Apr 12 18:40:06.729714 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Apr 12 18:40:06.729733 kernel: Linux version 5.15.154-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Fri Apr 12 17:21:24 -00 2024 Apr 12 18:40:06.729741 kernel: efi: EFI v2.70 by EDK II Apr 12 18:40:06.729747 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Apr 12 18:40:06.729752 kernel: random: crng init done Apr 12 18:40:06.729757 kernel: ACPI: Early table checksum verification disabled Apr 12 18:40:06.729763 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Apr 12 18:40:06.729770 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Apr 12 18:40:06.729775 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729781 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729786 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729791 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729796 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729802 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729809 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729815 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729821 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Apr 12 18:40:06.729827 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Apr 12 18:40:06.729833 kernel: NUMA: Failed to initialise from firmware Apr 12 18:40:06.729838 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:40:06.729844 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Apr 12 18:40:06.729849 kernel: Zone ranges: Apr 12 18:40:06.729855 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:40:06.729862 kernel: DMA32 empty Apr 12 18:40:06.729867 kernel: Normal empty Apr 12 18:40:06.729873 kernel: Movable zone start for each node Apr 12 18:40:06.729878 kernel: Early memory node ranges Apr 12 18:40:06.729884 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Apr 12 18:40:06.729890 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Apr 12 18:40:06.729895 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Apr 12 18:40:06.729901 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Apr 12 18:40:06.729906 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Apr 12 18:40:06.729912 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Apr 12 18:40:06.729917 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Apr 12 18:40:06.729923 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Apr 12 18:40:06.729930 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Apr 12 18:40:06.729935 kernel: psci: probing for conduit method from ACPI. Apr 12 18:40:06.729941 kernel: psci: PSCIv1.1 detected in firmware. Apr 12 18:40:06.729947 kernel: psci: Using standard PSCI v0.2 function IDs Apr 12 18:40:06.729952 kernel: psci: Trusted OS migration not required Apr 12 18:40:06.729960 kernel: psci: SMC Calling Convention v1.1 Apr 12 18:40:06.729966 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Apr 12 18:40:06.729973 kernel: ACPI: SRAT not present Apr 12 18:40:06.729980 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Apr 12 18:40:06.729986 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Apr 12 18:40:06.729992 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Apr 12 18:40:06.729998 kernel: Detected PIPT I-cache on CPU0 Apr 12 18:40:06.730004 kernel: CPU features: detected: GIC system register CPU interface Apr 12 18:40:06.730010 kernel: CPU features: detected: Hardware dirty bit management Apr 12 18:40:06.730022 kernel: CPU features: detected: Spectre-v4 Apr 12 18:40:06.730028 kernel: CPU features: detected: Spectre-BHB Apr 12 18:40:06.730038 kernel: CPU features: kernel page table isolation forced ON by KASLR Apr 12 18:40:06.730045 kernel: CPU features: detected: Kernel page table isolation (KPTI) Apr 12 18:40:06.730051 kernel: CPU features: detected: ARM erratum 1418040 Apr 12 18:40:06.730058 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Apr 12 18:40:06.730064 kernel: Policy zone: DMA Apr 12 18:40:06.730077 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:40:06.730085 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Apr 12 18:40:06.730091 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Apr 12 18:40:06.730097 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Apr 12 18:40:06.730103 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Apr 12 18:40:06.730109 kernel: Memory: 2457468K/2572288K available (9792K kernel code, 2092K rwdata, 7568K rodata, 36352K init, 777K bss, 114820K reserved, 0K cma-reserved) Apr 12 18:40:06.730126 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Apr 12 18:40:06.730146 kernel: trace event string verifier disabled Apr 12 18:40:06.730152 kernel: rcu: Preemptible hierarchical RCU implementation. Apr 12 18:40:06.730159 kernel: rcu: RCU event tracing is enabled. Apr 12 18:40:06.730165 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Apr 12 18:40:06.730171 kernel: Trampoline variant of Tasks RCU enabled. Apr 12 18:40:06.730177 kernel: Tracing variant of Tasks RCU enabled. Apr 12 18:40:06.730183 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Apr 12 18:40:06.730189 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Apr 12 18:40:06.730195 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Apr 12 18:40:06.730201 kernel: GICv3: 256 SPIs implemented Apr 12 18:40:06.730210 kernel: GICv3: 0 Extended SPIs implemented Apr 12 18:40:06.730216 kernel: GICv3: Distributor has no Range Selector support Apr 12 18:40:06.730222 kernel: Root IRQ handler: gic_handle_irq Apr 12 18:40:06.730228 kernel: GICv3: 16 PPIs implemented Apr 12 18:40:06.730234 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Apr 12 18:40:06.730240 kernel: ACPI: SRAT not present Apr 12 18:40:06.730246 kernel: ITS [mem 0x08080000-0x0809ffff] Apr 12 18:40:06.730253 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Apr 12 18:40:06.730259 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Apr 12 18:40:06.730265 kernel: GICv3: using LPI property table @0x00000000400d0000 Apr 12 18:40:06.730271 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Apr 12 18:40:06.730278 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:40:06.730286 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Apr 12 18:40:06.730292 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Apr 12 18:40:06.730298 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Apr 12 18:40:06.730304 kernel: arm-pv: using stolen time PV Apr 12 18:40:06.730310 kernel: Console: colour dummy device 80x25 Apr 12 18:40:06.730317 kernel: ACPI: Core revision 20210730 Apr 12 18:40:06.730323 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Apr 12 18:40:06.730330 kernel: pid_max: default: 32768 minimum: 301 Apr 12 18:40:06.730336 kernel: LSM: Security Framework initializing Apr 12 18:40:06.730342 kernel: SELinux: Initializing. Apr 12 18:40:06.730349 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:40:06.730355 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Apr 12 18:40:06.730361 kernel: rcu: Hierarchical SRCU implementation. Apr 12 18:40:06.730367 kernel: Platform MSI: ITS@0x8080000 domain created Apr 12 18:40:06.730374 kernel: PCI/MSI: ITS@0x8080000 domain created Apr 12 18:40:06.730380 kernel: Remapping and enabling EFI services. Apr 12 18:40:06.730386 kernel: smp: Bringing up secondary CPUs ... Apr 12 18:40:06.730392 kernel: Detected PIPT I-cache on CPU1 Apr 12 18:40:06.730398 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Apr 12 18:40:06.730406 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Apr 12 18:40:06.730412 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:40:06.730418 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Apr 12 18:40:06.730425 kernel: Detected PIPT I-cache on CPU2 Apr 12 18:40:06.730431 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Apr 12 18:40:06.730437 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Apr 12 18:40:06.730444 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:40:06.730450 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Apr 12 18:40:06.730456 kernel: Detected PIPT I-cache on CPU3 Apr 12 18:40:06.730462 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Apr 12 18:40:06.730469 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Apr 12 18:40:06.730475 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Apr 12 18:40:06.730481 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Apr 12 18:40:06.730487 kernel: smp: Brought up 1 node, 4 CPUs Apr 12 18:40:06.730498 kernel: SMP: Total of 4 processors activated. Apr 12 18:40:06.730506 kernel: CPU features: detected: 32-bit EL0 Support Apr 12 18:40:06.730513 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Apr 12 18:40:06.730519 kernel: CPU features: detected: Common not Private translations Apr 12 18:40:06.730525 kernel: CPU features: detected: CRC32 instructions Apr 12 18:40:06.730532 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Apr 12 18:40:06.730539 kernel: CPU features: detected: LSE atomic instructions Apr 12 18:40:06.730545 kernel: CPU features: detected: Privileged Access Never Apr 12 18:40:06.730553 kernel: CPU features: detected: RAS Extension Support Apr 12 18:40:06.730559 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Apr 12 18:40:06.730566 kernel: CPU: All CPU(s) started at EL1 Apr 12 18:40:06.730572 kernel: alternatives: patching kernel code Apr 12 18:40:06.730580 kernel: devtmpfs: initialized Apr 12 18:40:06.730586 kernel: KASLR enabled Apr 12 18:40:06.730593 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Apr 12 18:40:06.730600 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Apr 12 18:40:06.730606 kernel: pinctrl core: initialized pinctrl subsystem Apr 12 18:40:06.730613 kernel: SMBIOS 3.0.0 present. Apr 12 18:40:06.730619 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Apr 12 18:40:06.730626 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Apr 12 18:40:06.730632 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Apr 12 18:40:06.730639 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Apr 12 18:40:06.730646 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Apr 12 18:40:06.730653 kernel: audit: initializing netlink subsys (disabled) Apr 12 18:40:06.730660 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Apr 12 18:40:06.730666 kernel: thermal_sys: Registered thermal governor 'step_wise' Apr 12 18:40:06.730672 kernel: cpuidle: using governor menu Apr 12 18:40:06.730679 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Apr 12 18:40:06.730685 kernel: ASID allocator initialised with 32768 entries Apr 12 18:40:06.730692 kernel: ACPI: bus type PCI registered Apr 12 18:40:06.730698 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Apr 12 18:40:06.730706 kernel: Serial: AMBA PL011 UART driver Apr 12 18:40:06.730713 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Apr 12 18:40:06.730719 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Apr 12 18:40:06.730726 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Apr 12 18:40:06.730732 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Apr 12 18:40:06.730739 kernel: cryptd: max_cpu_qlen set to 1000 Apr 12 18:40:06.730746 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Apr 12 18:40:06.730753 kernel: ACPI: Added _OSI(Module Device) Apr 12 18:40:06.730759 kernel: ACPI: Added _OSI(Processor Device) Apr 12 18:40:06.730767 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Apr 12 18:40:06.730773 kernel: ACPI: Added _OSI(Processor Aggregator Device) Apr 12 18:40:06.730780 kernel: ACPI: Added _OSI(Linux-Dell-Video) Apr 12 18:40:06.730786 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Apr 12 18:40:06.730793 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Apr 12 18:40:06.730799 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Apr 12 18:40:06.730806 kernel: ACPI: Interpreter enabled Apr 12 18:40:06.730812 kernel: ACPI: Using GIC for interrupt routing Apr 12 18:40:06.730819 kernel: ACPI: MCFG table detected, 1 entries Apr 12 18:40:06.730827 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Apr 12 18:40:06.730834 kernel: printk: console [ttyAMA0] enabled Apr 12 18:40:06.730840 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Apr 12 18:40:06.730956 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Apr 12 18:40:06.731019 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Apr 12 18:40:06.731086 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Apr 12 18:40:06.731162 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Apr 12 18:40:06.731227 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Apr 12 18:40:06.731236 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Apr 12 18:40:06.731243 kernel: PCI host bridge to bus 0000:00 Apr 12 18:40:06.731308 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Apr 12 18:40:06.731362 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Apr 12 18:40:06.731414 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Apr 12 18:40:06.731466 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Apr 12 18:40:06.731538 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Apr 12 18:40:06.731612 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Apr 12 18:40:06.731673 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Apr 12 18:40:06.731732 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Apr 12 18:40:06.731792 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:40:06.731866 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Apr 12 18:40:06.731940 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Apr 12 18:40:06.732001 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Apr 12 18:40:06.732054 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Apr 12 18:40:06.732124 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Apr 12 18:40:06.732183 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Apr 12 18:40:06.732192 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Apr 12 18:40:06.732199 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Apr 12 18:40:06.732206 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Apr 12 18:40:06.732215 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Apr 12 18:40:06.732222 kernel: iommu: Default domain type: Translated Apr 12 18:40:06.732228 kernel: iommu: DMA domain TLB invalidation policy: strict mode Apr 12 18:40:06.732235 kernel: vgaarb: loaded Apr 12 18:40:06.732241 kernel: pps_core: LinuxPPS API ver. 1 registered Apr 12 18:40:06.732248 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Apr 12 18:40:06.732255 kernel: PTP clock support registered Apr 12 18:40:06.732261 kernel: Registered efivars operations Apr 12 18:40:06.732268 kernel: clocksource: Switched to clocksource arch_sys_counter Apr 12 18:40:06.732276 kernel: VFS: Disk quotas dquot_6.6.0 Apr 12 18:40:06.732282 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Apr 12 18:40:06.732289 kernel: pnp: PnP ACPI init Apr 12 18:40:06.732353 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Apr 12 18:40:06.732362 kernel: pnp: PnP ACPI: found 1 devices Apr 12 18:40:06.732369 kernel: NET: Registered PF_INET protocol family Apr 12 18:40:06.732376 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Apr 12 18:40:06.732383 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Apr 12 18:40:06.732389 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Apr 12 18:40:06.732397 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Apr 12 18:40:06.732404 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Apr 12 18:40:06.732411 kernel: TCP: Hash tables configured (established 32768 bind 32768) Apr 12 18:40:06.732417 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:40:06.732424 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Apr 12 18:40:06.732430 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Apr 12 18:40:06.732437 kernel: PCI: CLS 0 bytes, default 64 Apr 12 18:40:06.732443 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Apr 12 18:40:06.732451 kernel: kvm [1]: HYP mode not available Apr 12 18:40:06.732458 kernel: Initialise system trusted keyrings Apr 12 18:40:06.732464 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Apr 12 18:40:06.732471 kernel: Key type asymmetric registered Apr 12 18:40:06.732477 kernel: Asymmetric key parser 'x509' registered Apr 12 18:40:06.732483 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Apr 12 18:40:06.732490 kernel: io scheduler mq-deadline registered Apr 12 18:40:06.732496 kernel: io scheduler kyber registered Apr 12 18:40:06.732503 kernel: io scheduler bfq registered Apr 12 18:40:06.732509 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Apr 12 18:40:06.732517 kernel: ACPI: button: Power Button [PWRB] Apr 12 18:40:06.732524 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Apr 12 18:40:06.732584 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Apr 12 18:40:06.732593 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Apr 12 18:40:06.732600 kernel: thunder_xcv, ver 1.0 Apr 12 18:40:06.732606 kernel: thunder_bgx, ver 1.0 Apr 12 18:40:06.732613 kernel: nicpf, ver 1.0 Apr 12 18:40:06.732620 kernel: nicvf, ver 1.0 Apr 12 18:40:06.732687 kernel: rtc-efi rtc-efi.0: registered as rtc0 Apr 12 18:40:06.732747 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-04-12T18:40:06 UTC (1712947206) Apr 12 18:40:06.732756 