni-c8fdd1cd-889e-3a07-d648-07a239a8bb1f" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.264 [INFO][3619] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" iface="eth0" netns="/var/run/netns/cni-c8fdd1cd-889e-3a07-d648-07a239a8bb1f" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.265 [INFO][3619] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" iface="eth0" netns="/var/run/netns/cni-c8fdd1cd-889e-3a07-d648-07a239a8bb1f" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.265 [INFO][3619] k8s.go 592: Releasing IP address(es) ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.265 [INFO][3619] utils.go 188: Calico CNI releasing IP address ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.283 [INFO][3633] ipam_plugin.go 415: Releasing address using handleID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.283 [INFO][3633] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.284 [INFO][3633] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.292 [WARNING][3633] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.292 [INFO][3633] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.294 [INFO][3633] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:38.298704 env[1104]: 2024-04-12 18:32:38.296 [INFO][3619] k8s.go 598: Teardown processing complete. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:38.298704 env[1104]: time="2024-04-12T18:32:38.298555946Z" level=info msg="TearDown network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" successfully" Apr 12 18:32:38.299203 env[1104]: time="2024-04-12T18:32:38.298754110Z" level=info msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" returns successfully" Apr 12 18:32:38.299232 kubelet[1977]: E0412 18:32:38.298953 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:38.299594 env[1104]: time="2024-04-12T18:32:38.299458725Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-w8xs5,Uid:4dc3eb30-239a-4d91-bcac-915a1ba8b158,Namespace:kube-system,Attempt:1,}" Apr 12 18:32:38.305611 kubelet[1977]: E0412 18:32:38.305464 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.265 [INFO][3620] k8s.go 585: Cleaning up netns ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.265 [INFO][3620] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" iface="eth0" netns="/var/run/netns/cni-021f655a-3121-8818-62fb-fd99e4e48494" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.266 [INFO][3620] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" iface="eth0" netns="/var/run/netns/cni-021f655a-3121-8818-62fb-fd99e4e48494" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.266 [INFO][3620] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" iface="eth0" netns="/var/run/netns/cni-021f655a-3121-8818-62fb-fd99e4e48494" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.266 [INFO][3620] k8s.go 592: Releasing IP address(es) ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.266 [INFO][3620] utils.go 188: Calico CNI releasing IP address ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.290 [INFO][3634] ipam_plugin.go 415: Releasing address using handleID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.290 [INFO][3634] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.294 [INFO][3634] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.303 [WARNING][3634] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.303 [INFO][3634] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.306 [INFO][3634] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:38.316870 env[1104]: 2024-04-12 18:32:38.310 [INFO][3620] k8s.go 598: Teardown processing complete. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:38.317704 kubelet[1977]: I0412 18:32:38.317191 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-ftzvh" podStartSLOduration=27.31698469 podCreationTimestamp="2024-04-12 18:32:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:32:38.313913346 +0000 UTC m=+41.225362226" watchObservedRunningTime="2024-04-12 18:32:38.31698469 +0000 UTC m=+41.228537812" Apr 12 18:32:38.318820 env[1104]: time="2024-04-12T18:32:38.318782408Z" level=info msg="TearDown network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" successfully" Apr 12 18:32:38.318940 env[1104]: time="2024-04-12T18:32:38.318917651Z" level=info msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" returns successfully" Apr 12 18:32:38.319681 env[1104]: time="2024-04-12T18:32:38.319630225Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nr57f,Uid:b1677d6a-ea95-438c-86be-ab5b4e76f6a3,Namespace:calico-system,Attempt:1,}" Apr 12 18:32:38.332000 audit[3660]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:38.332000 audit[3660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd8d72030 a2=0 a3=1 items=0 ppid=2141 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:38.334000 audit[3660]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3660 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:38.334000 audit[3660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd8d72030 a2=0 a3=1 items=0 ppid=2141 pid=3660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.334000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:38.357000 audit[3680]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:38.357000 audit[3680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd5020210 a2=0 a3=1 items=0 ppid=2141 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:38.358000 audit[3680]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3680 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:38.358000 audit[3680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffd5020210 a2=0 a3=1 items=0 ppid=2141 pid=3680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.358000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:38.422910 systemd[1]: run-netns-cni\x2d021f655a\x2d3121\x2d8818\x2d62fb\x2dfd99e4e48494.mount: Deactivated successfully. Apr 12 18:32:38.422994 systemd[1]: run-netns-cni\x2dc8fdd1cd\x2d889e\x2d3a07\x2dd648\x2d07a239a8bb1f.mount: Deactivated successfully. Apr 12 18:32:38.458302 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliab1938ecaec: link becomes ready Apr 12 18:32:38.456953 systemd-networkd[1003]: caliab1938ecaec: Link UP Apr 12 18:32:38.457156 systemd-networkd[1003]: caliab1938ecaec: Gained carrier Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.353 [INFO][3647] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.367 [INFO][3647] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--5dd5756b68--w8xs5-eth0 coredns-5dd5756b68- kube-system 4dc3eb30-239a-4d91-bcac-915a1ba8b158 780 0 2024-04-12 18:32:11 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-5dd5756b68-w8xs5 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliab1938ecaec [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.367 [INFO][3647] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.399 [INFO][3682] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" HandleID="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.420 [INFO][3682] ipam_plugin.go 268: Auto assigning IP ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" HandleID="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002fb550), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-5dd5756b68-w8xs5", "timestamp":"2024-04-12 18:32:38.399338008 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.420 [INFO][3682] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.420 [INFO][3682] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.420 [INFO][3682] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.425 [INFO][3682] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.429 [INFO][3682] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.433 [INFO][3682] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.436 [INFO][3682] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.438 [INFO][3682] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.438 [INFO][3682] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.440 [INFO][3682] ipam.go 1682: Creating new handle: k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1 Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.443 [INFO][3682] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.448 [INFO][3682] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.449 [INFO][3682] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" host="localhost" Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.449 [INFO][3682] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:38.470112 env[1104]: 2024-04-12 18:32:38.449 [INFO][3682] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" HandleID="k8s-pod-network.e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.451 [INFO][3647] k8s.go 385: Populated endpoint ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--w8xs5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4dc3eb30-239a-4d91-bcac-915a1ba8b158", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-5dd5756b68-w8xs5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab1938ecaec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.451 [INFO][3647] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.451 [INFO][3647] dataplane_linux.go 68: Setting the host side veth name to caliab1938ecaec ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.458 [INFO][3647] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.459 [INFO][3647] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--w8xs5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4dc3eb30-239a-4d91-bcac-915a1ba8b158", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1", Pod:"coredns-5dd5756b68-w8xs5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab1938ecaec", MAC:"02:13:eb:6c:82:47", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:38.470747 env[1104]: 2024-04-12 18:32:38.467 [INFO][3647] k8s.go 498: Wrote updated endpoint to datastore ContainerID="e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1" Namespace="kube-system" Pod="coredns-5dd5756b68-w8xs5" WorkloadEndpoint="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:38.485699 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia4c4f20a1d7: link becomes ready Apr 12 18:32:38.483573 systemd-networkd[1003]: calia4c4f20a1d7: Link UP Apr 12 18:32:38.484857 systemd-networkd[1003]: calia4c4f20a1d7: Gained carrier Apr 12 18:32:38.493444 env[1104]: time="2024-04-12T18:32:38.492895399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:38.493444 env[1104]: time="2024-04-12T18:32:38.492937280Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:38.493444 env[1104]: time="2024-04-12T18:32:38.492947200Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:38.493444 env[1104]: time="2024-04-12T18:32:38.493111603Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1 pid=3720 runtime=io.containerd.runc.v2 Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.356 [INFO][3662] utils.go 100: File /var/lib/calico/mtu does not exist Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.376 [INFO][3662] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--nr57f-eth0 csi-node-driver- calico-system b1677d6a-ea95-438c-86be-ab5b4e76f6a3 781 0 2024-04-12 18:32:16 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-nr57f eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia4c4f20a1d7 [] []}} ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.376 [INFO][3662] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.406 [INFO][3688] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" HandleID="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.425 [INFO][3688] ipam_plugin.go 268: Auto assigning IP ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" HandleID="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400056d5d0), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-nr57f", "timestamp":"2024-04-12 18:32:38.406344994 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.425 [INFO][3688] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.449 [INFO][3688] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.449 [INFO][3688] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.451 [INFO][3688] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.458 [INFO][3688] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.462 [INFO][3688] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.464 [INFO][3688] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.468 [INFO][3688] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.468 [INFO][3688] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.470 [INFO][3688] ipam.go 1682: Creating new handle: k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.473 [INFO][3688] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.478 [INFO][3688] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.478 [INFO][3688] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" host="localhost" Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.478 [INFO][3688] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:38.495412 env[1104]: 2024-04-12 18:32:38.478 [INFO][3688] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" HandleID="k8s-pod-network.7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.480 [INFO][3662] k8s.go 385: Populated endpoint ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nr57f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1677d6a-ea95-438c-86be-ab5b4e76f6a3", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-nr57f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4c4f20a1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.481 [INFO][3662] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.481 [INFO][3662] dataplane_linux.go 68: Setting the host side veth name to calia4c4f20a1d7 ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.485 [INFO][3662] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.485 [INFO][3662] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nr57f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1677d6a-ea95-438c-86be-ab5b4e76f6a3", ResourceVersion:"781", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e", Pod:"csi-node-driver-nr57f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4c4f20a1d7", MAC:"b2:6d:68:95:31:45", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:38.496132 env[1104]: 2024-04-12 18:32:38.493 [INFO][3662] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e" Namespace="calico-system" Pod="csi-node-driver-nr57f" WorkloadEndpoint="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:38.510959 systemd[1]: Started cri-containerd-e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1.scope. Apr 12 18:32:38.519150 env[1104]: time="2024-04-12T18:32:38.519063705Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:32:38.519150 env[1104]: time="2024-04-12T18:32:38.519117346Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:32:38.519443 env[1104]: time="2024-04-12T18:32:38.519128146Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:32:38.519443 env[1104]: time="2024-04-12T18:32:38.519324870Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e pid=3760 runtime=io.containerd.runc.v2 Apr 12 18:32:38.535509 systemd[1]: Started cri-containerd-7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e.scope. Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.545000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit: BPF prog-id=157 op=LOAD Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3720 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383762363537653462373762326565613535396138353162636634 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3720 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383762363537653462373762326565613535396138353162636634 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit: BPF prog-id=158 op=LOAD Apr 12 18:32:38.546000 audit[3737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3720 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383762363537653462373762326565613535396138353162636634 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit: BPF prog-id=159 op=LOAD Apr 12 18:32:38.546000 audit[3737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3720 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383762363537653462373762326565613535396138353162636634 Apr 12 18:32:38.546000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:32:38.546000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { perfmon } for pid=3737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit[3737]: AVC avc: denied { bpf } for pid=3737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.546000 audit: BPF prog-id=160 op=LOAD Apr 12 18:32:38.546000 audit[3737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3720 pid=3737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383762363537653462373762326565613535396138353162636634 Apr 12 18:32:38.548830 systemd-resolved[1046]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.565000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit: BPF prog-id=161 op=LOAD Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3760 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333162636439663433333839346363613738383066333039623431 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3760 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333162636439663433333839346363613738383066333039623431 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.566000 audit: BPF prog-id=162 op=LOAD Apr 12 18:32:38.566000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3760 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.566000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333162636439663433333839346363613738383066333039623431 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit: BPF prog-id=163 op=LOAD Apr 12 18:32:38.567000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3760 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333162636439663433333839346363613738383066333039623431 Apr 12 18:32:38.567000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:32:38.567000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { perfmon } for pid=3775 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit[3775]: AVC avc: denied { bpf } for pid=3775 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.567000 audit: BPF prog-id=164 op=LOAD Apr 12 18:32:38.567000 audit[3775]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3760 pid=3775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.567000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3737333162636439663433333839346363613738383066333039623431 Apr 12 18:32:38.569031 env[1104]: time="2024-04-12T18:32:38.568155368Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-w8xs5,Uid:4dc3eb30-239a-4d91-bcac-915a1ba8b158,Namespace:kube-system,Attempt:1,} returns sandbox id \"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1\"" Apr 12 18:32:38.569082 kubelet[1977]: E0412 18:32:38.568878 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:38.569162 systemd-resolved[1046]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:32:38.571211 env[1104]: time="2024-04-12T18:32:38.571173111Z" level=info msg="CreateContainer within sandbox \"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:32:38.582450 env[1104]: time="2024-04-12T18:32:38.582405146Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-nr57f,Uid:b1677d6a-ea95-438c-86be-ab5b4e76f6a3,Namespace:calico-system,Attempt:1,} returns sandbox id \"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e\"" Apr 12 18:32:38.648608 env[1104]: time="2024-04-12T18:32:38.648551805Z" level=info msg="CreateContainer within sandbox \"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"bdfde1b9a021888faab21bd39c113a1ef54a6ae545575fba51c861cee5db51cf\"" Apr 12 18:32:38.649121 env[1104]: time="2024-04-12T18:32:38.649094576Z" level=info msg="StartContainer for \"bdfde1b9a021888faab21bd39c113a1ef54a6ae545575fba51c861cee5db51cf\"" Apr 12 18:32:38.662954 systemd[1]: Started cri-containerd-bdfde1b9a021888faab21bd39c113a1ef54a6ae545575fba51c861cee5db51cf.scope. Apr 12 18:32:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit: BPF prog-id=165 op=LOAD Apr 12 18:32:38.681000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3720 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264666465316239613032313838386661616232316264333963313133 Apr 12 18:32:38.681000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.681000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3720 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.681000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264666465316239613032313838386661616232316264333963313133 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit: BPF prog-id=166 op=LOAD Apr 12 18:32:38.682000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3720 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264666465316239613032313838386661616232316264333963313133 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit: BPF prog-id=167 op=LOAD Apr 12 18:32:38.682000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3720 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264666465316239613032313838386661616232316264333963313133 Apr 12 18:32:38.682000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:32:38.682000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { perfmon } for pid=3812 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit[3812]: AVC avc: denied { bpf } for pid=3812 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:38.682000 audit: BPF prog-id=168 op=LOAD Apr 12 18:32:38.682000 audit[3812]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3720 pid=3812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:38.682000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6264666465316239613032313838386661616232316264333963313133 Apr 12 18:32:38.698763 env[1104]: time="2024-04-12T18:32:38.698446046Z" level=info msg="StartContainer for \"bdfde1b9a021888faab21bd39c113a1ef54a6ae545575fba51c861cee5db51cf\" returns successfully" Apr 12 18:32:38.900955 systemd-networkd[1003]: calibdb86cc5711: Gained IPv6LL Apr 12 18:32:39.182438 systemd[1]: Started sshd@9-10.0.0.89:22-10.0.0.1:40796.service. Apr 12 18:32:39.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.183440 kernel: kauditd_printk_skb: 355 callbacks suppressed Apr 12 18:32:39.183502 kernel: audit: type=1130 audit(1712946759.181:1245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.234000 audit[3867]: USER_ACCT pid=3867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.235310 sshd[3867]: Accepted publickey for core from 10.0.0.1 port 40796 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:39.237000 audit[3867]: CRED_ACQ pid=3867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.238616 sshd[3867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:39.241392 kernel: audit: type=1101 audit(1712946759.234:1246): pid=3867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.241475 kernel: audit: type=1103 audit(1712946759.237:1247): pid=3867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.241495 kernel: audit: type=1006 audit(1712946759.237:1248): pid=3867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:32:39.237000 audit[3867]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2c313a0 a2=3 a3=1 items=0 ppid=1 pid=3867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.245748 systemd[1]: Started session-10.scope. Apr 12 18:32:39.246573 kernel: audit: type=1300 audit(1712946759.237:1248): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2c313a0 a2=3 a3=1 items=0 ppid=1 pid=3867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:39.246907 systemd-logind[1087]: New session 10 of user core. Apr 12 18:32:39.248694 kernel: audit: type=1327 audit(1712946759.237:1248): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:39.250000 audit[3867]: USER_START pid=3867 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.251000 audit[3869]: CRED_ACQ pid=3869 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.257246 kernel: audit: type=1105 audit(1712946759.250:1249): pid=3867 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.257316 kernel: audit: type=1103 audit(1712946759.251:1250): pid=3869 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.308609 kubelet[1977]: E0412 18:32:39.308580 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:39.309420 kubelet[1977]: E0412 18:32:39.309246 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:39.322704 kubelet[1977]: I0412 18:32:39.322462 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-w8xs5" podStartSLOduration=28.322430181 podCreationTimestamp="2024-04-12 18:32:11 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:32:39.319335638 +0000 UTC m=+42.230784558" watchObservedRunningTime="2024-04-12 18:32:39.322430181 +0000 UTC m=+42.233879061" Apr 12 18:32:39.330000 audit[3881]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:39.330000 audit[3881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff1d80e50 a2=0 a3=1 items=0 ppid=2141 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.336680 kernel: audit: type=1325 audit(1712946759.330:1251): table=filter:99 family=2 entries=10 op=nft_register_rule pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:39.336731 kernel: audit: type=1300 audit(1712946759.330:1251): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff1d80e50 a2=0 a3=1 items=0 ppid=2141 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:39.330000 audit[3881]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:39.330000 audit[3881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=fffff1d80e50 a2=0 a3=1 items=0 ppid=2141 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:39.401710 sshd[3867]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:39.408000 audit[3867]: USER_END pid=3867 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.408000 audit[3867]: CRED_DISP pid=3867 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:40810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.409512 systemd[1]: Started sshd@10-10.0.0.89:22-10.0.0.1:40810.service. Apr 12 18:32:39.410777 systemd[1]: sshd@9-10.0.0.89:22-10.0.0.1:40796.service: Deactivated successfully. Apr 12 18:32:39.410000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.89:22-10.0.0.1:40796 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.411536 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:32:39.412154 systemd-logind[1087]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:32:39.413230 systemd-logind[1087]: Removed session 10. Apr 12 18:32:39.454000 audit[3883]: USER_ACCT pid=3883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.454965 sshd[3883]: Accepted publickey for core from 10.0.0.1 port 40810 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:39.455000 audit[3883]: CRED_ACQ pid=3883 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.455000 audit[3883]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd480f530 a2=3 a3=1 items=0 ppid=1 pid=3883 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:39.456550 sshd[3883]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:39.460352 systemd-logind[1087]: New session 11 of user core. Apr 12 18:32:39.460992 systemd[1]: Started session-11.scope. Apr 12 18:32:39.465000 audit[3883]: USER_START pid=3883 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.466000 audit[3886]: CRED_ACQ pid=3886 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.475793 systemd-networkd[1003]: calie302bce5366: Gained IPv6LL Apr 12 18:32:39.535191 env[1104]: time="2024-04-12T18:32:39.535152192Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:39.537047 env[1104]: time="2024-04-12T18:32:39.537019270Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:39.538127 env[1104]: time="2024-04-12T18:32:39.538102092Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:39.539832 env[1104]: time="2024-04-12T18:32:39.539580923Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:39.539909 env[1104]: time="2024-04-12T18:32:39.539833208Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:32:39.540880 env[1104]: time="2024-04-12T18:32:39.540849348Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:32:39.552473 env[1104]: time="2024-04-12T18:32:39.552439304Z" level=info msg="CreateContainer within sandbox \"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:32:39.561735 env[1104]: time="2024-04-12T18:32:39.561692813Z" level=info msg="CreateContainer within sandbox \"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef\"" Apr 12 18:32:39.562247 env[1104]: time="2024-04-12T18:32:39.562220664Z" level=info msg="StartContainer for \"89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef\"" Apr 12 18:32:39.583638 systemd[1]: Started cri-containerd-89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef.scope. Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.626000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit: BPF prog-id=169 op=LOAD Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3464 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383737633739646334363662663739636565336262323336323665 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3464 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383737633739646334363662663739636565336262323336323665 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit: BPF prog-id=170 op=LOAD Apr 12 18:32:39.627000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3464 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383737633739646334363662663739636565336262323336323665 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit: BPF prog-id=171 op=LOAD Apr 12 18:32:39.627000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3464 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383737633739646334363662663739636565336262323336323665 Apr 12 18:32:39.627000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:32:39.627000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:39.627000 audit: BPF prog-id=172 op=LOAD Apr 12 18:32:39.627000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3464 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.627000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3839383737633739646334363662663739636565336262323336323665 Apr 12 18:32:39.705119 env[1104]: time="2024-04-12T18:32:39.705002691Z" level=info msg="StartContainer for \"89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef\" returns successfully" Apr 12 18:32:39.789722 sshd[3883]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:39.790000 audit[3883]: USER_END pid=3883 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.790000 audit[3883]: CRED_DISP pid=3883 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:40816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.793837 systemd[1]: Started sshd@11-10.0.0.89:22-10.0.0.1:40816.service. Apr 12 18:32:39.