kernel: hid: raw HID events driver (C) Jiri Kosina Apr 12 18:40:06.732762 kernel: NET: Registered PF_INET6 protocol family Apr 12 18:40:06.732769 kernel: Segment Routing with IPv6 Apr 12 18:40:06.732775 kernel: In-situ OAM (IOAM) with IPv6 Apr 12 18:40:06.732782 kernel: NET: Registered PF_PACKET protocol family Apr 12 18:40:06.732788 kernel: Key type dns_resolver registered Apr 12 18:40:06.732794 kernel: registered taskstats version 1 Apr 12 18:40:06.732802 kernel: Loading compiled-in X.509 certificates Apr 12 18:40:06.732809 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.154-flatcar: 8c258d82bbd8df4a9da2c0ea4108142f04be6b34' Apr 12 18:40:06.732816 kernel: Key type .fscrypt registered Apr 12 18:40:06.732822 kernel: Key type fscrypt-provisioning registered Apr 12 18:40:06.732828 kernel: ima: No TPM chip found, activating TPM-bypass! Apr 12 18:40:06.732835 kernel: ima: Allocated hash algorithm: sha1 Apr 12 18:40:06.732841 kernel: ima: No architecture policies found Apr 12 18:40:06.732848 kernel: Freeing unused kernel memory: 36352K Apr 12 18:40:06.732855 kernel: Run /init as init process Apr 12 18:40:06.732862 kernel: with arguments: Apr 12 18:40:06.732868 kernel: /init Apr 12 18:40:06.732874 kernel: with environment: Apr 12 18:40:06.732881 kernel: HOME=/ Apr 12 18:40:06.732887 kernel: TERM=linux Apr 12 18:40:06.732893 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Apr 12 18:40:06.732901 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:40:06.732911 systemd[1]: Detected virtualization kvm. Apr 12 18:40:06.732918 systemd[1]: Detected architecture arm64. Apr 12 18:40:06.732925 systemd[1]: Running in initrd. Apr 12 18:40:06.732932 systemd[1]: No hostname configured, using default hostname. Apr 12 18:40:06.732939 systemd[1]: Hostname set to . Apr 12 18:40:06.732946 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:40:06.732953 systemd[1]: Queued start job for default target initrd.target. Apr 12 18:40:06.732959 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:40:06.732967 systemd[1]: Reached target cryptsetup.target. Apr 12 18:40:06.732974 systemd[1]: Reached target paths.target. Apr 12 18:40:06.732980 systemd[1]: Reached target slices.target. Apr 12 18:40:06.732987 systemd[1]: Reached target swap.target. Apr 12 18:40:06.732994 systemd[1]: Reached target timers.target. Apr 12 18:40:06.733001 systemd[1]: Listening on iscsid.socket. Apr 12 18:40:06.733008 systemd[1]: Listening on iscsiuio.socket. Apr 12 18:40:06.733015 systemd[1]: Listening on systemd-journald-audit.socket. Apr 12 18:40:06.733023 systemd[1]: Listening on systemd-journald-dev-log.socket. Apr 12 18:40:06.733030 systemd[1]: Listening on systemd-journald.socket. Apr 12 18:40:06.733037 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:40:06.733043 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:40:06.733050 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:40:06.733057 systemd[1]: Reached target sockets.target. Apr 12 18:40:06.733064 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:40:06.733077 systemd[1]: Finished network-cleanup.service. Apr 12 18:40:06.733084 systemd[1]: Starting systemd-fsck-usr.service... Apr 12 18:40:06.733093 systemd[1]: Starting systemd-journald.service... Apr 12 18:40:06.733100 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:40:06.733107 systemd[1]: Starting systemd-resolved.service... Apr 12 18:40:06.733113 systemd[1]: Starting systemd-vconsole-setup.service... Apr 12 18:40:06.733127 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:40:06.733134 systemd[1]: Finished systemd-fsck-usr.service. Apr 12 18:40:06.733141 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Apr 12 18:40:06.733151 systemd-journald[249]: Journal started Apr 12 18:40:06.733194 systemd-journald[249]: Runtime Journal (/run/log/journal/b408c28518224e7d839a48a5e574725e) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:40:06.726306 systemd-modules-load[250]: Inserted module 'overlay' Apr 12 18:40:06.735169 systemd[1]: Started systemd-journald.service. Apr 12 18:40:06.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.736212 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Apr 12 18:40:06.741858 kernel: audit: type=1130 audit(1712947206.735:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.741876 kernel: audit: type=1130 audit(1712947206.738:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.739089 systemd[1]: Finished systemd-vconsole-setup.service. Apr 12 18:40:06.743279 systemd[1]: Starting dracut-cmdline-ask.service... Apr 12 18:40:06.746763 kernel: audit: type=1130 audit(1712947206.742:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.752149 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Apr 12 18:40:06.755760 systemd-modules-load[250]: Inserted module 'br_netfilter' Apr 12 18:40:06.756613 kernel: Bridge firewalling registered Apr 12 18:40:06.757883 systemd-resolved[251]: Positive Trust Anchors: Apr 12 18:40:06.757898 systemd-resolved[251]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:40:06.757926 systemd-resolved[251]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:40:06.762068 systemd-resolved[251]: Defaulting to hostname 'linux'. Apr 12 18:40:06.762820 systemd[1]: Started systemd-resolved.service. Apr 12 18:40:06.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.765270 systemd[1]: Reached target nss-lookup.target. Apr 12 18:40:06.770475 kernel: audit: type=1130 audit(1712947206.765:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.770491 kernel: SCSI subsystem initialized Apr 12 18:40:06.769903 systemd[1]: Finished dracut-cmdline-ask.service. Apr 12 18:40:06.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.773978 systemd[1]: Starting dracut-cmdline.service... Apr 12 18:40:06.775309 kernel: audit: type=1130 audit(1712947206.771:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.777560 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Apr 12 18:40:06.777586 kernel: device-mapper: uevent: version 1.0.3 Apr 12 18:40:06.777920 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Apr 12 18:40:06.780898 systemd-modules-load[250]: Inserted module 'dm_multipath' Apr 12 18:40:06.782000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.781981 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:40:06.785905 dracut-cmdline[269]: dracut-dracut-053 Apr 12 18:40:06.787040 kernel: audit: type=1130 audit(1712947206.782:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.783606 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:40:06.787809 dracut-cmdline[269]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=c0b96868344262519ffdb2dae3782c942008a0fecdbc0bc85d2e170bd2e8b8a8 Apr 12 18:40:06.790345 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:40:06.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.795159 kernel: audit: type=1130 audit(1712947206.792:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.847151 kernel: Loading iSCSI transport class v2.0-870. Apr 12 18:40:06.859154 kernel: iscsi: registered transport (tcp) Apr 12 18:40:06.876137 kernel: iscsi: registered transport (qla4xxx) Apr 12 18:40:06.876164 kernel: QLogic iSCSI HBA Driver Apr 12 18:40:06.910506 systemd[1]: Finished dracut-cmdline.service. Apr 12 18:40:06.915192 kernel: audit: type=1130 audit(1712947206.911:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.911000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:06.912053 systemd[1]: Starting dracut-pre-udev.service... Apr 12 18:40:06.955145 kernel: raid6: neonx8 gen() 13812 MB/s Apr 12 18:40:06.971152 kernel: raid6: neonx8 xor() 10822 MB/s Apr 12 18:40:06.988147 kernel: raid6: neonx4 gen() 13536 MB/s Apr 12 18:40:07.005141 kernel: raid6: neonx4 xor() 11239 MB/s Apr 12 18:40:07.022311 kernel: raid6: neonx2 gen() 12952 MB/s Apr 12 18:40:07.039163 kernel: raid6: neonx2 xor() 10357 MB/s Apr 12 18:40:07.056157 kernel: raid6: neonx1 gen() 10524 MB/s Apr 12 18:40:07.073145 kernel: raid6: neonx1 xor() 8773 MB/s Apr 12 18:40:07.090159 kernel: raid6: int64x8 gen() 6265 MB/s Apr 12 18:40:07.107150 kernel: raid6: int64x8 xor() 3540 MB/s Apr 12 18:40:07.124138 kernel: raid6: int64x4 gen() 7230 MB/s Apr 12 18:40:07.141148 kernel: raid6: int64x4 xor() 3852 MB/s Apr 12 18:40:07.158157 kernel: raid6: int64x2 gen() 6146 MB/s Apr 12 18:40:07.175165 kernel: raid6: int64x2 xor() 3315 MB/s Apr 12 18:40:07.192151 kernel: raid6: int64x1 gen() 5031 MB/s Apr 12 18:40:07.209173 kernel: raid6: int64x1 xor() 2629 MB/s Apr 12 18:40:07.209198 kernel: raid6: using algorithm neonx8 gen() 13812 MB/s Apr 12 18:40:07.209207 kernel: raid6: .... xor() 10822 MB/s, rmw enabled Apr 12 18:40:07.210185 kernel: raid6: using neon recovery algorithm Apr 12 18:40:07.220155 kernel: xor: measuring software checksum speed Apr 12 18:40:07.221146 kernel: 8regs : 17300 MB/sec Apr 12 18:40:07.222140 kernel: 32regs : 20755 MB/sec Apr 12 18:40:07.223422 kernel: arm64_neon : 27901 MB/sec Apr 12 18:40:07.223433 kernel: xor: using function: arm64_neon (27901 MB/sec) Apr 12 18:40:07.280287 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Apr 12 18:40:07.290329 systemd[1]: Finished dracut-pre-udev.service. Apr 12 18:40:07.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:07.292066 systemd[1]: Starting systemd-udevd.service... Apr 12 18:40:07.296806 kernel: audit: type=1130 audit(1712947207.290:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:07.291000 audit: BPF prog-id=7 op=LOAD Apr 12 18:40:07.291000 audit: BPF prog-id=8 op=LOAD Apr 12 18:40:07.309997 systemd-udevd[453]: Using default interface naming scheme 'v252'. Apr 12 18:40:07.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:07.313418 systemd[1]: Started systemd-udevd.service. Apr 12 18:40:07.315343 systemd[1]: Starting dracut-pre-trigger.service... Apr 12 18:40:07.325735 dracut-pre-trigger[461]: rd.md=0: removing MD RAID activation Apr 12 18:40:07.350856 systemd[1]: Finished dracut-pre-trigger.service. Apr 12 18:40:07.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:07.352383 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:40:07.386547 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:40:07.387000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:07.419141 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Apr 12 18:40:07.422537 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Apr 12 18:40:07.422573 kernel: GPT:9289727 != 19775487 Apr 12 18:40:07.422582 kernel: GPT:Alternate GPT header not at the end of the disk. Apr 12 18:40:07.423373 kernel: GPT:9289727 != 19775487 Apr 12 18:40:07.423396 kernel: GPT: Use GNU Parted to correct GPT errors. Apr 12 18:40:07.424133 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:40:07.437150 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (515) Apr 12 18:40:07.439164 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Apr 12 18:40:07.444404 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Apr 12 18:40:07.447213 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Apr 12 18:40:07.448183 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Apr 12 18:40:07.455153 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:40:07.456724 systemd[1]: Starting disk-uuid.service... Apr 12 18:40:07.462739 disk-uuid[523]: Primary Header is updated. Apr 12 18:40:07.462739 disk-uuid[523]: Secondary Entries is updated. Apr 12 18:40:07.462739 disk-uuid[523]: Secondary Header is updated. Apr 12 18:40:07.467142 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:40:08.477063 disk-uuid[524]: The operation has completed successfully. Apr 12 18:40:08.478187 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Apr 12 18:40:08.501591 systemd[1]: disk-uuid.service: Deactivated successfully. Apr 12 18:40:08.501696 systemd[1]: Finished disk-uuid.service. Apr 12 18:40:08.503356 systemd[1]: Starting verity-setup.service... Apr 12 18:40:08.502000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.518141 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Apr 12 18:40:08.537308 systemd[1]: Found device dev-mapper-usr.device. Apr 12 18:40:08.539399 systemd[1]: Mounting sysusr-usr.mount... Apr 12 18:40:08.541386 systemd[1]: Finished verity-setup.service. Apr 12 18:40:08.542000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.588946 systemd[1]: Mounted sysusr-usr.mount. Apr 12 18:40:08.590185 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Apr 12 18:40:08.589736 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Apr 12 18:40:08.590365 systemd[1]: Starting ignition-setup.service... Apr 12 18:40:08.592507 systemd[1]: Starting parse-ip-for-networkd.service... Apr 12 18:40:08.599165 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:40:08.599198 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:40:08.599212 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:40:08.608261 systemd[1]: mnt-oem.mount: Deactivated successfully. Apr 12 18:40:08.615000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.615055 systemd[1]: Finished ignition-setup.service. Apr 12 18:40:08.616556 systemd[1]: Starting ignition-fetch-offline.service... Apr 12 18:40:08.674903 systemd[1]: Finished parse-ip-for-networkd.service. Apr 12 18:40:08.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.676000 audit: BPF prog-id=9 op=LOAD Apr 12 18:40:08.676919 systemd[1]: Starting systemd-networkd.service... Apr 12 18:40:08.697831 systemd-networkd[699]: lo: Link UP Apr 12 18:40:08.697841 systemd-networkd[699]: lo: Gained carrier Apr 12 18:40:08.698240 systemd-networkd[699]: Enumeration completed Apr 12 18:40:08.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.698318 systemd[1]: Started systemd-networkd.service. Apr 12 18:40:08.698405 systemd-networkd[699]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:40:08.699273 systemd-networkd[699]: eth0: Link UP Apr 12 18:40:08.699276 systemd-networkd[699]: eth0: Gained carrier Apr 12 18:40:08.699570 systemd[1]: Reached target network.target. Apr 12 18:40:08.701455 systemd[1]: Starting iscsiuio.service... Apr 12 18:40:08.710824 systemd[1]: Started iscsiuio.service. Apr 12 18:40:08.712000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.713492 systemd[1]: Starting iscsid.service... Apr 12 18:40:08.717055 iscsid[704]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:40:08.717055 iscsid[704]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Apr 12 18:40:08.717055 iscsid[704]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Apr 12 18:40:08.717055 iscsid[704]: If using hardware iscsi like qla4xxx this message can be ignored. Apr 12 18:40:08.717055 iscsid[704]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Apr 12 18:40:08.717055 iscsid[704]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Apr 12 18:40:08.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.718757 ignition[612]: Ignition 2.14.0 Apr 12 18:40:08.720255 systemd[1]: Started iscsid.service. Apr 12 18:40:08.718764 ignition[612]: Stage: fetch-offline Apr 12 18:40:08.727543 systemd[1]: Starting dracut-initqueue.service... Apr 12 18:40:08.718801 ignition[612]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:08.731641 systemd-networkd[699]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:40:08.718810 ignition[612]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:08.718939 ignition[612]: parsed url from cmdline: "" Apr 12 18:40:08.718943 ignition[612]: no config URL provided Apr 12 18:40:08.718947 ignition[612]: reading system config file "/usr/lib/ignition/user.ign" Apr 12 18:40:08.718961 ignition[612]: no config at "/usr/lib/ignition/user.ign" Apr 12 18:40:08.718979 ignition[612]: op(1): [started] loading QEMU firmware config module Apr 12 18:40:08.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.737812 systemd[1]: Finished dracut-initqueue.service. Apr 12 18:40:08.718985 ignition[612]: op(1): executing: "modprobe" "qemu_fw_cfg" Apr 12 18:40:08.738785 systemd[1]: Reached target remote-fs-pre.target. Apr 12 18:40:08.732582 ignition[612]: op(1): [finished] loading QEMU firmware config module Apr 12 18:40:08.740499 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:40:08.742061 systemd[1]: Reached target remote-fs.target. Apr 12 18:40:08.744209 systemd[1]: Starting dracut-pre-mount.service... Apr 12 18:40:08.751372 systemd[1]: Finished dracut-pre-mount.service. Apr 12 18:40:08.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.808981 ignition[612]: parsing config with SHA512: 13e4713148bac3ffb08c2830ad6aae52d5f11244ca907d0178232e108c61f49519f498e9d02d1bf4a6edf0f0e7d5a0d1604271a5950b18cc15c505d28160e43c Apr 12 18:40:08.856954 systemd-resolved[251]: Detected conflict on linux IN A 10.0.0.136 Apr 12 18:40:08.856969 systemd-resolved[251]: Hostname conflict, changing published hostname from 'linux' to 'linux3'. Apr 12 18:40:08.857840 ignition[612]: fetch-offline: fetch-offline passed Apr 12 18:40:08.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.857211 unknown[612]: fetched base config from "system" Apr 12 18:40:08.857907 ignition[612]: Ignition finished successfully Apr 12 18:40:08.857218 unknown[612]: fetched user config from "qemu" Apr 12 18:40:08.859036 systemd[1]: Finished ignition-fetch-offline.service. Apr 12 18:40:08.859947 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Apr 12 18:40:08.860702 systemd[1]: Starting ignition-kargs.service... Apr 12 18:40:08.869555 ignition[720]: Ignition 2.14.0 Apr 12 18:40:08.869565 ignition[720]: Stage: kargs Apr 12 18:40:08.869650 ignition[720]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:08.869659 ignition[720]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:08.870741 ignition[720]: kargs: kargs passed Apr 12 18:40:08.872000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.871756 systemd[1]: Finished ignition-kargs.service. Apr 12 18:40:08.870786 ignition[720]: Ignition finished successfully Apr 12 18:40:08.873832 systemd[1]: Starting ignition-disks.service... Apr 12 18:40:08.880258 ignition[726]: Ignition 2.14.0 Apr 12 18:40:08.880266 ignition[726]: Stage: disks Apr 12 18:40:08.880351 ignition[726]: no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:08.880360 ignition[726]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:08.881412 ignition[726]: disks: disks passed Apr 12 18:40:08.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.882932 systemd[1]: Finished ignition-disks.service. Apr 12 18:40:08.881454 ignition[726]: Ignition finished successfully Apr 12 18:40:08.883911 systemd[1]: Reached target initrd-root-device.target. Apr 12 18:40:08.885054 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:40:08.886296 systemd[1]: Reached target local-fs.target. Apr 12 18:40:08.887486 systemd[1]: Reached target sysinit.target. Apr 12 18:40:08.888730 systemd[1]: Reached target basic.target. Apr 12 18:40:08.890631 systemd[1]: Starting systemd-fsck-root.service... Apr 12 18:40:08.901274 systemd-fsck[734]: ROOT: clean, 612/553520 files, 56018/553472 blocks Apr 12 18:40:08.904201 systemd[1]: Finished systemd-fsck-root.service. Apr 12 18:40:08.904000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.905690 systemd[1]: Mounting sysroot.mount... Apr 12 18:40:08.911144 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Apr 12 18:40:08.911294 systemd[1]: Mounted sysroot.mount. Apr 12 18:40:08.911983 systemd[1]: Reached target initrd-root-fs.target. Apr 12 18:40:08.913997 systemd[1]: Mounting sysroot-usr.mount... Apr 12 18:40:08.914846 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Apr 12 18:40:08.914886 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Apr 12 18:40:08.914908 systemd[1]: Reached target ignition-diskful.target. Apr 12 18:40:08.916572 systemd[1]: Mounted sysroot-usr.mount. Apr 12 18:40:08.918322 systemd[1]: Starting initrd-setup-root.service... Apr 12 18:40:08.922575 initrd-setup-root[744]: cut: /sysroot/etc/passwd: No such file or directory Apr 12 18:40:08.926796 initrd-setup-root[752]: cut: /sysroot/etc/group: No such file or directory Apr 12 18:40:08.930661 initrd-setup-root[760]: cut: /sysroot/etc/shadow: No such file or directory Apr 12 18:40:08.934609 initrd-setup-root[768]: cut: /sysroot/etc/gshadow: No such file or directory Apr 12 18:40:08.959253 systemd[1]: Finished initrd-setup-root.service. Apr 12 18:40:08.960685 systemd[1]: Starting ignition-mount.service... Apr 12 18:40:08.961963 systemd[1]: Starting sysroot-boot.service... Apr 12 18:40:08.959000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.966643 bash[786]: umount: /sysroot/usr/share/oem: not mounted. Apr 12 18:40:08.974907 ignition[788]: INFO : Ignition 2.14.0 Apr 12 18:40:08.974907 ignition[788]: INFO : Stage: mount Apr 12 18:40:08.977281 ignition[788]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:08.977281 ignition[788]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:08.977281 ignition[788]: INFO : mount: mount passed Apr 12 18:40:08.977281 ignition[788]: INFO : Ignition finished successfully Apr 12 18:40:08.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.980000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:08.977427 systemd[1]: Finished ignition-mount.service. Apr 12 18:40:08.979857 systemd[1]: Finished sysroot-boot.service. Apr 12 18:40:09.548524 systemd[1]: Mounting sysroot-usr-share-oem.mount... Apr 12 18:40:09.555980 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (796) Apr 12 18:40:09.556012 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Apr 12 18:40:09.556022 kernel: BTRFS info (device vda6): using free space tree Apr 12 18:40:09.557195 kernel: BTRFS info (device vda6): has skinny extents Apr 12 18:40:09.560022 systemd[1]: Mounted sysroot-usr-share-oem.mount. Apr 12 18:40:09.561659 systemd[1]: Starting ignition-files.service... Apr 12 18:40:09.575918 ignition[816]: INFO : Ignition 2.14.0 Apr 12 18:40:09.575918 ignition[816]: INFO : Stage: files Apr 12 18:40:09.577472 ignition[816]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:09.577472 ignition[816]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:09.577472 ignition[816]: DEBUG : files: compiled without relabeling support, skipping Apr 12 18:40:09.583952 ignition[816]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Apr 12 18:40:09.583952 ignition[816]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Apr 12 18:40:09.586649 ignition[816]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Apr 12 18:40:09.586649 ignition[816]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Apr 12 18:40:09.586649 ignition[816]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Apr 12 18:40:09.586611 unknown[816]: wrote ssh authorized keys file for user: core Apr 12 18:40:09.591411 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:40:09.591411 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Apr 12 18:40:09.912302 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Apr 12 18:40:10.163267 ignition[816]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Apr 12 18:40:10.165931 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Apr 12 18:40:10.165931 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:40:10.165931 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Apr 12 18:40:10.404411 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Apr 12 18:40:10.529340 ignition[816]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Apr 12 18:40:10.529340 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Apr 12 18:40:10.533752 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:40:10.533752 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Apr 12 18:40:10.765873 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Apr 12 18:40:10.777231 systemd-networkd[699]: eth0: Gained IPv6LL Apr 12 18:40:10.807257 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Apr 12 18:40:10.809094 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:40:10.809094 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubeadm: attempt #1 Apr 12 18:40:10.855526 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Apr 12 18:40:11.124236 ignition[816]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3e6beeb7794aa002604f0be43af0255e707846760508ebe98006ec72ae8d7a7cf2c14fd52bbcc5084f0e9366b992dc64341b1da646f1ce6e937fb762f880dc15 Apr 12 18:40:11.124236 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Apr 12 18:40:11.128412 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:40:11.128412 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubelet: attempt #1 Apr 12 18:40:11.147636 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Apr 12 18:40:11.751443 ignition[816]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: ded47d757fac0279b1b784756fb54b3a5cb0180ce45833838b00d6d7c87578a985e4627503dd7ff734e5f577cf4752ae7daaa2b68e5934fd4617ea15e995f91b Apr 12 18:40:11.754397 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Apr 12 18:40:11.754397 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:40:11.754397 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.29.2/bin/linux/arm64/kubectl: attempt #1 Apr 12 18:40:11.777476 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Apr 12 18:40:12.055748 ignition[816]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: b303598f3a65bbc366a7bfb4632d3b5cdd2d41b8a7973de80a99f8b1bb058299b57dc39b17a53eb7a54f1a0479ae4e2093fec675f1baff4613e14e0ed9d65c21 Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:40:12.058880 ignition[816]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Apr 12 18:40:12.058880 ignition[816]: INFO : files: op(f): [started] processing unit "prepare-cni-plugins.service" Apr 12 18:40:12.058880 ignition[816]: INFO : files: op(f): op(10): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:40:12.058880 ignition[816]: INFO : files: op(f): op(10): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Apr 12 18:40:12.058880 ignition[816]: INFO : files: op(f): [finished] processing unit "prepare-cni-plugins.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(11): [started] processing unit "prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(11): op(12): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(11): op(12): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(11): [finished] processing unit "prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(13): [started] processing unit "prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(13): op(14): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(13): op(14): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(13): [finished] processing unit "prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(15): [started] processing unit "coreos-metadata.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(15): op(16): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(15): op(16): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(15): [finished] processing unit "coreos-metadata.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(17): [started] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-cni-plugins.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(18): [started] setting preset to enabled for "prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-critools.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Apr 12 18:40:12.094309 ignition[816]: INFO : files: op(1a): [started] setting preset to disabled for "coreos-metadata.service" Apr 12 18:40:12.136679 kernel: kauditd_printk_skb: 23 callbacks suppressed Apr 12 18:40:12.136702 kernel: audit: type=1130 audit(1712947212.105:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.136712 kernel: audit: type=1130 audit(1712947212.114:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.136722 kernel: audit: type=1131 audit(1712947212.114:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.136731 kernel: audit: type=1130 audit(1712947212.123:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.105000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.114000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.114000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.104450 systemd[1]: Finished ignition-files.service. Apr 12 18:40:12.137640 ignition[816]: INFO : files: op(1a): op(1b): [started] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:40:12.137640 ignition[816]: INFO : files: op(1a): op(1b): [finished] removing enablement symlink(s) for "coreos-metadata.service" Apr 12 18:40:12.137640 ignition[816]: INFO : files: op(1a): [finished] setting preset to disabled for "coreos-metadata.service" Apr 12 18:40:12.137640 ignition[816]: INFO : files: createResultFile: createFiles: op(1c): [started] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:40:12.137640 ignition[816]: INFO : files: createResultFile: createFiles: op(1c): [finished] writing file "/sysroot/etc/.ignition-result.json" Apr 12 18:40:12.137640 ignition[816]: INFO : files: files passed Apr 12 18:40:12.137640 ignition[816]: INFO : Ignition finished successfully Apr 12 18:40:12.152874 kernel: audit: type=1130 audit(1712947212.141:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.152893 kernel: audit: type=1131 audit(1712947212.141:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.141000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.141000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.106185 systemd[1]: Starting initrd-setup-root-after-ignition.service... Apr 12 18:40:12.109405 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Apr 12 18:40:12.155771 initrd-setup-root-after-ignition[840]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Apr 12 18:40:12.110165 systemd[1]: Starting ignition-quench.service... Apr 12 18:40:12.158026 initrd-setup-root-after-ignition[843]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Apr 12 18:40:12.113620 systemd[1]: ignition-quench.service: Deactivated successfully. Apr 12 18:40:12.113698 systemd[1]: Finished ignition-quench.service. Apr 12 18:40:12.120519 systemd[1]: Finished initrd-setup-root-after-ignition.service. Apr 12 18:40:12.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.123390 systemd[1]: Reached target ignition-complete.target. Apr 12 18:40:12.166572 kernel: audit: type=1130 audit(1712947212.161:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.127995 systemd[1]: Starting initrd-parse-etc.service... Apr 12 18:40:12.139678 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Apr 12 18:40:12.139756 systemd[1]: Finished initrd-parse-etc.service. Apr 12 18:40:12.141396 systemd[1]: Reached target initrd-fs.target. Apr 12 18:40:12.147401 systemd[1]: Reached target initrd.target. Apr 12 18:40:12.149463 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Apr 12 18:40:12.150170 systemd[1]: Starting dracut-pre-pivot.service... Apr 12 18:40:12.160693 systemd[1]: Finished dracut-pre-pivot.service. Apr 12 18:40:12.162839 systemd[1]: Starting initrd-cleanup.service... Apr 12 18:40:12.170944 systemd[1]: Stopped target nss-lookup.target. Apr 12 18:40:12.176000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.172302 systemd[1]: Stopped target remote-cryptsetup.target. Apr 12 18:40:12.180211 kernel: audit: type=1131 audit(1712947212.176:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.173653 systemd[1]: Stopped target timers.target. Apr 12 18:40:12.174927 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Apr 12 18:40:12.175030 systemd[1]: Stopped dracut-pre-pivot.service. Apr 12 18:40:12.176294 systemd[1]: Stopped target initrd.target. Apr 12 18:40:12.179601 systemd[1]: Stopped target basic.target. Apr 12 18:40:12.180871 systemd[1]: Stopped target ignition-complete.target. Apr 12 18:40:12.182204 systemd[1]: Stopped target ignition-diskful.target. Apr 12 18:40:12.183696 systemd[1]: Stopped target initrd-root-device.target. Apr 12 18:40:12.184994 systemd[1]: Stopped target remote-fs.target. Apr 12 18:40:12.186221 systemd[1]: Stopped target remote-fs-pre.target. Apr 12 18:40:12.187449 systemd[1]: Stopped target sysinit.target. Apr 12 18:40:12.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.188731 systemd[1]: Stopped target local-fs.target. Apr 12 18:40:12.197929 kernel: audit: type=1131 audit(1712947212.193:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.189996 systemd[1]: Stopped target local-fs-pre.target. Apr 12 18:40:12.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.191393 systemd[1]: Stopped target swap.target. Apr 12 18:40:12.202783 kernel: audit: type=1131 audit(1712947212.198:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.202000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.192613 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Apr 12 18:40:12.192721 systemd[1]: Stopped dracut-pre-mount.service. Apr 12 18:40:12.194044 systemd[1]: Stopped target cryptsetup.target. Apr 12 18:40:12.197418 systemd[1]: dracut-initqueue.service: Deactivated successfully. Apr 12 18:40:12.197520 systemd[1]: Stopped dracut-initqueue.service. Apr 12 18:40:12.198728 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Apr 12 18:40:12.198821 systemd[1]: Stopped ignition-fetch-offline.service. Apr 12 18:40:12.202407 systemd[1]: Stopped target paths.target. Apr 12 18:40:12.211000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.203466 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Apr 12 18:40:12.212000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.206519 systemd[1]: Stopped systemd-ask-password-console.path. Apr 12 18:40:12.207453 systemd[1]: Stopped target slices.target. Apr 12 18:40:12.216816 iscsid[704]: iscsid shutting down. Apr 12 18:40:12.208678 systemd[1]: Stopped target sockets.target. Apr 12 18:40:12.210265 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Apr 12 18:40:12.210369 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Apr 12 18:40:12.221611 ignition[856]: INFO : Ignition 2.14.0 Apr 12 18:40:12.221611 ignition[856]: INFO : Stage: umount Apr 12 18:40:12.221611 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" Apr 12 18:40:12.221611 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Apr 12 18:40:12.218000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.222000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.223000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.225000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.211784 systemd[1]: ignition-files.service: Deactivated successfully. Apr 12 18:40:12.230159 ignition[856]: INFO : umount: umount passed Apr 12 18:40:12.230159 ignition[856]: INFO : Ignition finished successfully Apr 12 18:40:12.211874 systemd[1]: Stopped ignition-files.service. Apr 12 18:40:12.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.213752 systemd[1]: Stopping ignition-mount.service... Apr 12 18:40:12.