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.89:22-10.0.0.1:40810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:39.796749 systemd[1]: sshd@10-10.0.0.89:22-10.0.0.1:40810.service: Deactivated successfully. Apr 12 18:32:39.797546 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:32:39.798646 systemd-logind[1087]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:32:39.801824 systemd-logind[1087]: Removed session 11. Apr 12 18:32:39.839000 audit[3933]: USER_ACCT pid=3933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.840270 sshd[3933]: Accepted publickey for core from 10.0.0.1 port 40816 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:39.840000 audit[3933]: CRED_ACQ pid=3933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.840000 audit[3933]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd1e1390 a2=3 a3=1 items=0 ppid=1 pid=3933 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:39.840000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:39.841615 sshd[3933]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:39.845757 systemd-logind[1087]: New session 12 of user core. Apr 12 18:32:39.846543 systemd[1]: Started session-12.scope. Apr 12 18:32:39.851000 audit[3933]: USER_START pid=3933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.852000 audit[3937]: CRED_ACQ pid=3937 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.997403 sshd[3933]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:39.997000 audit[3933]: USER_END pid=3933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:39.997000 audit[3933]: CRED_DISP pid=3933 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:40.000072 systemd[1]: sshd@11-10.0.0.89:22-10.0.0.1:40816.service: Deactivated successfully. Apr 12 18:32:39.999000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.89:22-10.0.0.1:40816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:40.000906 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:32:40.001454 systemd-logind[1087]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:32:40.002267 systemd-logind[1087]: Removed session 12. Apr 12 18:32:40.116784 systemd-networkd[1003]: caliab1938ecaec: Gained IPv6LL Apr 12 18:32:40.316397 kubelet[1977]: E0412 18:32:40.315384 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:40.316769 kubelet[1977]: E0412 18:32:40.316610 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:40.330794 kubelet[1977]: I0412 18:32:40.330740 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-667cd57589-xfzc9" podStartSLOduration=22.474618551 podCreationTimestamp="2024-04-12 18:32:16 +0000 UTC" firstStartedPulling="2024-04-12 18:32:37.684105245 +0000 UTC m=+40.595554165" lastFinishedPulling="2024-04-12 18:32:39.540194975 +0000 UTC m=+42.451643895" observedRunningTime="2024-04-12 18:32:40.329712621 +0000 UTC m=+43.241161541" watchObservedRunningTime="2024-04-12 18:32:40.330708281 +0000 UTC m=+43.242157201" Apr 12 18:32:40.348000 audit[3968]: NETFILTER_CFG table=filter:101 family=2 entries=10 op=nft_register_rule pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:40.348000 audit[3968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc6e01c80 a2=0 a3=1 items=0 ppid=2141 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:40.356000 audit[3968]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=3968 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:40.356000 audit[3968]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffc6e01c80 a2=0 a3=1 items=0 ppid=2141 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.356000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:40.500827 systemd-networkd[1003]: calia4c4f20a1d7: Gained IPv6LL Apr 12 18:32:40.614850 env[1104]: time="2024-04-12T18:32:40.614736894Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:40.616202 env[1104]: time="2024-04-12T18:32:40.616175922Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:40.617468 env[1104]: time="2024-04-12T18:32:40.617442068Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:40.618600 env[1104]: time="2024-04-12T18:32:40.618571170Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:40.618980 env[1104]: time="2024-04-12T18:32:40.618953098Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:32:40.621400 env[1104]: time="2024-04-12T18:32:40.620659572Z" level=info msg="CreateContainer within sandbox \"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:32:40.633314 env[1104]: time="2024-04-12T18:32:40.633275223Z" level=info msg="CreateContainer within sandbox \"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"8129ff3421ae523f99147bfdd8e02f0317987358ede11b98bcb22153781ff07e\"" Apr 12 18:32:40.633736 env[1104]: time="2024-04-12T18:32:40.633714271Z" level=info msg="StartContainer for \"8129ff3421ae523f99147bfdd8e02f0317987358ede11b98bcb22153781ff07e\"" Apr 12 18:32:40.659205 systemd[1]: Started cri-containerd-8129ff3421ae523f99147bfdd8e02f0317987358ede11b98bcb22153781ff07e.scope. Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3760 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323966663334323161653532336639393134376266646438653032 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit: BPF prog-id=173 op=LOAD Apr 12 18:32:40.697000 audit[3980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3760 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323966663334323161653532336639393134376266646438653032 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit: BPF prog-id=174 op=LOAD Apr 12 18:32:40.697000 audit[3980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3760 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323966663334323161653532336639393134376266646438653032 Apr 12 18:32:40.697000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:32:40.697000 audit: BPF prog-id=173 op=UNLOAD Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { perfmon } for pid=3980 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit[3980]: AVC avc: denied { bpf } for pid=3980 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:40.697000 audit: BPF prog-id=175 op=LOAD Apr 12 18:32:40.697000 audit[3980]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3760 pid=3980 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:40.697000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831323966663334323161653532336639393134376266646438653032 Apr 12 18:32:40.711127 env[1104]: time="2024-04-12T18:32:40.711079171Z" level=info msg="StartContainer for \"8129ff3421ae523f99147bfdd8e02f0317987358ede11b98bcb22153781ff07e\" returns successfully" Apr 12 18:32:40.712998 env[1104]: time="2024-04-12T18:32:40.712968209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:32:41.318209 kubelet[1977]: I0412 18:32:41.318150 1977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:32:41.318656 kubelet[1977]: E0412 18:32:41.318629 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:41.419914 systemd[1]: run-containerd-runc-k8s.io-8129ff3421ae523f99147bfdd8e02f0317987358ede11b98bcb22153781ff07e-runc.ehdAW2.mount: Deactivated successfully. Apr 12 18:32:41.804941 env[1104]: time="2024-04-12T18:32:41.804881634Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:41.806507 env[1104]: time="2024-04-12T18:32:41.806465144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:41.808368 env[1104]: time="2024-04-12T18:32:41.808338781Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:41.809799 env[1104]: time="2024-04-12T18:32:41.809772369Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:32:41.810140 env[1104]: time="2024-04-12T18:32:41.810116775Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:32:41.812923 env[1104]: time="2024-04-12T18:32:41.812886469Z" level=info msg="CreateContainer within sandbox \"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:32:41.823191 env[1104]: time="2024-04-12T18:32:41.822769702Z" level=info msg="CreateContainer within sandbox \"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"d21f3ba3f49e97fc6f109290d806af64208748e579510ff3f87fe93fc7b602b3\"" Apr 12 18:32:41.823293 env[1104]: time="2024-04-12T18:32:41.823197030Z" level=info msg="StartContainer for \"d21f3ba3f49e97fc6f109290d806af64208748e579510ff3f87fe93fc7b602b3\"" Apr 12 18:32:41.835396 kubelet[1977]: I0412 18:32:41.835362 1977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:32:41.836051 kubelet[1977]: E0412 18:32:41.836026 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:41.847141 systemd[1]: Started cri-containerd-d21f3ba3f49e97fc6f109290d806af64208748e579510ff3f87fe93fc7b602b3.scope. Apr 12 18:32:41.867000 audit[4060]: NETFILTER_CFG table=filter:103 family=2 entries=9 op=nft_register_rule pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:41.867000 audit[4060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffe754db20 a2=0 a3=1 items=0 ppid=2141 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.867000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3760 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432316633626133663439653937666336663130393239306438303661 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit: BPF prog-id=176 op=LOAD Apr 12 18:32:41.871000 audit[4042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3760 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432316633626133663439653937666336663130393239306438303661 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit: BPF prog-id=177 op=LOAD Apr 12 18:32:41.871000 audit[4042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3760 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432316633626133663439653937666336663130393239306438303661 Apr 12 18:32:41.871000 audit: BPF prog-id=177 op=UNLOAD Apr 12 18:32:41.871000 audit: BPF prog-id=176 op=UNLOAD Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { perfmon } for pid=4042 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit[4042]: AVC avc: denied { bpf } for pid=4042 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:41.871000 audit: BPF prog-id=178 op=LOAD Apr 12 18:32:41.871000 audit[4042]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3760 pid=4042 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.871000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432316633626133663439653937666336663130393239306438303661 Apr 12 18:32:41.868000 audit[4060]: NETFILTER_CFG table=nat:104 family=2 entries=25 op=nft_register_chain pid=4060 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:32:41.868000 audit[4060]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffe754db20 a2=0 a3=1 items=0 ppid=2141 pid=4060 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:41.868000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:32:41.889973 env[1104]: time="2024-04-12T18:32:41.889916609Z" level=info msg="StartContainer for \"d21f3ba3f49e97fc6f109290d806af64208748e579510ff3f87fe93fc7b602b3\" returns successfully" Apr 12 18:32:42.264038 kubelet[1977]: I0412 18:32:42.263859 1977 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:32:42.266728 kubelet[1977]: I0412 18:32:42.264392 1977 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:32:42.322780 kubelet[1977]: E0412 18:32:42.322751 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:32:42.332929 kubelet[1977]: I0412 18:32:42.332884 1977 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-nr57f" podStartSLOduration=23.106943067 podCreationTimestamp="2024-04-12 18:32:16 +0000 UTC" firstStartedPulling="2024-04-12 18:32:38.584446948 +0000 UTC m=+41.495895868" lastFinishedPulling="2024-04-12 18:32:41.81035362 +0000 UTC m=+44.721802540" observedRunningTime="2024-04-12 18:32:42.33240305 +0000 UTC m=+45.243851970" watchObservedRunningTime="2024-04-12 18:32:42.332849739 +0000 UTC m=+45.244298659" Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit: BPF prog-id=179 op=LOAD Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc5c9498 a2=70 a3=ffffdc5c9508 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit: BPF prog-id=180 op=LOAD Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffdc5c9498 a2=70 a3=4b243c items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit: BPF prog-id=180 op=UNLOAD Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffdc5c9450 a2=70 a3=ffffdc5c94c0 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit: BPF prog-id=181 op=LOAD Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdc5c9438 a2=70 a3=ffffdc5c94a8 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit: BPF prog-id=181 op=UNLOAD Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5c9508 a2=70 a3=0 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5c94f8 a2=70 a3=0 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.872000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.872000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffdc5c9468 a2=70 a3=0 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.872000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffdc5c9540 a2=70 a3=1bd3d9ef items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffdc5c9540 a2=70 a3=1bd3d9ef items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.873000 audit: BPF prog-id=182 op=LOAD Apr 12 18:32:42.873000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffdc5c9468 a2=70 a3=1bd3da09 items=0 ppid=4124 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.873000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:32:42.876000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.876000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2b2b2c8 a2=70 a3=ffffe2b2b338 items=0 ppid=4124 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:32:42.876000 audit[4171]: AVC avc: denied { bpf } for pid=4171 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:32:42.876000 audit[4171]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2b2b198 a2=70 a3=ffffe2b2b208 items=0 ppid=4124 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.876000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:32:42.885000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:32:42.935000 audit[4202]: NETFILTER_CFG table=mangle:105 family=2 entries=16 op=nft_register_chain pid=4202 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:32:42.935000 audit[4202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=ffffd014ece0 a2=0 a3=ffffb84b9fa8 items=0 ppid=4124 pid=4202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.935000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:32:42.937000 audit[4201]: NETFILTER_CFG table=nat:106 family=2 entries=15 op=nft_register_chain pid=4201 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:32:42.937000 audit[4201]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffe4648590 a2=0 a3=ffffb4e92fa8 items=0 ppid=4124 pid=4201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.937000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:32:42.938000 