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.233000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.215263 systemd[1]: Stopping iscsid.service... Apr 12 18:40:12.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.217362 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Apr 12 18:40:12.236000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.217511 systemd[1]: Stopped kmod-static-nodes.service. Apr 12 18:40:12.219395 systemd[1]: Stopping sysroot-boot.service... Apr 12 18:40:12.220831 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Apr 12 18:40:12.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.220971 systemd[1]: Stopped systemd-udev-trigger.service. Apr 12 18:40:12.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.222527 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Apr 12 18:40:12.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.222621 systemd[1]: Stopped dracut-pre-trigger.service. Apr 12 18:40:12.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.225260 systemd[1]: iscsid.service: Deactivated successfully. Apr 12 18:40:12.225364 systemd[1]: Stopped iscsid.service. Apr 12 18:40:12.226542 systemd[1]: iscsid.socket: Deactivated successfully. Apr 12 18:40:12.226606 systemd[1]: Closed iscsid.socket. Apr 12 18:40:12.227990 systemd[1]: Stopping iscsiuio.service... Apr 12 18:40:12.231431 systemd[1]: sysroot-boot.mount: Deactivated successfully. Apr 12 18:40:12.231876 systemd[1]: iscsiuio.service: Deactivated successfully. Apr 12 18:40:12.231965 systemd[1]: Stopped iscsiuio.service. Apr 12 18:40:12.232989 systemd[1]: initrd-cleanup.service: Deactivated successfully. Apr 12 18:40:12.233085 systemd[1]: Finished initrd-cleanup.service. Apr 12 18:40:12.234274 systemd[1]: ignition-mount.service: Deactivated successfully. Apr 12 18:40:12.234351 systemd[1]: Stopped ignition-mount.service. Apr 12 18:40:12.235568 systemd[1]: sysroot-boot.service: Deactivated successfully. Apr 12 18:40:12.235651 systemd[1]: Stopped sysroot-boot.service. Apr 12 18:40:12.237396 systemd[1]: Stopped target network.target. Apr 12 18:40:12.238189 systemd[1]: iscsiuio.socket: Deactivated successfully. Apr 12 18:40:12.238227 systemd[1]: Closed iscsiuio.socket. Apr 12 18:40:12.239424 systemd[1]: ignition-disks.service: Deactivated successfully. Apr 12 18:40:12.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.262000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.263000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.239466 systemd[1]: Stopped ignition-disks.service. Apr 12 18:40:12.240718 systemd[1]: ignition-kargs.service: Deactivated successfully. Apr 12 18:40:12.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.240758 systemd[1]: Stopped ignition-kargs.service. Apr 12 18:40:12.242264 systemd[1]: ignition-setup.service: Deactivated successfully. Apr 12 18:40:12.270000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.242305 systemd[1]: Stopped ignition-setup.service. Apr 12 18:40:12.243540 systemd[1]: initrd-setup-root.service: Deactivated successfully. Apr 12 18:40:12.243580 systemd[1]: Stopped initrd-setup-root.service. Apr 12 18:40:12.245172 systemd[1]: Stopping systemd-networkd.service... Apr 12 18:40:12.273000 audit: BPF prog-id=6 op=UNLOAD Apr 12 18:40:12.246528 systemd[1]: Stopping systemd-resolved.service... Apr 12 18:40:12.254148 systemd-networkd[699]: eth0: DHCPv6 lease lost Apr 12 18:40:12.275000 audit: BPF prog-id=9 op=UNLOAD Apr 12 18:40:12.275000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.255281 systemd[1]: systemd-networkd.service: Deactivated successfully. Apr 12 18:40:12.277000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.255378 systemd[1]: Stopped systemd-networkd.service. Apr 12 18:40:12.257414 systemd[1]: systemd-networkd.socket: Deactivated successfully. Apr 12 18:40:12.257447 systemd[1]: Closed systemd-networkd.socket. Apr 12 18:40:12.281000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.259423 systemd[1]: Stopping network-cleanup.service... Apr 12 18:40:12.282000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.260772 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Apr 12 18:40:12.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.260828 systemd[1]: Stopped parse-ip-for-networkd.service. Apr 12 18:40:12.262386 systemd[1]: systemd-sysctl.service: Deactivated successfully. Apr 12 18:40:12.262428 systemd[1]: Stopped systemd-sysctl.service. Apr 12 18:40:12.264345 systemd[1]: systemd-modules-load.service: Deactivated successfully. Apr 12 18:40:12.264385 systemd[1]: Stopped systemd-modules-load.service. Apr 12 18:40:12.287000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.265286 systemd[1]: Stopping systemd-udevd.service... Apr 12 18:40:12.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.291000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.268987 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Apr 12 18:40:12.269436 systemd[1]: systemd-resolved.service: Deactivated successfully. Apr 12 18:40:12.269528 systemd[1]: Stopped systemd-resolved.service. Apr 12 18:40:12.274743 systemd[1]: network-cleanup.service: Deactivated successfully. Apr 12 18:40:12.274842 systemd[1]: Stopped network-cleanup.service. Apr 12 18:40:12.276345 systemd[1]: systemd-udevd.service: Deactivated successfully. Apr 12 18:40:12.276454 systemd[1]: Stopped systemd-udevd.service. Apr 12 18:40:12.277698 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Apr 12 18:40:12.277731 systemd[1]: Closed systemd-udevd-control.socket. Apr 12 18:40:12.278984 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Apr 12 18:40:12.279021 systemd[1]: Closed systemd-udevd-kernel.socket. Apr 12 18:40:12.280299 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Apr 12 18:40:12.280343 systemd[1]: Stopped dracut-pre-udev.service. Apr 12 18:40:12.281767 systemd[1]: dracut-cmdline.service: Deactivated successfully. Apr 12 18:40:12.281808 systemd[1]: Stopped dracut-cmdline.service. Apr 12 18:40:12.282982 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Apr 12 18:40:12.283024 systemd[1]: Stopped dracut-cmdline-ask.service. Apr 12 18:40:12.285030 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Apr 12 18:40:12.285915 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Apr 12 18:40:12.285971 systemd[1]: Stopped systemd-vconsole-setup.service. Apr 12 18:40:12.290658 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Apr 12 18:40:12.290770 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Apr 12 18:40:12.291862 systemd[1]: Reached target initrd-switch-root.target. Apr 12 18:40:12.294082 systemd[1]: Starting initrd-switch-root.service... Apr 12 18:40:12.300847 systemd[1]: Switching root. Apr 12 18:40:12.318562 systemd-journald[249]: Journal stopped Apr 12 18:40:14.396770 systemd-journald[249]: Received SIGTERM from PID 1 (systemd). Apr 12 18:40:14.396821 kernel: SELinux: Class mctp_socket not defined in policy. Apr 12 18:40:14.396834 kernel: SELinux: Class anon_inode not defined in policy. Apr 12 18:40:14.396844 kernel: SELinux: the above unknown classes and permissions will be allowed Apr 12 18:40:14.396854 kernel: SELinux: policy capability network_peer_controls=1 Apr 12 18:40:14.396866 kernel: SELinux: policy capability open_perms=1 Apr 12 18:40:14.396877 kernel: SELinux: policy capability extended_socket_class=1 Apr 12 18:40:14.396886 kernel: SELinux: policy capability always_check_network=0 Apr 12 18:40:14.396895 kernel: SELinux: policy capability cgroup_seclabel=1 Apr 12 18:40:14.396905 kernel: SELinux: policy capability nnp_nosuid_transition=1 Apr 12 18:40:14.396914 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Apr 12 18:40:14.396923 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Apr 12 18:40:14.396933 systemd[1]: Successfully loaded SELinux policy in 33.993ms. Apr 12 18:40:14.396953 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.960ms. Apr 12 18:40:14.396966 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Apr 12 18:40:14.396977 systemd[1]: Detected virtualization kvm. Apr 12 18:40:14.396988 systemd[1]: Detected architecture arm64. Apr 12 18:40:14.396998 systemd[1]: Detected first boot. Apr 12 18:40:14.397009 systemd[1]: Initializing machine ID from VM UUID. Apr 12 18:40:14.397020 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Apr 12 18:40:14.397031 systemd[1]: Populated /etc with preset unit settings. Apr 12 18:40:14.397043 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:40:14.397066 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:40:14.397078 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:40:14.397090 systemd[1]: initrd-switch-root.service: Deactivated successfully. Apr 12 18:40:14.397100 systemd[1]: Stopped initrd-switch-root.service. Apr 12 18:40:14.397111 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Apr 12 18:40:14.397133 systemd[1]: Created slice system-addon\x2dconfig.slice. Apr 12 18:40:14.397147 systemd[1]: Created slice system-addon\x2drun.slice. Apr 12 18:40:14.397157 systemd[1]: Created slice system-getty.slice. Apr 12 18:40:14.397168 systemd[1]: Created slice system-modprobe.slice. Apr 12 18:40:14.397178 systemd[1]: Created slice system-serial\x2dgetty.slice. Apr 12 18:40:14.397189 systemd[1]: Created slice system-system\x2dcloudinit.slice. Apr 12 18:40:14.397200 systemd[1]: Created slice system-systemd\x2dfsck.slice. Apr 12 18:40:14.397211 systemd[1]: Created slice user.slice. Apr 12 18:40:14.397221 systemd[1]: Started systemd-ask-password-console.path. Apr 12 18:40:14.397231 systemd[1]: Started systemd-ask-password-wall.path. Apr 12 18:40:14.397242 systemd[1]: Set up automount boot.automount. Apr 12 18:40:14.397253 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Apr 12 18:40:14.397263 systemd[1]: Stopped target initrd-switch-root.target. Apr 12 18:40:14.397273 systemd[1]: Stopped target initrd-fs.target. Apr 12 18:40:14.397285 systemd[1]: Stopped target initrd-root-fs.target. Apr 12 18:40:14.397298 systemd[1]: Reached target integritysetup.target. Apr 12 18:40:14.397309 systemd[1]: Reached target remote-cryptsetup.target. Apr 12 18:40:14.397320 systemd[1]: Reached target remote-fs.target. Apr 12 18:40:14.397331 systemd[1]: Reached target slices.target. Apr 12 18:40:14.397341 systemd[1]: Reached target swap.target. Apr 12 18:40:14.397352 systemd[1]: Reached target torcx.target. Apr 12 18:40:14.397363 systemd[1]: Reached target veritysetup.target. Apr 12 18:40:14.397373 systemd[1]: Listening on systemd-coredump.socket. Apr 12 18:40:14.397383 systemd[1]: Listening on systemd-initctl.socket. Apr 12 18:40:14.397393 systemd[1]: Listening on systemd-networkd.socket. Apr 12 18:40:14.397403 systemd[1]: Listening on systemd-udevd-control.socket. Apr 12 18:40:14.397414 systemd[1]: Listening on systemd-udevd-kernel.socket. Apr 12 18:40:14.397425 systemd[1]: Listening on systemd-userdbd.socket. Apr 12 18:40:14.397436 systemd[1]: Mounting dev-hugepages.mount... Apr 12 18:40:14.399295 systemd[1]: Mounting dev-mqueue.mount... Apr 12 18:40:14.399316 systemd[1]: Mounting media.mount... Apr 12 18:40:14.399327 systemd[1]: Mounting sys-kernel-debug.mount... Apr 12 18:40:14.399338 systemd[1]: Mounting sys-kernel-tracing.mount... Apr 12 18:40:14.399348 systemd[1]: Mounting tmp.mount... Apr 12 18:40:14.399359 systemd[1]: Starting flatcar-tmpfiles.service... Apr 12 18:40:14.399370 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Apr 12 18:40:14.399384 systemd[1]: Starting kmod-static-nodes.service... Apr 12 18:40:14.399395 systemd[1]: Starting modprobe@configfs.service... Apr 12 18:40:14.399405 systemd[1]: Starting modprobe@dm_mod.service... Apr 12 18:40:14.399415 systemd[1]: Starting modprobe@drm.service... Apr 12 18:40:14.399427 systemd[1]: Starting modprobe@efi_pstore.service... Apr 12 18:40:14.399438 systemd[1]: Starting modprobe@fuse.service... Apr 12 18:40:14.399448 systemd[1]: Starting modprobe@loop.service... Apr 12 18:40:14.399459 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Apr 12 18:40:14.399470 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Apr 12 18:40:14.399481 systemd[1]: Stopped systemd-fsck-root.service. Apr 12 18:40:14.399492 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Apr 12 18:40:14.399503 systemd[1]: Stopped systemd-fsck-usr.service. Apr 12 18:40:14.399514 kernel: fuse: init (API version 7.34) Apr 12 18:40:14.399524 kernel: loop: module loaded Apr 12 18:40:14.399535 systemd[1]: Stopped systemd-journald.service. Apr 12 18:40:14.399547 systemd[1]: Starting systemd-journald.service... Apr 12 18:40:14.399558 systemd[1]: Starting systemd-modules-load.service... Apr 12 18:40:14.399569 systemd[1]: Starting systemd-network-generator.service... Apr 12 18:40:14.399579 systemd[1]: Starting systemd-remount-fs.service... Apr 12 18:40:14.399590 systemd[1]: Starting systemd-udev-trigger.service... Apr 12 18:40:14.399601 systemd[1]: verity-setup.service: Deactivated successfully. Apr 12 18:40:14.399613 systemd[1]: Stopped verity-setup.service. Apr 12 18:40:14.399623 systemd[1]: Mounted dev-hugepages.mount. Apr 12 18:40:14.399633 systemd[1]: Mounted dev-mqueue.mount. Apr 12 18:40:14.399643 systemd[1]: Mounted media.mount. Apr 12 18:40:14.399655 systemd[1]: Mounted sys-kernel-debug.mount. Apr 12 18:40:14.399665 systemd[1]: Mounted sys-kernel-tracing.mount. Apr 12 18:40:14.399676 systemd[1]: Mounted tmp.mount. Apr 12 18:40:14.399687 systemd[1]: Finished kmod-static-nodes.service. Apr 12 18:40:14.399698 systemd[1]: modprobe@configfs.service: Deactivated successfully. Apr 12 18:40:14.399709 systemd[1]: Finished modprobe@configfs.service. Apr 12 18:40:14.399719 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Apr 12 18:40:14.399730 systemd[1]: Finished modprobe@dm_mod.service. Apr 12 18:40:14.399743 systemd-journald[955]: Journal started Apr 12 18:40:14.399788 systemd-journald[955]: Runtime Journal (/run/log/journal/b408c28518224e7d839a48a5e574725e) is 6.0M, max 48.7M, 42.6M free. Apr 12 18:40:12.379000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Apr 12 18:40:12.557000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:40:12.557000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Apr 12 18:40:12.557000 audit: BPF prog-id=10 op=LOAD Apr 12 18:40:12.557000 audit: BPF prog-id=10 op=UNLOAD Apr 12 18:40:12.557000 audit: BPF prog-id=11 op=LOAD Apr 12 18:40:12.557000 audit: BPF prog-id=11 op=UNLOAD Apr 12 18:40:12.596000 audit[890]: AVC avc: denied { associate } for pid=890 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Apr 12 18:40:12.596000 audit[890]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58ac a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=873 pid=890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:12.596000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:40:12.597000 audit[890]: AVC avc: denied { associate } for pid=890 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Apr 12 18:40:12.597000 audit[890]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000022030 a2=1ed a3=0 items=2 ppid=873 pid=890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:12.597000 audit: CWD cwd="/" Apr 12 18:40:12.597000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:40:12.597000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:40:12.597000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Apr 12 18:40:14.258000 audit: BPF prog-id=12 op=LOAD Apr 12 18:40:14.258000 audit: BPF prog-id=3 op=UNLOAD Apr 12 18:40:14.258000 audit: BPF prog-id=13 op=LOAD Apr 12 18:40:14.258000 audit: BPF prog-id=14 op=LOAD Apr 12 18:40:14.258000 audit: BPF prog-id=4 op=UNLOAD Apr 12 18:40:14.258000 audit: BPF prog-id=5 op=UNLOAD Apr 12 18:40:14.258000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.261000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.274000 audit: BPF prog-id=12 op=UNLOAD Apr 12 18:40:14.359000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.362000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.364000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.365000 audit: BPF prog-id=15 op=LOAD Apr 12 18:40:14.365000 audit: BPF prog-id=16 op=LOAD Apr 12 18:40:14.365000 audit: BPF prog-id=17 op=LOAD Apr 12 18:40:14.365000 audit: BPF prog-id=13 op=UNLOAD Apr 12 18:40:14.365000 audit: BPF prog-id=14 op=UNLOAD Apr 12 18:40:14.381000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.393000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Apr 12 18:40:14.393000 audit[955]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=fffffba56bd0 a2=4000 a3=1 items=0 ppid=1 pid=955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:14.393000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Apr 12 18:40:14.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.594840 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:40:14.256314 systemd[1]: Queued start job for default target multi-user.target. Apr 12 18:40:12.595079 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:40:14.256325 systemd[1]: Unnecessary job was removed for dev-vda6.device. Apr 12 18:40:12.595097 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:40:14.258722 systemd[1]: systemd-journald.service: Deactivated successfully. Apr 12 18:40:12.595147 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Apr 12 18:40:12.595157 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="skipped missing lower profile" missing profile=oem Apr 12 18:40:12.595183 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Apr 12 18:40:12.595194 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Apr 12 18:40:12.595375 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Apr 12 18:40:14.401606 systemd[1]: Started systemd-journald.service. Apr 12 18:40:12.595405 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Apr 12 18:40:12.595417 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Apr 12 18:40:12.596131 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Apr 12 18:40:12.596168 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Apr 12 18:40:14.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:12.596186 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.3: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.3 Apr 12 18:40:12.596199 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Apr 12 18:40:12.596216 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.3: no such file or directory" path=/var/lib/torcx/store/3510.3.3 Apr 12 18:40:12.596229 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:12Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Apr 12 18:40:14.008318 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:40:14.008578 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:40:14.402341 systemd[1]: modprobe@drm.service: Deactivated successfully. Apr 12 18:40:14.008665 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:40:14.402483 systemd[1]: Finished modprobe@drm.service. Apr 12 18:40:14.008814 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Apr 12 18:40:14.008859 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Apr 12 18:40:14.008913 /usr/lib/systemd/system-generators/torcx-generator[890]: time="2024-04-12T18:40:14Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Apr 12 18:40:14.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.403577 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Apr 12 18:40:14.403748 systemd[1]: Finished modprobe@efi_pstore.service. Apr 12 18:40:14.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.404976 systemd[1]: Finished flatcar-tmpfiles.service. Apr 12 18:40:14.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.406035 systemd[1]: modprobe@fuse.service: Deactivated successfully. Apr 12 18:40:14.406196 systemd[1]: Finished modprobe@fuse.service. Apr 12 18:40:14.406000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.406000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.407216 systemd[1]: modprobe@loop.service: Deactivated successfully. Apr 12 18:40:14.407369 systemd[1]: Finished modprobe@loop.service. Apr 12 18:40:14.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.408520 systemd[1]: Finished systemd-modules-load.service. Apr 12 18:40:14.409000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.409699 systemd[1]: Finished systemd-network-generator.service. Apr 12 18:40:14.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.410847 systemd[1]: Finished systemd-remount-fs.service. Apr 12 18:40:14.411000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.412268 systemd[1]: Reached target network-pre.target. Apr 12 18:40:14.414113 systemd[1]: Mounting sys-fs-fuse-connections.mount... Apr 12 18:40:14.416027 systemd[1]: Mounting sys-kernel-config.mount... Apr 12 18:40:14.416895 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Apr 12 18:40:14.418342 systemd[1]: Starting systemd-hwdb-update.service... Apr 12 18:40:14.420332 systemd[1]: Starting systemd-journal-flush.service... Apr 12 18:40:14.421230 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Apr 12 18:40:14.422345 systemd[1]: Starting systemd-random-seed.service... Apr 12 18:40:14.423205 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Apr 12 18:40:14.424346 systemd[1]: Starting systemd-sysctl.service... Apr 12 18:40:14.426503 systemd[1]: Starting systemd-sysusers.service... Apr 12 18:40:14.428660 systemd-journald[955]: Time spent on flushing to /var/log/journal/b408c28518224e7d839a48a5e574725e is 12.530ms for 1020 entries. Apr 12 18:40:14.428660 systemd-journald[955]: System Journal (/var/log/journal/b408c28518224e7d839a48a5e574725e) is 8.0M, max 195.6M, 187.6M free. Apr 12 18:40:14.445356 systemd-journald[955]: Received client request to flush runtime journal. Apr 12 18:40:14.431000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.430403 systemd[1]: Finished systemd-udev-trigger.service. Apr 12 18:40:14.431542 systemd[1]: Mounted sys-fs-fuse-connections.mount. Apr 12 18:40:14.432520 systemd[1]: Mounted sys-kernel-config.mount. Apr 12 18:40:14.434333 systemd[1]: Starting systemd-udev-settle.service... Apr 12 18:40:14.444431 systemd[1]: Finished systemd-random-seed.service. Apr 12 18:40:14.445515 systemd[1]: Reached target first-boot-complete.target. Apr 12 18:40:14.446705 systemd[1]: Finished systemd-journal-flush.service. Apr 12 18:40:14.447000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.447904 udevadm[989]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Apr 12 18:40:14.451083 systemd[1]: Finished systemd-sysctl.service. Apr 12 18:40:14.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.456626 systemd[1]: Finished systemd-sysusers.service. Apr 12 18:40:14.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.766941 systemd[1]: Finished systemd-hwdb-update.service. Apr 12 18:40:14.768000 audit: BPF prog-id=18 op=LOAD Apr 12 18:40:14.768000 audit: BPF prog-id=19 op=LOAD Apr 12 18:40:14.768000 audit: BPF prog-id=7 op=UNLOAD Apr 12 18:40:14.768000 audit: BPF prog-id=8 op=UNLOAD Apr 12 18:40:14.769185 systemd[1]: Starting systemd-udevd.service... Apr 12 18:40:14.790289 systemd-udevd[992]: Using default interface naming scheme 'v252'. Apr 12 18:40:14.803157 systemd[1]: Started systemd-udevd.service. Apr 12 18:40:14.803000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.805000 audit: BPF prog-id=20 op=LOAD Apr 12 18:40:14.807849 systemd[1]: Starting systemd-networkd.service... Apr 12 18:40:14.814000 audit: BPF prog-id=21 op=LOAD Apr 12 18:40:14.814000 audit: BPF prog-id=22 op=LOAD Apr 12 18:40:14.814000 audit: BPF prog-id=23 op=LOAD Apr 12 18:40:14.815100 systemd[1]: Starting systemd-userdbd.service... Apr 12 18:40:14.834242 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Apr 12 18:40:14.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.847057 systemd[1]: Started systemd-userdbd.service. Apr 12 18:40:14.848896 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Apr 12 18:40:14.894541 systemd-networkd[1006]: lo: Link UP Apr 12 18:40:14.894555 systemd-networkd[1006]: lo: Gained carrier Apr 12 18:40:14.894901 systemd-networkd[1006]: Enumeration completed Apr 12 18:40:14.894986 systemd[1]: Started systemd-networkd.service. Apr 12 18:40:14.895006 systemd-networkd[1006]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Apr 12 18:40:14.895000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.896620 systemd-networkd[1006]: eth0: Link UP Apr 12 18:40:14.896631 systemd-networkd[1006]: eth0: Gained carrier Apr 12 18:40:14.917221 systemd-networkd[1006]: eth0: DHCPv4 address 10.0.0.136/16, gateway 10.0.0.1 acquired from 10.0.0.1 Apr 12 18:40:14.922555 systemd[1]: Finished systemd-udev-settle.service. Apr 12 18:40:14.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.924427 systemd[1]: Starting lvm2-activation-early.service... Apr 12 18:40:14.937610 lvm[1020]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:40:14.962937 systemd[1]: Finished lvm2-activation-early.service. Apr 12 18:40:14.963000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:14.963923 systemd[1]: Reached target cryptsetup.target. Apr 12 18:40:14.965665 systemd[1]: Starting lvm2-activation.service... Apr 12 18:40:14.968835 lvm[1021]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Apr 12 18:40:15.001866 systemd[1]: Finished lvm2-activation.service. Apr 12 18:40:15.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.002745 systemd[1]: Reached target local-fs-pre.target. Apr 12 18:40:15.003556 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Apr 12 18:40:15.003588 systemd[1]: Reached target local-fs.target. Apr 12 18:40:15.004339 systemd[1]: Reached target machines.target. Apr 12 18:40:15.005987 systemd[1]: Starting ldconfig.service... Apr 12 18:40:15.006957 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Apr 12 18:40:15.007009 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:40:15.007948 systemd[1]: Starting systemd-boot-update.service... Apr 12 18:40:15.009829 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Apr 12 18:40:15.011793 systemd[1]: Starting systemd-machine-id-commit.service... Apr 12 18:40:15.012734 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:40:15.012777 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Apr 12 18:40:15.013759 systemd[1]: Starting systemd-tmpfiles-setup.service... Apr 12 18:40:15.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.016985 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1023 (bootctl) Apr 12 18:40:15.018004 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Apr 12 18:40:15.020434 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Apr 12 18:40:15.031214 systemd-tmpfiles[1026]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Apr 12 18:40:15.032938 systemd-tmpfiles[1026]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Apr 12 18:40:15.035613 systemd-tmpfiles[1026]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Apr 12 18:40:15.050499 systemd-fsck[1033]: fsck.fat 4.2 (2021-01-31) Apr 12 18:40:15.050499 systemd-fsck[1033]: /dev/vda1: 236 files, 117047/258078 clusters Apr 12 18:40:15.052087 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Apr 12 18:40:15.052000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.054427 systemd[1]: Mounting boot.mount... Apr 12 18:40:15.130040 systemd[1]: Mounted boot.mount. Apr 12 18:40:15.136914 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Apr 12 18:40:15.137514 systemd[1]: Finished systemd-machine-id-commit.service. Apr 12 18:40:15.138000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.138760 systemd[1]: Finished systemd-boot-update.service. Apr 12 18:40:15.139000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.206587 systemd[1]: Finished systemd-tmpfiles-setup.service. Apr 12 18:40:15.207000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.208938 systemd[1]: Starting audit-rules.service... Apr 12 18:40:15.210642 systemd[1]: Starting clean-ca-certificates.service... Apr 12 18:40:15.215000 audit: BPF prog-id=24 op=LOAD Apr 12 18:40:15.212404 systemd[1]: Starting systemd-journal-catalog-update.service... Apr 12 18:40:15.216016 systemd[1]: Starting systemd-resolved.service... Apr 12 18:40:15.217000 audit: BPF prog-id=25 op=LOAD Apr 12 18:40:15.218268 systemd[1]: Starting systemd-timesyncd.service... Apr 12 18:40:15.220779 ldconfig[1022]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Apr 12 18:40:15.223150 systemd[1]: Starting systemd-update-utmp.service... Apr 12 18:40:15.224456 systemd[1]: Finished clean-ca-certificates.service. Apr 12 18:40:15.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.225635 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Apr 12 18:40:15.227108 systemd[1]: Finished ldconfig.service. Apr 12 18:40:15.227000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.229000 audit[1047]: SYSTEM_BOOT pid=1047 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.231615 systemd[1]: Finished systemd-update-utmp.service. Apr 12 18:40:15.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.233083 systemd[1]: Finished systemd-journal-catalog-update.service. Apr 12 18:40:15.233000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.235104 systemd[1]: Starting systemd-update-done.service... Apr 12 18:40:15.243000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-done comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:15.242954 systemd[1]: Finished systemd-update-done.service. Apr 12 18:40:15.254000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Apr 12 18:40:15.254000 audit[1057]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff43dc4d0 a2=420 a3=0 items=0 ppid=1036 pid=1057 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:15.254000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Apr 12 18:40:15.254810 augenrules[1057]: No rules Apr 12 18:40:15.255627 systemd[1]: Finished audit-rules.service. Apr 12 18:40:15.267963 systemd[1]: Started systemd-timesyncd.service. Apr 12 18:40:15.268696 systemd-timesyncd[1041]: Contacted time server 10.0.0.1:123 (10.0.0.1). Apr 12 18:40:15.268996 systemd-timesyncd[1041]: Initial clock synchronization to Fri 2024-04-12 18:40:14.910158 UTC. Apr 12 18:40:15.269110 systemd[1]: Reached target time-set.target. Apr 12 18:40:15.269790 systemd-resolved[1040]: Positive Trust Anchors: Apr 12 18:40:15.269800 systemd-resolved[1040]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Apr 12 18:40:15.269827 systemd-resolved[1040]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Apr 12 18:40:15.281104 systemd-resolved[1040]: Defaulting to hostname 'linux'. Apr 12 18:40:15.282398 systemd[1]: Started systemd-resolved.service. Apr 12 18:40:15.283232 systemd[1]: Reached target network.target. Apr 12 18:40:15.283942 systemd[1]: Reached target nss-lookup.target. Apr 12 18:40:15.284723 systemd[1]: Reached target sysinit.target. Apr 12 18:40:15.285527 systemd[1]: Started motdgen.path. Apr 12 18:40:15.286215 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Apr 12 18:40:15.287334 systemd[1]: Started logrotate.timer. Apr 12 18:40:15.288092 systemd[1]: Started mdadm.timer. Apr 12 18:40:15.288730 systemd[1]: Started systemd-tmpfiles-clean.timer. Apr 12 18:40:15.289533 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Apr 12 18:40:15.289568 systemd[1]: Reached target paths.target. Apr 12 18:40:15.290278 systemd[1]: Reached target timers.target. Apr 12 18:40:15.291292 systemd[1]: Listening on dbus.socket. Apr 12 18:40:15.292844 systemd[1]: Starting docker.socket... Apr 12 18:40:15.295724 systemd[1]: Listening on sshd.socket. Apr 12 18:40:15.296535 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:40:15.296916 systemd[1]: Listening on docker.socket. Apr 12 18:40:15.297728 systemd[1]: Reached target sockets.target. Apr 12 18:40:15.298482 systemd[1]: Reached target basic.target. Apr 12 18:40:15.299220 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:40:15.299247 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Apr 12 18:40:15.300163 systemd[1]: Starting containerd.service... Apr 12 18:40:15.301753 systemd[1]: Starting dbus.service... Apr 12 18:40:15.303321 systemd[1]: Starting enable-oem-cloudinit.service... Apr 12 18:40:15.305160 systemd[1]: Starting extend-filesystems.service... Apr 12 18:40:15.305985 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Apr 12 18:40:15.307035 systemd[1]: Starting motdgen.service... Apr 12 18:40:15.308736 systemd[1]: Starting prepare-cni-plugins.service... Apr 12 18:40:15.311141 jq[1067]: false Apr 12 18:40:15.311198 systemd[1]: Starting prepare-critools.service... Apr 12 18:40:15.313618 systemd[1]: Starting prepare-helm.service... Apr 12 18:40:15.315431 systemd[1]: Starting ssh-key-proc-cmdline.service... Apr 12 18:40:15.317221 systemd[1]: Starting sshd-keygen.service... Apr 12 18:40:15.320184 systemd[1]: Starting systemd-logind.service... Apr 12 18:40:15.320956 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Apr 12 18:40:15.321022 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Apr 12 18:40:15.321464 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Apr 12 18:40:15.322222 systemd[1]: Starting update-engine.service... Apr 12 18:40:15.323894 systemd[1]: Starting update-ssh-keys-after-ignition.service... Apr 12 18:40:15.325614 extend-filesystems[1068]: Found vda Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda1 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda2 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda3 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found usr Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda4 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda6 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda7 Apr 12 18:40:15.327905 extend-filesystems[1068]: Found vda9 Apr 12 18:40:15.327905 extend-filesystems[1068]: Checking size of /dev/vda9 Apr 12 18:40:15.346669 jq[1087]: true Apr 12 18:40:15.340697 dbus-daemon[1066]: [system] SELinux support is enabled Apr 12 18:40:15.328553 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Apr 12 18:40:15.328710 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Apr 12 18:40:15.331244 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Apr 12 18:40:15.331385 systemd[1]: Finished ssh-key-proc-cmdline.service. Apr 12 18:40:15.350456 tar[1091]: ./ Apr 12 18:40:15.350456 tar[1091]: ./loopback Apr 12 18:40:15.335528 systemd[1]: motdgen.service: Deactivated successfully. Apr 12 18:40:15.335660 systemd[1]: Finished motdgen.service. Apr 12 18:40:15.340837 systemd[1]: Started dbus.service. Apr 12 18:40:15.349116 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Apr 12 18:40:15.349162 systemd[1]: Reached target system-config.target. Apr 12 18:40:15.349971 