audit[4200]: NETFILTER_CFG table=raw:107 family=2 entries=19 op=nft_register_chain pid=4200 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:32:42.938000 audit[4200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffc249a640 a2=0 a3=ffffa5d8afa8 items=0 ppid=4124 pid=4200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.938000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:32:42.941000 audit[4205]: NETFILTER_CFG table=filter:108 family=2 entries=157 op=nft_register_chain pid=4205 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:32:42.941000 audit[4205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=89076 a0=3 a1=fffff56ad5e0 a2=0 a3=ffffaa8a4fa8 items=0 ppid=4124 pid=4205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:42.941000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:32:43.777026 systemd-networkd[1003]: vxlan.calico: Link UP Apr 12 18:32:43.777032 systemd-networkd[1003]: vxlan.calico: Gained carrier Apr 12 18:32:45.002461 systemd[1]: Started sshd@12-10.0.0.89:22-10.0.0.1:40828.service. Apr 12 18:32:45.001000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:40828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:45.006838 kernel: kauditd_printk_skb: 273 callbacks suppressed Apr 12 18:32:45.006917 kernel: audit: type=1130 audit(1712946765.001:1328): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:40828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:45.042000 audit[4213]: USER_ACCT pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.043604 sshd[4213]: Accepted publickey for core from 10.0.0.1 port 40828 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:45.045325 sshd[4213]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:45.044000 audit[4213]: CRED_ACQ pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.049645 kernel: audit: type=1101 audit(1712946765.042:1329): pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.049705 kernel: audit: type=1103 audit(1712946765.044:1330): pid=4213 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.049727 kernel: audit: type=1006 audit(1712946765.044:1331): pid=4213 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Apr 12 18:32:45.044000 audit[4213]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4411c30 a2=3 a3=1 items=0 ppid=1 pid=4213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:45.051637 systemd-logind[1087]: New session 13 of user core. Apr 12 18:32:45.052348 systemd[1]: Started session-13.scope. Apr 12 18:32:45.054479 kernel: audit: type=1300 audit(1712946765.044:1331): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff4411c30 a2=3 a3=1 items=0 ppid=1 pid=4213 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:45.054542 kernel: audit: type=1327 audit(1712946765.044:1331): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:45.044000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:45.055000 audit[4213]: USER_START pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.056000 audit[4215]: CRED_ACQ pid=4215 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.062152 kernel: audit: type=1105 audit(1712946765.055:1332): pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.062209 kernel: audit: type=1103 audit(1712946765.056:1333): pid=4215 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.169892 sshd[4213]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:45.170000 audit[4213]: USER_END pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.172284 systemd-networkd[1003]: vxlan.calico: Gained IPv6LL Apr 12 18:32:45.174989 systemd[1]: sshd@12-10.0.0.89:22-10.0.0.1:40828.service: Deactivated successfully. Apr 12 18:32:45.170000 audit[4213]: CRED_DISP pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.175993 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:32:45.178128 kernel: audit: type=1106 audit(1712946765.170:1334): pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.178210 kernel: audit: type=1104 audit(1712946765.170:1335): pid=4213 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:45.174000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.89:22-10.0.0.1:40828 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:45.178661 systemd-logind[1087]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:32:45.179389 systemd-logind[1087]: Removed session 13. Apr 12 18:32:49.073874 kubelet[1977]: I0412 18:32:49.073838 1977 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:32:50.174272 systemd[1]: Started sshd@13-10.0.0.89:22-10.0.0.1:49378.service. Apr 12 18:32:50.172000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:49378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:50.175245 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:32:50.175319 kernel: audit: type=1130 audit(1712946770.172:1337): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:49378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:50.216000 audit[4279]: USER_ACCT pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.218180 sshd[4279]: Accepted publickey for core from 10.0.0.1 port 49378 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:50.217000 audit[4279]: CRED_ACQ pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.221504 sshd[4279]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:50.224287 kernel: audit: type=1101 audit(1712946770.216:1338): pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.224361 kernel: audit: type=1103 audit(1712946770.217:1339): pid=4279 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.226495 kernel: audit: type=1006 audit(1712946770.217:1340): pid=4279 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:32:50.217000 audit[4279]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffae0cb70 a2=3 a3=1 items=0 ppid=1 pid=4279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:50.230330 kernel: audit: type=1300 audit(1712946770.217:1340): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffae0cb70 a2=3 a3=1 items=0 ppid=1 pid=4279 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:50.230407 kernel: audit: type=1327 audit(1712946770.217:1340): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:50.217000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:50.233755 systemd-logind[1087]: New session 14 of user core. Apr 12 18:32:50.234448 systemd[1]: Started session-14.scope. Apr 12 18:32:50.237000 audit[4279]: USER_START pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.241000 audit[4281]: CRED_ACQ pid=4281 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.246336 kernel: audit: type=1105 audit(1712946770.237:1341): pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.246403 kernel: audit: type=1103 audit(1712946770.241:1342): pid=4281 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.355211 sshd[4279]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:50.354000 audit[4279]: USER_END pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.357518 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:32:50.358101 systemd[1]: sshd@13-10.0.0.89:22-10.0.0.1:49378.service: Deactivated successfully. Apr 12 18:32:50.359269 systemd-logind[1087]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:32:50.354000 audit[4279]: CRED_DISP pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.359920 systemd-logind[1087]: Removed session 14. Apr 12 18:32:50.362684 kernel: audit: type=1106 audit(1712946770.354:1343): pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.362757 kernel: audit: type=1104 audit(1712946770.354:1344): pid=4279 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:50.356000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.89:22-10.0.0.1:49378 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:53.926000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.926000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.926000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4007fd5280 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.926000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4008065d40 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.926000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:53.926000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:53.927000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520990 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.927000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40035ac480 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.927000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:53.929000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520996 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.929000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4006e6f800 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.929000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:53.957000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.957000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40063acd20 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.957000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:53.957000 audit[1842]: AVC avc: denied { watch } for pid=1842 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:53.957000 audit[1842]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40035ac630 a2=fc6 a3=0 items=0 ppid=1700 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c235,c618 key=(null) Apr 12 18:32:53.957000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3839002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Apr 12 18:32:54.433000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520994 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:54.433000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:32:54.433000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40026928e0 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:54.433000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400210e9c0 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:32:54.433000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:54.433000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:32:55.360064 systemd[1]: Started sshd@14-10.0.0.89:22-10.0.0.1:49380.service. Apr 12 18:32:55.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:49380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:55.364935 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:32:55.364980 kernel: audit: type=1130 audit(1712946775.358:1354): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:49380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:55.395000 audit[4306]: USER_ACCT pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.398465 sshd[4306]: Accepted publickey for core from 10.0.0.1 port 49380 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:32:55.399252 sshd[4306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:32:55.397000 audit[4306]: CRED_ACQ pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.404372 kernel: audit: type=1101 audit(1712946775.395:1355): pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.404448 kernel: audit: type=1103 audit(1712946775.397:1356): pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.406294 kernel: audit: type=1006 audit(1712946775.397:1357): pid=4306 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:32:55.397000 audit[4306]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5b32490 a2=3 a3=1 items=0 ppid=1 pid=4306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:55.409417 kernel: audit: type=1300 audit(1712946775.397:1357): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5b32490 a2=3 a3=1 items=0 ppid=1 pid=4306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:32:55.397000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:55.411434 kernel: audit: type=1327 audit(1712946775.397:1357): proctitle=737368643A20636F7265205B707269765D Apr 12 18:32:55.411617 systemd-logind[1087]: New session 15 of user core. Apr 12 18:32:55.412471 systemd[1]: Started session-15.scope. Apr 12 18:32:55.414000 audit[4306]: USER_START pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.415000 audit[4308]: CRED_ACQ pid=4308 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.422664 kernel: audit: type=1105 audit(1712946775.414:1358): pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.422737 kernel: audit: type=1103 audit(1712946775.415:1359): pid=4308 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.549282 sshd[4306]: pam_unix(sshd:session): session closed for user core Apr 12 18:32:55.548000 audit[4306]: USER_END pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.553000 audit[4306]: CRED_DISP pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.555463 systemd[1]: sshd@14-10.0.0.89:22-10.0.0.1:49380.service: Deactivated successfully. Apr 12 18:32:55.556247 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:32:55.556922 systemd-logind[1087]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:32:55.557270 kernel: audit: type=1106 audit(1712946775.548:1360): pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.557324 kernel: audit: type=1104 audit(1712946775.553:1361): pid=4306 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:32:55.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.89:22-10.0.0.1:49380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:32:55.557923 systemd-logind[1087]: Removed session 15. Apr 12 18:32:57.184221 env[1104]: time="2024-04-12T18:32:57.184181245Z" level=info msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.224 [WARNING][4334] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nr57f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1677d6a-ea95-438c-86be-ab5b4e76f6a3", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e", Pod:"csi-node-driver-nr57f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4c4f20a1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.224 [INFO][4334] k8s.go 585: Cleaning up netns ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.224 [INFO][4334] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" iface="eth0" netns="" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.224 [INFO][4334] k8s.go 592: Releasing IP address(es) ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.224 [INFO][4334] utils.go 188: Calico CNI releasing IP address ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.252 [INFO][4344] ipam_plugin.go 415: Releasing address using handleID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.252 [INFO][4344] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.252 [INFO][4344] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.262 [WARNING][4344] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.262 [INFO][4344] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.265 [INFO][4344] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.268278 env[1104]: 2024-04-12 18:32:57.266 [INFO][4334] k8s.go 598: Teardown processing complete. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.268949 env[1104]: time="2024-04-12T18:32:57.268915421Z" level=info msg="TearDown network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" successfully" Apr 12 18:32:57.269018 env[1104]: time="2024-04-12T18:32:57.269002023Z" level=info msg="StopPodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" returns successfully" Apr 12 18:32:57.269618 env[1104]: time="2024-04-12T18:32:57.269558111Z" level=info msg="RemovePodSandbox for \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" Apr 12 18:32:57.269703 env[1104]: time="2024-04-12T18:32:57.269618992Z" level=info msg="Forcibly stopping sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\"" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.302 [WARNING][4367] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--nr57f-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"b1677d6a-ea95-438c-86be-ab5b4e76f6a3", ResourceVersion:"881", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7731bcd9f433894cca7880f309b41fc7fe70efea4850ee58b6d8a1dc85ef536e", Pod:"csi-node-driver-nr57f", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4c4f20a1d7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.302 [INFO][4367] k8s.go 585: Cleaning up netns ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.302 [INFO][4367] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" iface="eth0" netns="" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.302 [INFO][4367] k8s.go 592: Releasing IP address(es) ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.302 [INFO][4367] utils.go 188: Calico CNI releasing IP address ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.324 [INFO][4375] ipam_plugin.go 415: Releasing address using handleID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.324 [INFO][4375] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.324 [INFO][4375] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.333 [WARNING][4375] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.333 [INFO][4375] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" HandleID="k8s-pod-network.b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Workload="localhost-k8s-csi--node--driver--nr57f-eth0" Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.334 [INFO][4375] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.337415 env[1104]: 2024-04-12 18:32:57.336 [INFO][4367] k8s.go 598: Teardown processing complete. ContainerID="b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e" Apr 12 18:32:57.337960 env[1104]: time="2024-04-12T18:32:57.337924637Z" level=info msg="TearDown network for sandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" successfully" Apr 12 18:32:57.345844 env[1104]: time="2024-04-12T18:32:57.345805598Z" level=info msg="RemovePodSandbox \"b100afdabee060d5260a92d311cd100aae5ecd0909432aa4a7b2f031957e591e\" returns successfully" Apr 12 18:32:57.346422 env[1104]: time="2024-04-12T18:32:57.346328926Z" level=info msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.389 [WARNING][4400] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0", GenerateName:"calico-kube-controllers-667cd57589-", Namespace:"calico-system", SelfLink:"", UID:"e8aefbd7-2049-443e-9baa-8d91d587ae90", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"667cd57589", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a", Pod:"calico-kube-controllers-667cd57589-xfzc9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibdb86cc5711", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.389 [INFO][4400] k8s.go 585: Cleaning up netns ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.389 [INFO][4400] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" iface="eth0" netns="" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.389 [INFO][4400] k8s.go 592: Releasing IP address(es) ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.389 [INFO][4400] utils.go 188: Calico CNI releasing IP address ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.407 [INFO][4408] ipam_plugin.go 415: Releasing address using handleID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.407 [INFO][4408] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.407 [INFO][4408] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.415 [WARNING][4408] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.415 [INFO][4408] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.416 [INFO][4408] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.419284 env[1104]: 2024-04-12 18:32:57.418 [INFO][4400] k8s.go 598: Teardown processing complete. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.419862 env[1104]: time="2024-04-12T18:32:57.419824250Z" level=info msg="TearDown network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" successfully" Apr 12 18:32:57.419933 env[1104]: time="2024-04-12T18:32:57.419917051Z" level=info msg="StopPodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" returns successfully" Apr 12 18:32:57.420485 env[1104]: time="2024-04-12T18:32:57.420457660Z" level=info msg="RemovePodSandbox for \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" Apr 12 18:32:57.420557 env[1104]: time="2024-04-12T18:32:57.420493700Z" level=info msg="Forcibly stopping sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\"" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.453 [WARNING][4431] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0", GenerateName:"calico-kube-controllers-667cd57589-", Namespace:"calico-system", SelfLink:"", UID:"e8aefbd7-2049-443e-9baa-8d91d587ae90", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 16, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"667cd57589", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"f97f55832c9326e8a4abd112e4671b0080fb5bad336ff4d07585f678182cb33a", Pod:"calico-kube-controllers-667cd57589-xfzc9", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calibdb86cc5711", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.453 [INFO][4431] k8s.go 585: Cleaning up netns ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.453 [INFO][4431] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" iface="eth0" netns="" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.453 [INFO][4431] k8s.go 592: Releasing IP address(es) ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.453 [INFO][4431] utils.go 188: Calico CNI releasing IP address ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.473 [INFO][4438] ipam_plugin.go 415: Releasing address using handleID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.473 [INFO][4438] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.473 [INFO][4438] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.482 [WARNING][4438] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.482 [INFO][4438] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" HandleID="k8s-pod-network.9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Workload="localhost-k8s-calico--kube--controllers--667cd57589--xfzc9-eth0" Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.483 [INFO][4438] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.486270 env[1104]: 2024-04-12 18:32:57.484 [INFO][4431] k8s.go 598: Teardown processing complete. ContainerID="9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043" Apr 12 18:32:57.486789 env[1104]: time="2024-04-12T18:32:57.486751874Z" level=info msg="TearDown network for sandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" successfully" Apr 12 18:32:57.490398 env[1104]: time="2024-04-12T18:32:57.490360169Z" level=info msg="RemovePodSandbox \"9018ca26158e11719a5a37071f906386e995dc666d011696f78530b3459b4043\" returns successfully" Apr 12 18:32:57.491034 env[1104]: time="2024-04-12T18:32:57.491000379Z" level=info msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.526 [WARNING][4462] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--w8xs5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4dc3eb30-239a-4d91-bcac-915a1ba8b158", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1", Pod:"coredns-5dd5756b68-w8xs5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab1938ecaec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.526 [INFO][4462] k8s.go 585: Cleaning up netns ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.526 [INFO][4462] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" iface="eth0" netns="" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.526 [INFO][4462] k8s.go 592: Releasing IP address(es) ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.526 [INFO][4462] utils.go 188: Calico CNI releasing IP address ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.543 [INFO][4469] ipam_plugin.go 415: Releasing address using handleID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.543 [INFO][4469] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.543 [INFO][4469] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.552 [WARNING][4469] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.552 [INFO][4469] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.553 [INFO][4469] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.558551 env[1104]: 2024-04-12 18:32:57.555 [INFO][4462] k8s.go 598: Teardown processing complete. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.559005 env[1104]: time="2024-04-12T18:32:57.558583173Z" level=info msg="TearDown network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" successfully" Apr 12 18:32:57.559005 env[1104]: time="2024-04-12T18:32:57.558613373Z" level=info msg="StopPodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" returns successfully" Apr 12 18:32:57.559426 env[1104]: time="2024-04-12T18:32:57.559249143Z" level=info msg="RemovePodSandbox for \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" Apr 12 18:32:57.559576 env[1104]: time="2024-04-12T18:32:57.559516427Z" level=info msg="Forcibly stopping sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\"" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.594 [WARNING][4492] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--w8xs5-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"4dc3eb30-239a-4d91-bcac-915a1ba8b158", ResourceVersion:"811", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"e287b657e4b77b2eea559a851bcf4d27d7d5174accdb9462a74bee363ee6a0b1", Pod:"coredns-5dd5756b68-w8xs5", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliab1938ecaec", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.594 [INFO][4492] k8s.go 585: Cleaning up netns ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.594 [INFO][4492] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" iface="eth0" netns="" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.594 [INFO][4492] k8s.go 592: Releasing IP address(es) ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.594 [INFO][4492] utils.go 188: Calico CNI releasing IP address ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.611 [INFO][4499] ipam_plugin.go 415: Releasing address using handleID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.611 [INFO][4499] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.611 [INFO][4499] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.620 [WARNING][4499] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.620 [INFO][4499] ipam_plugin.go 443: Releasing address using workloadID ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" HandleID="k8s-pod-network.ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Workload="localhost-k8s-coredns--5dd5756b68--w8xs5-eth0" Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.621 [INFO][4499] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.623718 env[1104]: 2024-04-12 18:32:57.622 [INFO][4492] k8s.go 598: Teardown processing complete. ContainerID="ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05" Apr 12 18:32:57.624139 env[1104]: time="2024-04-12T18:32:57.623745010Z" level=info msg="TearDown network for sandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" successfully" Apr 12 18:32:57.626221 env[1104]: time="2024-04-12T18:32:57.626195127Z" level=info msg="RemovePodSandbox \"ea819ff29ab431fd9fca21fcbaa48a2fc541836a8d350be77d73be892dc72d05\" returns successfully" Apr 12 18:32:57.626723 env[1104]: time="2024-04-12T18:32:57.626691535Z" level=info msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.662 [WARNING][4521] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ftzvh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f554b727-0400-454c-b147-27f8dea3f62b", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c", Pod:"coredns-5dd5756b68-ftzvh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie302bce5366", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.662 [INFO][4521] k8s.go 585: Cleaning up netns ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.662 [INFO][4521] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" iface="eth0" netns="" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.662 [INFO][4521] k8s.go 592: Releasing IP address(es) ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.662 [INFO][4521] utils.go 188: Calico CNI releasing IP address ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.679 [INFO][4530] ipam_plugin.go 415: Releasing address using handleID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.679 [INFO][4530] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.679 [INFO][4530] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.691 [WARNING][4530] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.691 [INFO][4530] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.692 [INFO][4530] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.695250 env[1104]: 2024-04-12 18:32:57.694 [INFO][4521] k8s.go 598: Teardown processing complete. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.695775 env[1104]: time="2024-04-12T18:32:57.695742351Z" level=info msg="TearDown network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" successfully" Apr 12 18:32:57.695854 env[1104]: time="2024-04-12T18:32:57.695838153Z" level=info msg="StopPodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" returns successfully" Apr 12 18:32:57.696343 env[1104]: time="2024-04-12T18:32:57.696319880Z" level=info msg="RemovePodSandbox for \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" Apr 12 18:32:57.696566 env[1104]: time="2024-04-12T18:32:57.696526603Z" level=info msg="Forcibly stopping sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\"" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.727 [WARNING][4552] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--5dd5756b68--ftzvh-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"f554b727-0400-454c-b147-27f8dea3f62b", ResourceVersion:"787", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 32, 11, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"5caceba0cc739e9832f2eb7f9d56dbedfff40fb2df0836ab368a41a26c91529c", Pod:"coredns-5dd5756b68-ftzvh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie302bce5366", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.728 [INFO][4552] k8s.go 585: Cleaning up netns ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.728 [INFO][4552] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" iface="eth0" netns="" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.728 [INFO][4552] k8s.go 592: Releasing IP address(es) ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.728 [INFO][4552] utils.go 188: Calico CNI releasing IP address ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.745 [INFO][4559] ipam_plugin.go 415: Releasing address using handleID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.746 [INFO][4559] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.746 [INFO][4559] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.754 [WARNING][4559] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.754 [INFO][4559] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" HandleID="k8s-pod-network.a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Workload="localhost-k8s-coredns--5dd5756b68--ftzvh-eth0" Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.757 [INFO][4559] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:32:57.760920 env[1104]: 2024-04-12 18:32:57.759 [INFO][4552] k8s.go 598: Teardown processing complete. ContainerID="a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067" Apr 12 18:32:57.760920 env[1104]: time="2024-04-12T18:32:57.760890228Z" level=info msg="TearDown network for sandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" successfully" Apr 12 18:32:57.764288 env[1104]: time="2024-04-12T18:32:57.764255279Z" level=info msg="RemovePodSandbox \"a26c1a4fb53b50c448adcd7fa67e1b3e149992c5cefc7afea5fc4f3f8d3ed067\" returns successfully" Apr 12 18:33:00.554354 systemd[1]: Started sshd@15-10.0.0.89:22-10.0.0.1:37186.service. Apr 12 18:33:00.