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Apr 12 18:40:15.349986 systemd[1]: Reached target user-config.target. Apr 12 18:40:15.351745 tar[1093]: linux-arm64/helm Apr 12 18:40:15.351924 jq[1098]: true Apr 12 18:40:15.352570 tar[1092]: crictl Apr 12 18:40:15.370775 extend-filesystems[1068]: Resized partition /dev/vda9 Apr 12 18:40:15.395109 systemd-logind[1083]: Watching system buttons on /dev/input/event0 (Power Button) Apr 12 18:40:15.395336 systemd-logind[1083]: New seat seat0. Apr 12 18:40:15.398329 systemd[1]: Started systemd-logind.service. Apr 12 18:40:15.404341 extend-filesystems[1114]: resize2fs 1.46.5 (30-Dec-2021) Apr 12 18:40:15.413944 tar[1091]: ./bandwidth Apr 12 18:40:15.422150 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Apr 12 18:40:15.450152 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Apr 12 18:40:15.460699 update_engine[1085]: I0412 18:40:15.457659 1085 main.cc:92] Flatcar Update Engine starting Apr 12 18:40:15.463100 extend-filesystems[1114]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Apr 12 18:40:15.463100 extend-filesystems[1114]: old_desc_blocks = 1, new_desc_blocks = 1 Apr 12 18:40:15.463100 extend-filesystems[1114]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Apr 12 18:40:15.470047 extend-filesystems[1068]: Resized filesystem in /dev/vda9 Apr 12 18:40:15.470726 systemd[1]: extend-filesystems.service: Deactivated successfully. Apr 12 18:40:15.470886 systemd[1]: Finished extend-filesystems.service. Apr 12 18:40:15.472404 bash[1122]: Updated "/home/core/.ssh/authorized_keys" Apr 12 18:40:15.472442 systemd[1]: Started update-engine.service. Apr 12 18:40:15.473539 systemd[1]: Finished update-ssh-keys-after-ignition.service. Apr 12 18:40:15.476154 systemd[1]: Started locksmithd.service. Apr 12 18:40:15.477303 update_engine[1085]: I0412 18:40:15.477273 1085 update_check_scheduler.cc:74] Next update check in 11m55s Apr 12 18:40:15.487471 env[1099]: time="2024-04-12T18:40:15.487421480Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Apr 12 18:40:15.494206 tar[1091]: ./ptp Apr 12 18:40:15.529707 env[1099]: time="2024-04-12T18:40:15.529665560Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Apr 12 18:40:15.529832 env[1099]: time="2024-04-12T18:40:15.529810360Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.530914 env[1099]: time="2024-04-12T18:40:15.530881080Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.154-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:40:15.530949 env[1099]: time="2024-04-12T18:40:15.530914120Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531127 env[1099]: time="2024-04-12T18:40:15.531099240Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531160 env[1099]: time="2024-04-12T18:40:15.531136960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531160 env[1099]: time="2024-04-12T18:40:15.531150640Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Apr 12 18:40:15.531198 env[1099]: time="2024-04-12T18:40:15.531160040Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531265 env[1099]: time="2024-04-12T18:40:15.531246200Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531540 env[1099]: time="2024-04-12T18:40:15.531518920Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531655 env[1099]: time="2024-04-12T18:40:15.531634400Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Apr 12 18:40:15.531655 env[1099]: time="2024-04-12T18:40:15.531653720Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Apr 12 18:40:15.531724 env[1099]: time="2024-04-12T18:40:15.531706280Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Apr 12 18:40:15.531724 env[1099]: time="2024-04-12T18:40:15.531721920Z" level=info msg="metadata content store policy set" policy=shared Apr 12 18:40:15.534933 env[1099]: time="2024-04-12T18:40:15.534906560Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Apr 12 18:40:15.534986 env[1099]: time="2024-04-12T18:40:15.534937240Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Apr 12 18:40:15.534986 env[1099]: time="2024-04-12T18:40:15.534949800Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Apr 12 18:40:15.534986 env[1099]: time="2024-04-12T18:40:15.534976560Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535071 env[1099]: time="2024-04-12T18:40:15.534989520Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535071 env[1099]: time="2024-04-12T18:40:15.535002960Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535071 env[1099]: time="2024-04-12T18:40:15.535014680Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535377 env[1099]: time="2024-04-12T18:40:15.535354520Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535405 env[1099]: time="2024-04-12T18:40:15.535378480Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535405 env[1099]: time="2024-04-12T18:40:15.535392200Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535442 env[1099]: time="2024-04-12T18:40:15.535405440Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535442 env[1099]: time="2024-04-12T18:40:15.535417080Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Apr 12 18:40:15.535545 env[1099]: time="2024-04-12T18:40:15.535524360Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Apr 12 18:40:15.535618 env[1099]: time="2024-04-12T18:40:15.535600680Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Apr 12 18:40:15.535805 env[1099]: time="2024-04-12T18:40:15.535787240Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Apr 12 18:40:15.535838 env[1099]: time="2024-04-12T18:40:15.535813720Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.535838 env[1099]: time="2024-04-12T18:40:15.535826720Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Apr 12 18:40:15.535947 env[1099]: time="2024-04-12T18:40:15.535932000Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.535985 env[1099]: time="2024-04-12T18:40:15.535949080Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.535985 env[1099]: time="2024-04-12T18:40:15.535960800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.535985 env[1099]: time="2024-04-12T18:40:15.535972040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.535985 env[1099]: time="2024-04-12T18:40:15.535983320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536068 env[1099]: time="2024-04-12T18:40:15.535995600Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536068 env[1099]: time="2024-04-12T18:40:15.536006680Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536068 env[1099]: time="2024-04-12T18:40:15.536017040Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536068 env[1099]: time="2024-04-12T18:40:15.536029200Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Apr 12 18:40:15.536193 env[1099]: time="2024-04-12T18:40:15.536174800Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536223 env[1099]: time="2024-04-12T18:40:15.536195400Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536223 env[1099]: time="2024-04-12T18:40:15.536207280Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536223 env[1099]: time="2024-04-12T18:40:15.536219000Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Apr 12 18:40:15.536283 env[1099]: time="2024-04-12T18:40:15.536233000Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Apr 12 18:40:15.536283 env[1099]: time="2024-04-12T18:40:15.536243200Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Apr 12 18:40:15.536283 env[1099]: time="2024-04-12T18:40:15.536258680Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Apr 12 18:40:15.536344 env[1099]: time="2024-04-12T18:40:15.536290320Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Apr 12 18:40:15.536523 env[1099]: time="2024-04-12T18:40:15.536470320Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.536525760Z" level=info msg="Connect containerd service" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.536557400Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.537341080Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.537668840Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.537702880Z" level=info msg=serving... address=/run/containerd/containerd.sock Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.537749360Z" level=info msg="containerd successfully booted in 0.051813s" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.538970520Z" level=info msg="Start subscribing containerd event" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.539018880Z" level=info msg="Start recovering state" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.539084600Z" level=info msg="Start event monitor" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.539107680Z" level=info msg="Start snapshots syncer" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.539142800Z" level=info msg="Start cni network conf syncer for default" Apr 12 18:40:15.539274 env[1099]: time="2024-04-12T18:40:15.539152040Z" level=info msg="Start streaming server" Apr 12 18:40:15.537842 systemd[1]: Started containerd.service. Apr 12 18:40:15.560876 tar[1091]: ./vlan Apr 12 18:40:15.605214 tar[1091]: ./host-device Apr 12 18:40:15.638699 tar[1091]: ./tuning Apr 12 18:40:15.668600 tar[1091]: ./vrf Apr 12 18:40:15.699019 tar[1091]: ./sbr Apr 12 18:40:15.728875 tar[1091]: ./tap Apr 12 18:40:15.763301 tar[1091]: ./dhcp Apr 12 18:40:15.805064 tar[1093]: linux-arm64/LICENSE Apr 12 18:40:15.805162 tar[1093]: linux-arm64/README.md Apr 12 18:40:15.809409 systemd[1]: Finished prepare-helm.service. Apr 12 18:40:15.851019 tar[1091]: ./static Apr 12 18:40:15.876758 systemd[1]: Finished prepare-critools.service. Apr 12 18:40:15.877312 tar[1091]: ./firewall Apr 12 18:40:15.886209 locksmithd[1127]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Apr 12 18:40:15.915509 tar[1091]: ./macvlan Apr 12 18:40:15.949220 tar[1091]: ./dummy Apr 12 18:40:15.982434 tar[1091]: ./bridge Apr 12 18:40:16.013183 tar[1091]: ./ipvlan Apr 12 18:40:16.025234 systemd-networkd[1006]: eth0: Gained IPv6LL Apr 12 18:40:16.040419 tar[1091]: ./portmap Apr 12 18:40:16.066298 tar[1091]: ./host-local Apr 12 18:40:16.098301 systemd[1]: Finished prepare-cni-plugins.service. Apr 12 18:40:16.168010 sshd_keygen[1089]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Apr 12 18:40:16.184431 systemd[1]: Finished sshd-keygen.service. Apr 12 18:40:16.186329 systemd[1]: Starting issuegen.service... Apr 12 18:40:16.190530 systemd[1]: issuegen.service: Deactivated successfully. Apr 12 18:40:16.190666 systemd[1]: Finished issuegen.service. Apr 12 18:40:16.192643 systemd[1]: Starting systemd-user-sessions.service... Apr 12 18:40:16.198146 systemd[1]: Finished systemd-user-sessions.service. Apr 12 18:40:16.200084 systemd[1]: Started getty@tty1.service. Apr 12 18:40:16.201910 systemd[1]: Started serial-getty@ttyAMA0.service. Apr 12 18:40:16.202885 systemd[1]: Reached target getty.target. Apr 12 18:40:16.203670 systemd[1]: Reached target multi-user.target. Apr 12 18:40:16.205564 systemd[1]: Starting systemd-update-utmp-runlevel.service... Apr 12 18:40:16.211125 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Apr 12 18:40:16.211276 systemd[1]: Finished systemd-update-utmp-runlevel.service. Apr 12 18:40:16.212231 systemd[1]: Startup finished in 557ms (kernel) + 5.775s (initrd) + 3.869s (userspace) = 10.202s. Apr 12 18:40:19.546306 systemd[1]: Created slice system-sshd.slice. Apr 12 18:40:19.547742 systemd[1]: Started sshd@0-10.0.0.136:22-10.0.0.1:38770.service. Apr 12 18:40:19.587394 sshd[1155]: Accepted publickey for core from 10.0.0.1 port 38770 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:19.589536 sshd[1155]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:19.599513 systemd-logind[1083]: New session 1 of user core. Apr 12 18:40:19.601659 systemd[1]: Created slice user-500.slice. Apr 12 18:40:19.602682 systemd[1]: Starting user-runtime-dir@500.service... Apr 12 18:40:19.610167 systemd[1]: Finished user-runtime-dir@500.service. Apr 12 18:40:19.611390 systemd[1]: Starting user@500.service... Apr 12 18:40:19.613910 (systemd)[1158]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:19.669578 systemd[1158]: Queued start job for default target default.target. Apr 12 18:40:19.670018 systemd[1158]: Reached target paths.target. Apr 12 18:40:19.670037 systemd[1158]: Reached target sockets.target. Apr 12 18:40:19.670049 systemd[1158]: Reached target timers.target. Apr 12 18:40:19.670059 systemd[1158]: Reached target basic.target. Apr 12 18:40:19.670130 systemd[1158]: Reached target default.target. Apr 12 18:40:19.670157 systemd[1158]: Startup finished in 50ms. Apr 12 18:40:19.670236 systemd[1]: Started user@500.service. Apr 12 18:40:19.671194 systemd[1]: Started session-1.scope. Apr 12 18:40:19.720028 systemd[1]: Started sshd@1-10.0.0.136:22-10.0.0.1:38780.service. Apr 12 18:40:19.759991 sshd[1167]: Accepted publickey for core from 10.0.0.1 port 38780 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:19.761253 sshd[1167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:19.764553 systemd-logind[1083]: New session 2 of user core. Apr 12 18:40:19.765352 systemd[1]: Started session-2.scope. Apr 12 18:40:19.817226 sshd[1167]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:19.820661 systemd[1]: Started sshd@2-10.0.0.136:22-10.0.0.1:38788.service. Apr 12 18:40:19.821198 systemd[1]: sshd@1-10.0.0.136:22-10.0.0.1:38780.service: Deactivated successfully. Apr 12 18:40:19.821833 systemd[1]: session-2.scope: Deactivated successfully. Apr 12 18:40:19.822384 systemd-logind[1083]: Session 2 logged out. Waiting for processes to exit. Apr 12 18:40:19.823799 systemd-logind[1083]: Removed session 2. Apr 12 18:40:19.853327 sshd[1172]: Accepted publickey for core from 10.0.0.1 port 38788 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:19.854382 sshd[1172]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:19.857757 systemd-logind[1083]: New session 3 of user core. Apr 12 18:40:19.858041 systemd[1]: Started session-3.scope. Apr 12 18:40:19.905384 sshd[1172]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:19.908751 systemd[1]: sshd@2-10.0.0.136:22-10.0.0.1:38788.service: Deactivated successfully. Apr 12 18:40:19.909291 systemd[1]: session-3.scope: Deactivated successfully. Apr 12 18:40:19.909758 systemd-logind[1083]: Session 3 logged out. Waiting for processes to exit. Apr 12 18:40:19.910779 systemd[1]: Started sshd@3-10.0.0.136:22-10.0.0.1:38796.service. Apr 12 18:40:19.911389 systemd-logind[1083]: Removed session 3. Apr 12 18:40:19.943706 sshd[1179]: Accepted publickey for core from 10.0.0.1 port 38796 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:19.944894 sshd[1179]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:19.948150 systemd-logind[1083]: New session 4 of user core. Apr 12 18:40:19.948958 systemd[1]: Started session-4.scope. Apr 12 18:40:20.000237 sshd[1179]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:20.003796 systemd[1]: sshd@3-10.0.0.136:22-10.0.0.1:38796.service: Deactivated successfully. Apr 12 18:40:20.004337 systemd[1]: session-4.scope: Deactivated successfully. Apr 12 18:40:20.004864 systemd-logind[1083]: Session 4 logged out. Waiting for processes to exit. Apr 12 18:40:20.005873 systemd[1]: Started sshd@4-10.0.0.136:22-10.0.0.1:38804.service. Apr 12 18:40:20.006772 systemd-logind[1083]: Removed session 4. Apr 12 18:40:20.037794 sshd[1185]: Accepted publickey for core from 10.0.0.1 port 38804 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:20.038795 sshd[1185]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:20.041627 systemd-logind[1083]: New session 5 of user core. Apr 12 18:40:20.042359 systemd[1]: Started session-5.scope. Apr 12 18:40:20.097540 sudo[1188]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Apr 12 18:40:20.097746 sudo[1188]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:40:20.107262 dbus-daemon[1066]: avc: received setenforce notice (enforcing=1) Apr 12 18:40:20.108053 sudo[1188]: pam_unix(sudo:session): session closed for user root Apr 12 18:40:20.110244 sshd[1185]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:20.113086 systemd[1]: Started sshd@5-10.0.0.136:22-10.0.0.1:38812.service. Apr 12 18:40:20.113578 systemd[1]: sshd@4-10.0.0.136:22-10.0.0.1:38804.service: Deactivated successfully. Apr 12 18:40:20.114166 systemd[1]: session-5.scope: Deactivated successfully. Apr 12 18:40:20.114664 systemd-logind[1083]: Session 5 logged out. Waiting for processes to exit. Apr 12 18:40:20.115488 systemd-logind[1083]: Removed session 5. Apr 12 18:40:20.145130 sshd[1191]: Accepted publickey for core from 10.0.0.1 port 38812 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:20.146542 sshd[1191]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:20.149311 systemd-logind[1083]: New session 6 of user core. Apr 12 18:40:20.150038 systemd[1]: Started session-6.scope. Apr 12 18:40:20.199401 sudo[1196]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Apr 12 18:40:20.199595 sudo[1196]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:40:20.201971 sudo[1196]: pam_unix(sudo:session): session closed for user root Apr 12 18:40:20.205807 sudo[1195]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Apr 12 18:40:20.205992 sudo[1195]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:40:20.213406 systemd[1]: Stopping audit-rules.service... Apr 12 18:40:20.213000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:40:20.214419 auditctl[1199]: No rules Apr 12 18:40:20.216535 kernel: kauditd_printk_skb: 124 callbacks suppressed Apr 12 18:40:20.216569 kernel: audit: type=1305 audit(1712947220.213:157): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Apr 12 18:40:20.216597 kernel: audit: type=1300 audit(1712947220.213:157): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda10de50 a2=420 a3=0 items=0 ppid=1 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:20.213000 audit[1199]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffda10de50 a2=420 a3=0 items=0 ppid=1 pid=1199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:20.216875 systemd[1]: audit-rules.service: Deactivated successfully. Apr 12 18:40:20.217042 systemd[1]: Stopped audit-rules.service. Apr 12 18:40:20.218387 systemd[1]: Starting audit-rules.service... Apr 12 18:40:20.213000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:40:20.220729 kernel: audit: type=1327 audit(1712947220.213:157): proctitle=2F7362696E2F617564697463746C002D44 Apr 12 18:40:20.220759 kernel: audit: type=1131 audit(1712947220.215:158): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.215000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.232656 augenrules[1216]: No rules Apr 12 18:40:20.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.233278 systemd[1]: Finished audit-rules.service. Apr 12 18:40:20.235918 sudo[1195]: pam_unix(sudo:session): session closed for user root Apr 12 18:40:20.236127 kernel: audit: type=1130 audit(1712947220.232:159): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.234000 audit[1195]: USER_END pid=1195 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.237230 sshd[1191]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:20.234000 audit[1195]: CRED_DISP pid=1195 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.240463 systemd[1]: Started sshd@6-10.0.0.136:22-10.0.0.1:38820.service. Apr 12 18:40:20.241277 systemd[1]: sshd@5-10.0.0.136:22-10.0.0.1:38812.service: Deactivated successfully. Apr 12 18:40:20.241844 systemd[1]: session-6.scope: Deactivated successfully. Apr 12 18:40:20.241986 kernel: audit: type=1106 audit(1712947220.234:160): pid=1195 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.242016 kernel: audit: type=1104 audit(1712947220.234:161): pid=1195 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.242033 kernel: audit: type=1106 audit(1712947220.238:162): pid=1191 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.238000 audit[1191]: USER_END pid=1191 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.242420 systemd-logind[1083]: Session 6 logged out. Waiting for processes to exit. Apr 12 18:40:20.243242 systemd-logind[1083]: Removed session 6. Apr 12 18:40:20.245113 kernel: audit: type=1104 audit(1712947220.238:163): pid=1191 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.238000 audit[1191]: CRED_DISP pid=1191 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.239000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:38820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.250261 kernel: audit: type=1130 audit(1712947220.239:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:38820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.240000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.136:22-10.0.0.1:38812 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.272000 audit[1221]: USER_ACCT pid=1221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.273495 sshd[1221]: Accepted publickey for core from 10.0.0.1 port 38820 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:40:20.272000 audit[1221]: CRED_ACQ pid=1221 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.273000 audit[1221]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd5e322e0 a2=3 a3=1 items=0 ppid=1 pid=1221 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:20.273000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:40:20.274457 sshd[1221]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:40:20.277820 systemd-logind[1083]: New session 7 of user core. Apr 12 18:40:20.278174 systemd[1]: Started session-7.scope. Apr 12 18:40:20.280000 audit[1221]: USER_START pid=1221 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.282000 audit[1224]: CRED_ACQ pid=1224 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:20.327000 audit[1225]: USER_ACCT pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.327000 audit[1225]: CRED_REFR pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:20.328240 sudo[1225]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Apr 12 18:40:20.328444 sudo[1225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Apr 12 18:40:20.328000 audit[1225]: USER_START pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:21.082701 systemd[1]: Starting systemd-networkd-wait-online.service... Apr 12 18:40:21.088002 systemd[1]: Finished systemd-networkd-wait-online.service. Apr 12 18:40:21.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:21.088279 systemd[1]: Reached target network-online.target. Apr 12 18:40:21.089376 systemd[1]: Starting docker.service... Apr 12 18:40:21.171368 env[1243]: time="2024-04-12T18:40:21.171308494Z" level=info msg="Starting up" Apr 12 18:40:21.172962 env[1243]: time="2024-04-12T18:40:21.172918657Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:40:21.172962 env[1243]: time="2024-04-12T18:40:21.172936282Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:40:21.172962 env[1243]: time="2024-04-12T18:40:21.172955275Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:40:21.172962 env[1243]: time="2024-04-12T18:40:21.172965749Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:40:21.174867 env[1243]: time="2024-04-12T18:40:21.174839785Z" level=info msg="parsed scheme: \"unix\"" module=grpc Apr 12 18:40:21.174962 env[1243]: time="2024-04-12T18:40:21.174946319Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Apr 12 18:40:21.175019 env[1243]: time="2024-04-12T18:40:21.175004275Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Apr 12 18:40:21.175068 env[1243]: time="2024-04-12T18:40:21.175055315Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Apr 12 18:40:21.270431 env[1243]: time="2024-04-12T18:40:21.270386657Z" level=info msg="Loading containers: start." Apr 12 18:40:21.329000 audit[1276]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1276 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.329000 audit[1276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffffdc53f10 a2=0 a3=1 items=0 ppid=1243 pid=1276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.329000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Apr 12 18:40:21.332000 audit[1278]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1278 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.332000 audit[1278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc8b97870 a2=0 a3=1 items=0 ppid=1243 pid=1278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.332000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Apr 12 18:40:21.333000 audit[1280]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.333000 audit[1280]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd4ae6000 a2=0 a3=1 items=0 ppid=1243 pid=1280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:40:21.335000 audit[1282]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1282 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.335000 audit[1282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffeec49aa0 a2=0 a3=1 items=0 ppid=1243 pid=1282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.335000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:40:21.337000 audit[1284]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1284 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.337000 audit[1284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff4208910 a2=0 a3=1 items=0 ppid=1243 pid=1284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.337000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Apr 12 18:40:21.365000 audit[1289]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1289 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.365000 audit[1289]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd1577ef0 a2=0 a3=1 items=0 ppid=1243 pid=1289 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.365000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Apr 12 18:40:21.374000 audit[1291]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.374000 audit[1291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffd28be9e0 a2=0 a3=1 items=0 ppid=1243 pid=1291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.374000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Apr 12 18:40:21.375000 audit[1293]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.375000 audit[1293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe540c500 a2=0 a3=1 items=0 ppid=1243 pid=1293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.375000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Apr 12 18:40:21.378000 audit[1295]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1295 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.378000 audit[1295]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe170be30 a2=0 a3=1 items=0 ppid=1243 pid=1295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.378000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:40:21.387000 audit[1299]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1299 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.387000 audit[1299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcae48d10 a2=0 a3=1 items=0 ppid=1243 pid=1299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.387000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:40:21.388000 audit[1300]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1300 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.388000 audit[1300]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd9674d30 a2=0 a3=1 items=0 ppid=1243 pid=1300 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.388000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:40:21.398145 kernel: Initializing XFRM netlink socket Apr 12 18:40:21.421003 env[1243]: time="2024-04-12T18:40:21.420950022Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Apr 12 18:40:21.438000 audit[1308]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.438000 audit[1308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc6a0c970 a2=0 a3=1 items=0 ppid=1243 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.438000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Apr 12 18:40:21.455000 audit[1311]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.455000 audit[1311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=fffff4511a20 a2=0 a3=1 items=0 ppid=1243 pid=1311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.455000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Apr 12 18:40:21.456000 audit[1314]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1314 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.456000 audit[1314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe68007a0 a2=0 a3=1 items=0 ppid=1243 pid=1314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.456000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Apr 12 18:40:21.458000 audit[1316]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.458000 audit[1316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffe03f1b40 a2=0 a3=1 items=0 ppid=1243 pid=1316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.458000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Apr 12 18:40:21.461000 audit[1318]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1318 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.461000 audit[1318]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffdc6cc8c0 a2=0 a3=1 items=0 ppid=1243 pid=1318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.461000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Apr 12 18:40:21.463000 audit[1320]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.463000 audit[1320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff3852530 a2=0 a3=1 items=0 ppid=1243 pid=1320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.463000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Apr 12 18:40:21.466000 audit[1323]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1323 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.466000 audit[1323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd27639f0 a2=0 a3=1 items=0 ppid=1243 pid=1323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.466000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Apr 12 18:40:21.478000 audit[1326]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.478000 audit[1326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc015e800 a2=0 a3=1 items=0 ppid=1243 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.478000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Apr 12 18:40:21.479000 audit[1328]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.479000 audit[1328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=fffff1455000 a2=0 a3=1 items=0 ppid=1243 pid=1328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.479000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Apr 12 18:40:21.481000 audit[1330]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1330 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.481000 audit[1330]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff1502fd0 a2=0 a3=1 items=0 ppid=1243 pid=1330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.481000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Apr 12 18:40:21.483000 audit[1332]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1332 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.483000 audit[1332]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffef6be1a0 a2=0 a3=1 items=0 ppid=1243 pid=1332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.483000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Apr 12 18:40:21.484839 systemd-networkd[1006]: docker0: Link UP Apr 12 18:40:21.491000 audit[1336]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1336 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.491000 audit[1336]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd7538910 a2=0 a3=1 items=0 ppid=1243 pid=1336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.491000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:40:21.492000 audit[1337]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:21.492000 audit[1337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffffe420cc0 a2=0 a3=1 items=0 ppid=1243 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:21.492000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Apr 12 18:40:21.494172 env[1243]: time="2024-04-12T18:40:21.493892823Z" level=info msg="Loading containers: done." Apr 12 18:40:21.516015 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1499368938-merged.mount: Deactivated successfully. Apr 12 18:40:21.521079 env[1243]: time="2024-04-12T18:40:21.521040570Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Apr 12 18:40:21.521430 env[1243]: time="2024-04-12T18:40:21.521409336Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Apr 12 18:40:21.521626 env[1243]: time="2024-04-12T18:40:21.521606419Z" level=info msg="Daemon has completed initialization" Apr 12 18:40:21.537031 systemd[1]: Started docker.service. Apr 12 18:40:21.535000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:21.545023 env[1243]: time="2024-04-12T18:40:21.544962129Z" level=info msg="API listen on /run/docker.sock" Apr 12 18:40:21.563409 systemd[1]: Reloading. Apr 12 18:40:21.604434 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-04-12T18:40:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:40:21.604465 /usr/lib/systemd/system-generators/torcx-generator[1386]: time="2024-04-12T18:40:21Z" level=info msg="torcx already run" Apr 12 18:40:21.660786 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:40:21.660807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:40:21.676363 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.724000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit: BPF prog-id=31 op=LOAD Apr 12 18:40:21.725000 audit: BPF prog-id=20 op=UNLOAD Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.725000 audit: BPF prog-id=32 op=LOAD Apr 12 18:40:21.725000 audit: BPF prog-id=24 op=UNLOAD Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit: BPF prog-id=33 op=LOAD Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit: BPF prog-id=34 op=LOAD Apr 12 18:40:21.727000 audit: BPF prog-id=18 op=UNLOAD Apr 12 18:40:21.727000 audit: BPF prog-id=19 op=UNLOAD Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit: BPF prog-id=35 op=LOAD Apr 12 18:40:21.727000 audit: BPF prog-id=15 op=UNLOAD Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.727000 audit: BPF prog-id=36 op=LOAD Apr 12 18:40:21.