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:37186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:00.558423 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:00.558498 kernel: audit: type=1130 audit(1712946780.552:1363): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:37186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:00.592000 audit[4568]: USER_ACCT pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.594521 sshd[4568]: Accepted publickey for core from 10.0.0.1 port 37186 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:00.595874 sshd[4568]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:00.593000 audit[4568]: CRED_ACQ pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.600059 kernel: audit: type=1101 audit(1712946780.592:1364): pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.600124 kernel: audit: type=1103 audit(1712946780.593:1365): pid=4568 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.600147 kernel: audit: type=1006 audit(1712946780.593:1366): pid=4568 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:33:00.600652 systemd-logind[1087]: New session 16 of user core. Apr 12 18:33:00.601472 systemd[1]: Started session-16.scope. Apr 12 18:33:00.593000 audit[4568]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1ca3de0 a2=3 a3=1 items=0 ppid=1 pid=4568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:00.604634 kernel: audit: type=1300 audit(1712946780.593:1366): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe1ca3de0 a2=3 a3=1 items=0 ppid=1 pid=4568 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:00.604707 kernel: audit: type=1327 audit(1712946780.593:1366): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:00.593000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:00.603000 audit[4568]: USER_START pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.608739 kernel: audit: type=1105 audit(1712946780.603:1367): pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.608930 kernel: audit: type=1103 audit(1712946780.604:1368): pid=4570 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.604000 audit[4570]: CRED_ACQ pid=4570 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.722514 sshd[4568]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:00.722000 audit[4568]: USER_END pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.725770 systemd[1]: Started sshd@16-10.0.0.89:22-10.0.0.1:37192.service. Apr 12 18:33:00.727022 systemd[1]: sshd@15-10.0.0.89:22-10.0.0.1:37186.service: Deactivated successfully. Apr 12 18:33:00.722000 audit[4568]: CRED_DISP pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.727826 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:33:00.728514 systemd-logind[1087]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:33:00.729274 systemd-logind[1087]: Removed session 16. Apr 12 18:33:00.729954 kernel: audit: type=1106 audit(1712946780.722:1369): pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.730007 kernel: audit: type=1104 audit(1712946780.722:1370): pid=4568 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:37192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:00.726000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.89:22-10.0.0.1:37186 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:00.764000 audit[4581]: USER_ACCT pid=4581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.766047 sshd[4581]: Accepted publickey for core from 10.0.0.1 port 37192 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:00.765000 audit[4581]: CRED_ACQ pid=4581 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.765000 audit[4581]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed671310 a2=3 a3=1 items=0 ppid=1 pid=4581 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:00.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:00.767234 sshd[4581]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:00.770502 systemd-logind[1087]: New session 17 of user core. Apr 12 18:33:00.771334 systemd[1]: Started session-17.scope. Apr 12 18:33:00.773000 audit[4581]: USER_START pid=4581 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.776000 audit[4593]: CRED_ACQ pid=4593 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:00.781226 systemd[1]: run-containerd-runc-k8s.io-6c7325fce5f6bfe23a243f2a8de23340d581ec3c66a5fafdb8f188615590dbfc-runc.5eWP2Y.mount: Deactivated successfully. Apr 12 18:33:00.842250 kubelet[1977]: E0412 18:33:00.838072 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:33:01.007325 sshd[4581]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:01.006000 audit[4581]: USER_END pid=4581 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.006000 audit[4581]: CRED_DISP pid=4581 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:37202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:01.010736 systemd[1]: Started sshd@17-10.0.0.89:22-10.0.0.1:37202.service. Apr 12 18:33:01.012068 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:33:01.012824 systemd-logind[1087]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:33:01.012917 systemd[1]: sshd@16-10.0.0.89:22-10.0.0.1:37192.service: Deactivated successfully. Apr 12 18:33:01.011000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.89:22-10.0.0.1:37192 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:01.014031 systemd-logind[1087]: Removed session 17. Apr 12 18:33:01.049000 audit[4614]: USER_ACCT pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.051464 sshd[4614]: Accepted publickey for core from 10.0.0.1 port 37202 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:01.050000 audit[4614]: CRED_ACQ pid=4614 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.050000 audit[4614]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffef36e3c0 a2=3 a3=1 items=0 ppid=1 pid=4614 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.050000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:01.052626 sshd[4614]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:01.055850 systemd-logind[1087]: New session 18 of user core. Apr 12 18:33:01.056978 systemd[1]: Started session-18.scope. Apr 12 18:33:01.058000 audit[4614]: USER_START pid=4614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.059000 audit[4617]: CRED_ACQ pid=4617 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.839000 audit[4630]: NETFILTER_CFG table=filter:109 family=2 entries=20 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:01.839000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffde787520 a2=0 a3=1 items=0 ppid=2141 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.839000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:01.848034 sshd[4614]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:01.840000 audit[4630]: NETFILTER_CFG table=nat:110 family=2 entries=20 op=nft_register_rule pid=4630 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:01.847000 audit[4614]: USER_END pid=4614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.847000 audit[4614]: CRED_DISP pid=4614 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.840000 audit[4630]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffde787520 a2=0 a3=1 items=0 ppid=2141 pid=4630 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.840000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:01.851488 systemd[1]: sshd@17-10.0.0.89:22-10.0.0.1:37202.service: Deactivated successfully. Apr 12 18:33:01.850000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.89:22-10.0.0.1:37202 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:01.852153 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:33:01.852786 systemd-logind[1087]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:33:01.854153 systemd[1]: Started sshd@18-10.0.0.89:22-10.0.0.1:37212.service. Apr 12 18:33:01.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:37212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:01.855607 systemd-logind[1087]: Removed session 18. Apr 12 18:33:01.861000 audit[4635]: NETFILTER_CFG table=filter:111 family=2 entries=32 op=nft_register_rule pid=4635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:01.861000 audit[4635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcf1acd00 a2=0 a3=1 items=0 ppid=2141 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.861000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:01.862000 audit[4635]: NETFILTER_CFG table=nat:112 family=2 entries=20 op=nft_register_rule pid=4635 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:01.862000 audit[4635]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffcf1acd00 a2=0 a3=1 items=0 ppid=2141 pid=4635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:01.896000 audit[4633]: USER_ACCT pid=4633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.898209 sshd[4633]: Accepted publickey for core from 10.0.0.1 port 37212 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:01.897000 audit[4633]: CRED_ACQ pid=4633 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.897000 audit[4633]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdaacb5d0 a2=3 a3=1 items=0 ppid=1 pid=4633 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:01.897000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:01.899555 sshd[4633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:01.903094 systemd-logind[1087]: New session 19 of user core. Apr 12 18:33:01.903955 systemd[1]: Started session-19.scope. Apr 12 18:33:01.905000 audit[4633]: USER_START pid=4633 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:01.907000 audit[4637]: CRED_ACQ pid=4637 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.167516 sshd[4633]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:02.168000 audit[4633]: USER_END pid=4633 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.170412 systemd[1]: Started sshd@19-10.0.0.89:22-10.0.0.1:37218.service. Apr 12 18:33:02.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:37218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:02.169000 audit[4633]: CRED_DISP pid=4633 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.173503 systemd[1]: sshd@18-10.0.0.89:22-10.0.0.1:37212.service: Deactivated successfully. Apr 12 18:33:02.172000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.89:22-10.0.0.1:37212 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:02.174199 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:33:02.175786 systemd-logind[1087]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:33:02.176924 systemd-logind[1087]: Removed session 19. Apr 12 18:33:02.209000 audit[4646]: USER_ACCT pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.211097 sshd[4646]: Accepted publickey for core from 10.0.0.1 port 37218 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:02.210000 audit[4646]: CRED_ACQ pid=4646 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.210000 audit[4646]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8462900 a2=3 a3=1 items=0 ppid=1 pid=4646 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:02.210000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:02.212887 sshd[4646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:02.216198 systemd-logind[1087]: New session 20 of user core. Apr 12 18:33:02.217027 systemd[1]: Started session-20.scope. Apr 12 18:33:02.218000 audit[4646]: USER_START pid=4646 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.219000 audit[4649]: CRED_ACQ pid=4649 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.327754 sshd[4646]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:02.327000 audit[4646]: USER_END pid=4646 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.327000 audit[4646]: CRED_DISP pid=4646 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:02.330618 systemd[1]: sshd@19-10.0.0.89:22-10.0.0.1:37218.service: Deactivated successfully. Apr 12 18:33:02.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.89:22-10.0.0.1:37218 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:02.331405 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:33:02.331950 systemd-logind[1087]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:33:02.332540 systemd-logind[1087]: Removed session 20. Apr 12 18:33:05.544000 audit[4673]: NETFILTER_CFG table=filter:113 family=2 entries=33 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.544000 audit[4673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffe6919e40 a2=0 a3=1 items=0 ppid=2141 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.544000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.545000 audit[4673]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=4673 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.545000 audit[4673]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffe6919e40 a2=0 a3=1 items=0 ppid=2141 pid=4673 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.545000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.552813 kubelet[1977]: I0412 18:33:05.552779 1977 topology_manager.go:215] "Topology Admit Handler" podUID="0fe021ea-fc82-440b-8f0a-a0ca7562062b" podNamespace="calico-apiserver" podName="calico-apiserver-76d8f7b8b5-29zj5" Apr 12 18:33:05.559350 systemd[1]: Created slice kubepods-besteffort-pod0fe021ea_fc82_440b_8f0a_a0ca7562062b.slice. Apr 12 18:33:05.573000 audit[4675]: NETFILTER_CFG table=filter:115 family=2 entries=34 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.578492 kernel: kauditd_printk_skb: 63 callbacks suppressed Apr 12 18:33:05.578578 kernel: audit: type=1325 audit(1712946785.573:1414): table=filter:115 family=2 entries=34 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.578601 kernel: audit: type=1300 audit(1712946785.573:1414): arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc9853ef0 a2=0 a3=1 items=0 ppid=2141 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.573000 audit[4675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffc9853ef0 a2=0 a3=1 items=0 ppid=2141 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.573000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.584106 kernel: audit: type=1327 audit(1712946785.573:1414): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.574000 audit[4675]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.574000 audit[4675]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc9853ef0 a2=0 a3=1 items=0 ppid=2141 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.592091 kernel: audit: type=1325 audit(1712946785.574:1415): table=nat:116 family=2 entries=20 op=nft_register_rule pid=4675 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:05.592142 kernel: audit: type=1300 audit(1712946785.574:1415): arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc9853ef0 a2=0 a3=1 items=0 ppid=2141 pid=4675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:05.592160 kernel: audit: type=1327 audit(1712946785.574:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:05.634715 kubelet[1977]: I0412 18:33:05.634658 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ccx9h\" (UniqueName: \"kubernetes.io/projected/0fe021ea-fc82-440b-8f0a-a0ca7562062b-kube-api-access-ccx9h\") pod \"calico-apiserver-76d8f7b8b5-29zj5\" (UID: \"0fe021ea-fc82-440b-8f0a-a0ca7562062b\") " pod="calico-apiserver/calico-apiserver-76d8f7b8b5-29zj5" Apr 12 18:33:05.634906 kubelet[1977]: I0412 18:33:05.634891 1977 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/0fe021ea-fc82-440b-8f0a-a0ca7562062b-calico-apiserver-certs\") pod \"calico-apiserver-76d8f7b8b5-29zj5\" (UID: \"0fe021ea-fc82-440b-8f0a-a0ca7562062b\") " pod="calico-apiserver/calico-apiserver-76d8f7b8b5-29zj5" Apr 12 18:33:05.736382 kubelet[1977]: E0412 18:33:05.736342 1977 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:33:05.736515 kubelet[1977]: E0412 18:33:05.736419 1977 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/0fe021ea-fc82-440b-8f0a-a0ca7562062b-calico-apiserver-certs podName:0fe021ea-fc82-440b-8f0a-a0ca7562062b nodeName:}" failed. No retries permitted until 2024-04-12 18:33:06.236398579 +0000 UTC m=+69.147847499 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/0fe021ea-fc82-440b-8f0a-a0ca7562062b-calico-apiserver-certs") pod "calico-apiserver-76d8f7b8b5-29zj5" (UID: "0fe021ea-fc82-440b-8f0a-a0ca7562062b") : secret "calico-apiserver-certs" not found Apr 12 18:33:06.462456 env[1104]: time="2024-04-12T18:33:06.462406331Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76d8f7b8b5-29zj5,Uid:0fe021ea-fc82-440b-8f0a-a0ca7562062b,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:33:06.582127 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:33:06.582251 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali7f6702f4fbd: link becomes ready Apr 12 18:33:06.582602 systemd-networkd[1003]: cali7f6702f4fbd: Link UP Apr 12 18:33:06.582923 systemd-networkd[1003]: cali7f6702f4fbd: Gained carrier Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.502 [INFO][4679] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0 calico-apiserver-76d8f7b8b5- calico-apiserver 0fe021ea-fc82-440b-8f0a-a0ca7562062b 1050 0 2024-04-12 18:33:05 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:76d8f7b8b5 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-76d8f7b8b5-29zj5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali7f6702f4fbd [] []}} ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.502 [INFO][4679] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.531 [INFO][4691] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" HandleID="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Workload="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.544 [INFO][4691] ipam_plugin.go 268: Auto assigning IP ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" HandleID="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Workload="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ab970), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-76d8f7b8b5-29zj5", "timestamp":"2024-04-12 18:33:06.531259381 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.544 [INFO][4691] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.544 [INFO][4691] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.544 [INFO][4691] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.546 [INFO][4691] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.550 [INFO][4691] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.555 [INFO][4691] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.558 [INFO][4691] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.561 [INFO][4691] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.561 [INFO][4691] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.563 [INFO][4691] ipam.go 1682: Creating new handle: k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.566 [INFO][4691] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.572 [INFO][4691] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.572 [INFO][4691] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" host="localhost" Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.572 [INFO][4691] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:33:06.603959 env[1104]: 2024-04-12 18:33:06.572 [INFO][4691] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" HandleID="k8s-pod-network.39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Workload="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.577 [INFO][4679] k8s.go 385: Populated endpoint ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0", GenerateName:"calico-apiserver-76d8f7b8b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"0fe021ea-fc82-440b-8f0a-a0ca7562062b", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76d8f7b8b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-76d8f7b8b5-29zj5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f6702f4fbd", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.577 [INFO][4679] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.577 [INFO][4679] dataplane_linux.go 68: Setting the host side veth name to cali7f6702f4fbd ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.582 [INFO][4679] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.584 [INFO][4679] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0", GenerateName:"calico-apiserver-76d8f7b8b5-", Namespace:"calico-apiserver", SelfLink:"", UID:"0fe021ea-fc82-440b-8f0a-a0ca7562062b", ResourceVersion:"1050", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 33, 5, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"76d8f7b8b5", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b", Pod:"calico-apiserver-76d8f7b8b5-29zj5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali7f6702f4fbd", MAC:"2e:85:0a:4f:71:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:33:06.605222 env[1104]: 2024-04-12 18:33:06.597 [INFO][4679] k8s.go 498: Wrote updated endpoint to datastore ContainerID="39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b" Namespace="calico-apiserver" Pod="calico-apiserver-76d8f7b8b5-29zj5" WorkloadEndpoint="localhost-k8s-calico--apiserver--76d8f7b8b5--29zj5-eth0" Apr 12 18:33:06.620043 env[1104]: time="2024-04-12T18:33:06.619819343Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:33:06.620043 env[1104]: time="2024-04-12T18:33:06.619861623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:33:06.620043 env[1104]: time="2024-04-12T18:33:06.619871743Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:33:06.620341 env[1104]: time="2024-04-12T18:33:06.620076025Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b pid=4727 runtime=io.containerd.runc.v2 Apr 12 18:33:06.619000 audit[4726]: NETFILTER_CFG table=filter:117 family=2 entries=55 op=nft_register_chain pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:06.619000 audit[4726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28936 a0=3 a1=ffffdd5ed1d0 a2=0 a3=ffffa569efa8 items=0 ppid=4124 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.628053 kernel: audit: type=1325 audit(1712946786.619:1416): table=filter:117 family=2 entries=55 op=nft_register_chain pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:33:06.628233 kernel: audit: type=1300 audit(1712946786.619:1416): arch=c00000b7 syscall=211 success=yes exit=28936 a0=3 a1=ffffdd5ed1d0 a2=0 a3=ffffa569efa8 items=0 ppid=4124 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.619000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:06.630924 kernel: audit: type=1327 audit(1712946786.619:1416): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:33:06.637287 systemd[1]: Started cri-containerd-39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b.scope. Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.656728 kernel: audit: type=1400 audit(1712946786.651:1417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.654000 audit: BPF prog-id=183 op=LOAD Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4727 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663266623134626433366162623132353130386466383130643763 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4727 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663266623134626433366162623132353130386466383130643763 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit: BPF prog-id=184 op=LOAD Apr 12 18:33:06.655000 audit[4737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4727 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663266623134626433366162623132353130386466383130643763 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit: BPF prog-id=185 op=LOAD Apr 12 18:33:06.655000 audit[4737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4727 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663266623134626433366162623132353130386466383130643763 Apr 12 18:33:06.655000 audit: BPF prog-id=185 op=UNLOAD Apr 12 18:33:06.655000 audit: BPF prog-id=184 op=UNLOAD Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { perfmon } for pid=4737 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit[4737]: AVC avc: denied { bpf } for pid=4737 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:06.655000 audit: BPF prog-id=186 op=LOAD Apr 12 18:33:06.655000 audit[4737]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4727 pid=4737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:06.655000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339663266623134626433366162623132353130386466383130643763 Apr 12 18:33:06.657656 systemd-resolved[1046]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:33:06.674500 env[1104]: time="2024-04-12T18:33:06.674454844Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-76d8f7b8b5-29zj5,Uid:0fe021ea-fc82-440b-8f0a-a0ca7562062b,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b\"" Apr 12 18:33:06.676707 env[1104]: time="2024-04-12T18:33:06.676031896Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:33:07.067459 systemd[1]: run-containerd-runc-k8s.io-89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef-runc.i5CDhs.mount: Deactivated successfully. Apr 12 18:33:07.339509 systemd[1]: Started sshd@20-10.0.0.89:22-10.0.0.1:37226.service. Apr 12 18:33:07.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:37226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:07.386000 audit[4782]: USER_ACCT pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.388922 sshd[4782]: Accepted publickey for core from 10.0.0.1 port 37226 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:07.388000 audit[4782]: CRED_ACQ pid=4782 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.388000 audit[4782]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffc415850 a2=3 a3=1 items=0 ppid=1 pid=4782 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:07.388000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:07.390980 sshd[4782]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:07.406000 audit[4785]: NETFILTER_CFG table=filter:118 family=2 entries=22 op=nft_register_rule pid=4785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:07.406000 audit[4785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd5cd76c0 a2=0 a3=1 items=0 ppid=2141 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:07.406000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:07.406862 systemd[1]: Started session-21.scope. Apr 12 18:33:07.407858 systemd-logind[1087]: New session 21 of user core. Apr 12 18:33:07.408000 audit[4785]: NETFILTER_CFG table=nat:119 family=2 entries=104 op=nft_register_chain pid=4785 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:07.408000 audit[4785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffd5cd76c0 a2=0 a3=1 items=0 ppid=2141 pid=4785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:07.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:07.413000 audit[4782]: USER_START pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.418000 audit[4787]: CRED_ACQ pid=4787 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.540258 sshd[4782]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:07.539000 audit[4782]: USER_END pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.539000 audit[4782]: CRED_DISP pid=4782 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:07.541000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.89:22-10.0.0.1:37226 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:07.542660 systemd[1]: sshd@20-10.0.0.89:22-10.0.0.1:37226.service: Deactivated successfully. Apr 12 18:33:07.543431 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:33:07.546203 systemd-logind[1087]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:33:07.546953 systemd-logind[1087]: Removed session 21. Apr 12 18:33:07.635845 systemd-networkd[1003]: cali7f6702f4fbd: Gained IPv6LL Apr 12 18:33:07.747997 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2483682314.mount: Deactivated successfully. Apr 12 18:33:08.566164 env[1104]: time="2024-04-12T18:33:08.566110358Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:08.567786 env[1104]: time="2024-04-12T18:33:08.567751531Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:08.569189 env[1104]: time="2024-04-12T18:33:08.569154143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:08.570700 env[1104]: time="2024-04-12T18:33:08.570661675Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:33:08.571212 env[1104]: time="2024-04-12T18:33:08.571174439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:33:08.573471 env[1104]: time="2024-04-12T18:33:08.573308496Z" level=info msg="CreateContainer within sandbox \"39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:33:08.583032 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2292001527.mount: Deactivated successfully. Apr 12 18:33:08.585144 env[1104]: time="2024-04-12T18:33:08.585101830Z" level=info msg="CreateContainer within sandbox \"39f2fb14bd36abb125108df810d7c40befe3d628f4d97fdfe178748431db407b\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7637a286bc7959d5c6911e693c8bea3dbd67fcb561c4dd9fef0ee9430cbf0ef9\"" Apr 12 18:33:08.585597 env[1104]: time="2024-04-12T18:33:08.585560754Z" level=info msg="StartContainer for \"7637a286bc7959d5c6911e693c8bea3dbd67fcb561c4dd9fef0ee9430cbf0ef9\"" Apr 12 18:33:08.610761 systemd[1]: Started cri-containerd-7637a286bc7959d5c6911e693c8bea3dbd67fcb561c4dd9fef0ee9430cbf0ef9.scope. Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.629000 audit: BPF prog-id=187 op=LOAD Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4727 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333761323836626337393539643563363931316536393363386265 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4727 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333761323836626337393539643563363931316536393363386265 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit: BPF prog-id=188 op=LOAD Apr 12 18:33:08.630000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4727 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333761323836626337393539643563363931316536393363386265 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit: BPF prog-id=189 op=LOAD Apr 12 18:33:08.630000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4727 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333761323836626337393539643563363931316536393363386265 Apr 12 18:33:08.630000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:33:08.630000 audit: BPF prog-id=188 op=UNLOAD Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { perfmon } for pid=4806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit[4806]: AVC avc: denied { bpf } for pid=4806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:33:08.630000 audit: BPF prog-id=190 op=LOAD Apr 12 18:33:08.630000 audit[4806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4727 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:08.630000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736333761323836626337393539643563363931316536393363386265 Apr 12 18:33:08.655086 env[1104]: time="2024-04-12T18:33:08.655038749Z" level=info msg="StartContainer for \"7637a286bc7959d5c6911e693c8bea3dbd67fcb561c4dd9fef0ee9430cbf0ef9\" returns successfully" Apr 12 18:33:09.419000 audit[4839]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:09.419000 audit[4839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc1b7a5d0 a2=0 a3=1 items=0 ppid=2141 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:09.419000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:09.422000 audit[4839]: NETFILTER_CFG table=nat:121 family=2 entries=44 op=nft_register_rule pid=4839 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:09.422000 audit[4839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffc1b7a5d0 a2=0 a3=1 items=0 ppid=2141 pid=4839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:09.422000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:09.431000 audit[4841]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:09.431000 audit[4841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff5c2efc0 a2=0 a3=1 items=0 ppid=2141 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:09.431000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:09.432000 audit[4841]: NETFILTER_CFG table=nat:123 family=2 entries=44 op=nft_register_rule pid=4841 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:33:09.432000 audit[4841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff5c2efc0 a2=0 a3=1 items=0 ppid=2141 pid=4841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:09.432000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:33:09.454000 audit[4817]: AVC avc: denied { watch } for pid=4817 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_33_06.2518433706/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c168,c259 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c168,c259 tclass=file permissive=0 Apr 12 18:33:09.454000 audit[4817]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40007a1380 a2=fc6 a3=0 items=0 ppid=4727 pid=4817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c168,c259 key=(null) Apr 12 18:33:09.454000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:33:10.021000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:10.021000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002671a00 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:33:10.021000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:10.023000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:10.024000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:10.024000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000f4a220 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:33:10.024000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:10.023000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8b80 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:33:10.023000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:10.026000 audit[1858]: AVC avc: denied { watch } for pid=1858 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:33:10.026000 audit[1858]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000bf8bc0 a2=fc6 a3=0 items=0 ppid=1701 pid=1858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c253,c625 key=(null) Apr 12 18:33:10.026000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:33:12.193973 kubelet[1977]: E0412 18:33:12.193942 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:33:12.545237 systemd[1]: Started sshd@21-10.0.0.89:22-10.0.0.1:50200.service. Apr 12 18:33:12.543000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:50200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:12.546600 kernel: kauditd_printk_skb: 157 callbacks suppressed Apr 12 18:33:12.546661 kernel: audit: type=1130 audit(1712946792.543:1473): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:50200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:12.584000 audit[4847]: USER_ACCT pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.586094 sshd[4847]: Accepted publickey for core from 10.0.0.1 port 50200 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:12.587425 sshd[4847]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:12.585000 audit[4847]: CRED_ACQ pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.592061 kernel: audit: type=1101 audit(1712946792.584:1474): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.592119 kernel: audit: type=1103 audit(1712946792.585:1475): pid=4847 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.593998 kernel: audit: type=1006 audit(1712946792.585:1476): pid=4847 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:33:12.585000 audit[4847]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb7e3540 a2=3 a3=1 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:12.597331 kernel: audit: type=1300 audit(1712946792.585:1476): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcb7e3540 a2=3 a3=1 items=0 ppid=1 pid=4847 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:12.585000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:12.598626 kernel: audit: type=1327 audit(1712946792.585:1476): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:12.598932 systemd-logind[1087]: New session 22 of user core. Apr 12 18:33:12.599786 systemd[1]: Started session-22.scope. Apr 12 18:33:12.601000 audit[4847]: USER_START pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.602000 audit[4849]: CRED_ACQ pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.606715 kernel: audit: type=1105 audit(1712946792.601:1477): pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.609721 kernel: audit: type=1103 audit(1712946792.602:1478): pid=4849 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.728633 sshd[4847]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:12.727000 audit[4847]: USER_END pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.731033 systemd[1]: sshd@21-10.0.0.89:22-10.0.0.1:50200.service: Deactivated successfully. Apr 12 18:33:12.731833 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:33:12.727000 audit[4847]: CRED_DISP pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.736223 kernel: audit: type=1106 audit(1712946792.727:1479): pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.736292 kernel: audit: type=1104 audit(1712946792.727:1480): pid=4847 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:12.736289 systemd-logind[1087]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:33:12.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.89:22-10.0.0.1:50200 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:12.737033 systemd-logind[1087]: Removed session 22. Apr 12 18:33:16.194170 kubelet[1977]: E0412 18:33:16.194129 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:33:17.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:50210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:17.736197 systemd[1]: Started sshd@22-10.0.0.89:22-10.0.0.1:50210.service. Apr 12 18:33:17.737183 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:17.737216 kernel: audit: type=1130 audit(1712946797.734:1482): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:50210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:17.773000 audit[4867]: USER_ACCT pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.775174 sshd[4867]: Accepted publickey for core from 10.0.0.1 port 50210 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:17.776385 sshd[4867]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:17.774000 audit[4867]: CRED_ACQ pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.779721 systemd-logind[1087]: New session 23 of user core. Apr 12 18:33:17.780490 systemd[1]: Started session-23.scope. Apr 12 18:33:17.781055 kernel: audit: type=1101 audit(1712946797.773:1483): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.781101 kernel: audit: type=1103 audit(1712946797.774:1484): pid=4867 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.783037 kernel: audit: type=1006 audit(1712946797.774:1485): pid=4867 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:33:17.783112 kernel: audit: type=1300 audit(1712946797.774:1485): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8818ec0 a2=3 a3=1 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.774000 audit[4867]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe8818ec0 a2=3 a3=1 items=0 ppid=1 pid=4867 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:17.774000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:17.787420 kernel: audit: type=1327 audit(1712946797.774:1485): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:17.787482 kernel: audit: type=1105 audit(1712946797.785:1486): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.785000 audit[4867]: USER_START pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.786000 audit[4869]: CRED_ACQ pid=4869 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.793736 kernel: audit: type=1103 audit(1712946797.786:1487): pid=4869 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.914593 sshd[4867]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:17.914000 audit[4867]: USER_END pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.917980 systemd[1]: sshd@22-10.0.0.89:22-10.0.0.1:50210.service: Deactivated successfully. Apr 12 18:33:17.918735 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:33:17.919234 systemd-logind[1087]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:33:17.914000 audit[4867]: CRED_DISP pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.919992 systemd-logind[1087]: Removed session 23. Apr 12 18:33:17.922969 kernel: audit: type=1106 audit(1712946797.914:1488): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.923042 kernel: audit: type=1104 audit(1712946797.914:1489): pid=4867 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:17.916000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.89:22-10.0.0.1:50210 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:18.193873 kubelet[1977]: E0412 18:33:18.193834 1977 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:33:19.091074 systemd[1]: run-containerd-runc-k8s.io-89877c79dc466bf79cee3bb23626e7ca32c4e8686c00707c2a6f7a1e7e75b2ef-runc.3x05xN.mount: Deactivated successfully. Apr 12 18:33:22.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:34506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.919350 systemd[1]: Started sshd@23-10.0.0.89:22-10.0.0.1:34506.service. Apr 12 18:33:22.920271 kernel: kauditd_printk_skb: 1 callbacks suppressed Apr 12 18:33:22.920319 kernel: audit: type=1130 audit(1712946802.918:1491): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:34506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:33:22.959142 sshd[4901]: Accepted publickey for core from 10.0.0.1 port 34506 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:33:22.958000 audit[4901]: USER_ACCT pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.962706 kernel: audit: type=1101 audit(1712946802.958:1492): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.961000 audit[4901]: CRED_ACQ pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.962802 sshd[4901]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:33:22.967097 systemd[1]: Started session-24.scope. Apr 12 18:33:22.967245 systemd-logind[1087]: New session 24 of user core. Apr 12 18:33:22.967434 kernel: audit: type=1103 audit(1712946802.961:1493): pid=4901 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.967461 kernel: audit: type=1006 audit(1712946802.961:1494): pid=4901 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:33:22.967481 kernel: audit: type=1300 audit(1712946802.961:1494): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff68ced20 a2=3 a3=1 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.961000 audit[4901]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff68ced20 a2=3 a3=1 items=0 ppid=1 pid=4901 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:33:22.970574 kernel: audit: type=1327 audit(1712946802.961:1494): proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:22.961000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:33:22.970000 audit[4901]: USER_START pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.974872 kernel: audit: type=1105 audit(1712946802.970:1495): pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.974937 kernel: audit: type=1103 audit(1712946802.971:1496): pid=4909 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:22.971000 audit[4909]: CRED_ACQ pid=4909 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:23.075518 sshd[4901]: pam_unix(sshd:session): session closed for user core Apr 12 18:33:23.075000 audit[4901]: USER_END pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:23.078248 systemd[1]: sshd@23-10.0.0.89:22-10.0.0.1:34506.service: Deactivated successfully. Apr 12 18:33:23.079049 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:33:23.079559 systemd-logind[1087]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:33:23.076000 audit[4901]: CRED_DISP pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:23.080245 systemd-logind[1087]: Removed session 24. Apr 12 18:33:23.082748 kernel: audit: type=1106 audit(1712946803.075:1497): pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:23.082865 kernel: audit: type=1104 audit(1712946803.076:1498): pid=4901 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:33:23.077000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.89:22-10.0.0.1:34506 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'