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit: BPF prog-id=37 op=LOAD Apr 12 18:40:21.728000 audit: BPF prog-id=16 op=UNLOAD Apr 12 18:40:21.728000 audit: BPF prog-id=17 op=UNLOAD Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit: BPF prog-id=38 op=LOAD Apr 12 18:40:21.728000 audit: BPF prog-id=21 op=UNLOAD Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit: BPF prog-id=39 op=LOAD Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.728000 audit: BPF prog-id=40 op=LOAD Apr 12 18:40:21.728000 audit: BPF prog-id=22 op=UNLOAD Apr 12 18:40:21.728000 audit: BPF prog-id=23 op=UNLOAD Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.729000 audit: BPF prog-id=41 op=LOAD Apr 12 18:40:21.729000 audit: BPF prog-id=25 op=UNLOAD Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit: BPF prog-id=42 op=LOAD Apr 12 18:40:21.730000 audit: BPF prog-id=26 op=UNLOAD Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit: BPF prog-id=43 op=LOAD Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.730000 audit: BPF prog-id=44 op=LOAD Apr 12 18:40:21.730000 audit: BPF prog-id=27 op=UNLOAD Apr 12 18:40:21.730000 audit: BPF prog-id=28 op=UNLOAD Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:21.731000 audit: BPF prog-id=45 op=LOAD Apr 12 18:40:21.731000 audit: BPF prog-id=29 op=UNLOAD Apr 12 18:40:21.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:21.738657 systemd[1]: Started kubelet.service. Apr 12 18:40:21.872934 kubelet[1423]: E0412 18:40:21.872810 1423 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:40:21.875271 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:40:21.875400 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:40:21.874000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:40:22.052969 env[1099]: time="2024-04-12T18:40:22.052679242Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\"" Apr 12 18:40:22.686642 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1827979356.mount: Deactivated successfully. Apr 12 18:40:24.849737 env[1099]: time="2024-04-12T18:40:24.849685766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:24.851208 env[1099]: time="2024-04-12T18:40:24.851177912Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:24.852940 env[1099]: time="2024-04-12T18:40:24.852904828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:24.855405 env[1099]: time="2024-04-12T18:40:24.855368187Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ebd35bc7ef24672c5c50ffccb21f71307a82d4fb20c0ecb6d3d27b28b69e0e3c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:24.856307 env[1099]: time="2024-04-12T18:40:24.856279378Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.3\" returns image reference \"sha256:2581114f5709d3459ca39f243fd21fde75f2f60d205ffdcd57b4207c33980794\"" Apr 12 18:40:24.866400 env[1099]: time="2024-04-12T18:40:24.866369355Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\"" Apr 12 18:40:27.335102 env[1099]: time="2024-04-12T18:40:27.335029430Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:27.336787 env[1099]: time="2024-04-12T18:40:27.336750335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:27.339002 env[1099]: time="2024-04-12T18:40:27.338958916Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:27.341232 env[1099]: time="2024-04-12T18:40:27.341186975Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:5a7968649f8aee83d5a2d75d6d377ba2680df25b0b97b3be12fa10f15ad67104,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:27.342104 env[1099]: time="2024-04-12T18:40:27.342050416Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.3\" returns image reference \"sha256:121d70d9a3805f44c7c587a60d9360495cf9d95129047f4818bb7110ec1ec195\"" Apr 12 18:40:27.353248 env[1099]: time="2024-04-12T18:40:27.353219847Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\"" Apr 12 18:40:28.735439 env[1099]: time="2024-04-12T18:40:28.735383293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:28.736901 env[1099]: time="2024-04-12T18:40:28.736868486Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:28.738613 env[1099]: time="2024-04-12T18:40:28.738588620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:28.740242 env[1099]: time="2024-04-12T18:40:28.740216435Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:6fb91d791db6d62f6b1ac9dbed23fdb597335550d99ff8333d53c4136e889b3a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:28.740975 env[1099]: time="2024-04-12T18:40:28.740950470Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.3\" returns image reference \"sha256:4b51f9f6bc9b9a68473278361df0e8985109b56c7b649532c6bffcab2a8c65fb\"" Apr 12 18:40:28.750214 env[1099]: time="2024-04-12T18:40:28.750188217Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\"" Apr 12 18:40:29.876329 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2904132181.mount: Deactivated successfully. Apr 12 18:40:30.303386 env[1099]: time="2024-04-12T18:40:30.303277836Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:30.304855 env[1099]: time="2024-04-12T18:40:30.304818913Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:30.306321 env[1099]: time="2024-04-12T18:40:30.306293691Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:30.307756 env[1099]: time="2024-04-12T18:40:30.307728468Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:fa87cba052adcb992bd59bd1304115c6f3b3fb370407805ba52af3d9ff3f0863,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:30.308207 env[1099]: time="2024-04-12T18:40:30.308180522Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.3\" returns image reference \"sha256:0e9b4a0d1e86d942f5ed93eaf751771e7602104cac5e15256c36967770ad2775\"" Apr 12 18:40:30.317294 env[1099]: time="2024-04-12T18:40:30.317263522Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Apr 12 18:40:30.891805 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2233280050.mount: Deactivated successfully. Apr 12 18:40:31.913336 env[1099]: time="2024-04-12T18:40:31.913282782Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:31.915272 env[1099]: time="2024-04-12T18:40:31.915232959Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:31.917111 env[1099]: time="2024-04-12T18:40:31.917088193Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:31.919643 env[1099]: time="2024-04-12T18:40:31.919598563Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:31.920365 env[1099]: time="2024-04-12T18:40:31.920340966Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Apr 12 18:40:31.929352 env[1099]: time="2024-04-12T18:40:31.929301579Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Apr 12 18:40:32.126153 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Apr 12 18:40:32.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.126336 systemd[1]: Stopped kubelet.service. Apr 12 18:40:32.127740 systemd[1]: Started kubelet.service. Apr 12 18:40:32.129247 kernel: kauditd_printk_skb: 259 callbacks suppressed Apr 12 18:40:32.129317 kernel: audit: type=1130 audit(1712947232.125:374): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.129341 kernel: audit: type=1131 audit(1712947232.125:375): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.125000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.133700 kernel: audit: type=1130 audit(1712947232.126:376): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:32.162816 kubelet[1479]: E0412 18:40:32.162767 1479 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Apr 12 18:40:32.165000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:40:32.165756 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Apr 12 18:40:32.165875 systemd[1]: kubelet.service: Failed with result 'exit-code'. Apr 12 18:40:32.169152 kernel: audit: type=1131 audit(1712947232.165:377): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Apr 12 18:40:32.357676 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1432934689.mount: Deactivated successfully. Apr 12 18:40:32.361895 env[1099]: time="2024-04-12T18:40:32.361855610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:32.364035 env[1099]: time="2024-04-12T18:40:32.364001079Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:32.365520 env[1099]: time="2024-04-12T18:40:32.365493462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:32.367083 env[1099]: time="2024-04-12T18:40:32.367049506Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:32.367690 env[1099]: time="2024-04-12T18:40:32.367658626Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Apr 12 18:40:32.376049 env[1099]: time="2024-04-12T18:40:32.376026123Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Apr 12 18:40:32.941860 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount472883940.mount: Deactivated successfully. Apr 12 18:40:36.533367 env[1099]: time="2024-04-12T18:40:36.533319733Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:36.535159 env[1099]: time="2024-04-12T18:40:36.535106375Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:36.536843 env[1099]: time="2024-04-12T18:40:36.536816495Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:36.539858 env[1099]: time="2024-04-12T18:40:36.539822066Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:36.540196 env[1099]: time="2024-04-12T18:40:36.540173811Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Apr 12 18:40:41.178764 systemd[1]: Stopped kubelet.service. Apr 12 18:40:41.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:41.177000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:41.183723 kernel: audit: type=1130 audit(1712947241.177:378): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:41.183805 kernel: audit: type=1131 audit(1712947241.177:379): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:41.194589 systemd[1]: Reloading. Apr 12 18:40:41.238388 /usr/lib/systemd/system-generators/torcx-generator[1596]: time="2024-04-12T18:40:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:40:41.238414 /usr/lib/systemd/system-generators/torcx-generator[1596]: time="2024-04-12T18:40:41Z" level=info msg="torcx already run" Apr 12 18:40:41.290139 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:40:41.290156 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:40:41.305102 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.357959 kernel: audit: type=1400 audit(1712947241.352:380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358002 kernel: audit: type=1400 audit(1712947241.352:381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358020 kernel: audit: type=1400 audit(1712947241.352:382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.362284 kernel: audit: type=1400 audit(1712947241.352:383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.362317 kernel: audit: type=1400 audit(1712947241.352:384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.366643 kernel: audit: type=1400 audit(1712947241.352:385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.366700 kernel: audit: type=1400 audit(1712947241.352:386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.366742 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.354000 audit: BPF prog-id=46 op=LOAD Apr 12 18:40:41.354000 audit: BPF prog-id=31 op=UNLOAD Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.356000 audit: BPF prog-id=47 op=LOAD Apr 12 18:40:41.356000 audit: BPF prog-id=32 op=UNLOAD Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.358000 audit: BPF prog-id=48 op=LOAD Apr 12 18:40:41.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit: BPF prog-id=49 op=LOAD Apr 12 18:40:41.361000 audit: BPF prog-id=33 op=UNLOAD Apr 12 18:40:41.361000 audit: BPF prog-id=34 op=UNLOAD Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit: BPF prog-id=50 op=LOAD Apr 12 18:40:41.363000 audit: BPF prog-id=35 op=UNLOAD Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.365000 audit: BPF prog-id=51 op=LOAD Apr 12 18:40:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit: BPF prog-id=52 op=LOAD Apr 12 18:40:41.368000 audit: BPF prog-id=36 op=UNLOAD Apr 12 18:40:41.368000 audit: BPF prog-id=37 op=UNLOAD Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit: BPF prog-id=53 op=LOAD Apr 12 18:40:41.368000 audit: BPF prog-id=38 op=UNLOAD Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit: BPF prog-id=54 op=LOAD Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit: BPF prog-id=55 op=LOAD Apr 12 18:40:41.369000 audit: BPF prog-id=39 op=UNLOAD Apr 12 18:40:41.369000 audit: BPF prog-id=40 op=UNLOAD Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.369000 audit: BPF prog-id=56 op=LOAD Apr 12 18:40:41.369000 audit: BPF prog-id=41 op=UNLOAD Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit: BPF prog-id=57 op=LOAD Apr 12 18:40:41.370000 audit: BPF prog-id=42 op=UNLOAD Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit: BPF prog-id=58 op=LOAD Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit: BPF prog-id=59 op=LOAD Apr 12 18:40:41.371000 audit: BPF prog-id=43 op=UNLOAD Apr 12 18:40:41.371000 audit: BPF prog-id=44 op=UNLOAD Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:41.372000 audit: BPF prog-id=60 op=LOAD Apr 12 18:40:41.372000 audit: BPF prog-id=45 op=UNLOAD Apr 12 18:40:41.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:41.382762 systemd[1]: Started kubelet.service. Apr 12 18:40:41.419067 kubelet[1634]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:40:41.419366 kubelet[1634]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:40:41.419421 kubelet[1634]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:40:41.419547 kubelet[1634]: I0412 18:40:41.419516 1634 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:40:43.192380 kubelet[1634]: I0412 18:40:43.192336 1634 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:40:43.192380 kubelet[1634]: I0412 18:40:43.192372 1634 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:40:43.192695 kubelet[1634]: I0412 18:40:43.192567 1634 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:40:43.198828 kubelet[1634]: I0412 18:40:43.198803 1634 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:40:43.200390 kubelet[1634]: E0412 18:40:43.200373 1634 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.136:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.204474 kubelet[1634]: I0412 18:40:43.204453 1634 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:40:43.204760 kubelet[1634]: I0412 18:40:43.204744 1634 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:40:43.204962 kubelet[1634]: I0412 18:40:43.204945 1634 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:40:43.205108 kubelet[1634]: I0412 18:40:43.205095 1634 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:40:43.205194 kubelet[1634]: I0412 18:40:43.205184 1634 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:40:43.205322 kubelet[1634]: I0412 18:40:43.205309 1634 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:40:43.205781 kubelet[1634]: I0412 18:40:43.205767 1634 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:40:43.205876 kubelet[1634]: I0412 18:40:43.205865 1634 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:40:43.205948 kubelet[1634]: I0412 18:40:43.205937 1634 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:40:43.206020 kubelet[1634]: I0412 18:40:43.206010 1634 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:40:43.206283 kubelet[1634]: W0412 18:40:43.206238 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.206323 kubelet[1634]: E0412 18:40:43.206291 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.206639 kubelet[1634]: W0412 18:40:43.206605 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.206703 kubelet[1634]: E0412 18:40:43.206643 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.206875 kubelet[1634]: I0412 18:40:43.206852 1634 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:40:43.207407 kubelet[1634]: I0412 18:40:43.207392 1634 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:40:43.207581 kubelet[1634]: W0412 18:40:43.207570 1634 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Apr 12 18:40:43.208401 kubelet[1634]: I0412 18:40:43.208383 1634 server.go:1256] "Started kubelet" Apr 12 18:40:43.209143 kubelet[1634]: I0412 18:40:43.209009 1634 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:40:43.209000 audit[1634]: AVC avc: denied { mac_admin } for pid=1634 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:43.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:43.209000 audit[1634]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d72540 a1=400079c720 a2=4000d724e0 a3=25 items=0 ppid=1 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.209000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:43.209000 audit[1634]: AVC avc: denied { mac_admin } for pid=1634 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:43.209000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:43.209000 audit[1634]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000934500 a1=400079c738 a2=4000d72660 a3=25 items=0 ppid=1 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.209000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:43.209849 kubelet[1634]: I0412 18:40:43.209319 1634 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:40:43.209849 kubelet[1634]: I0412 18:40:43.209385 1634 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:40:43.209849 kubelet[1634]: I0412 18:40:43.209461 1634 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:40:43.209849 kubelet[1634]: I0412 18:40:43.209492 1634 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:40:43.209849 kubelet[1634]: I0412 18:40:43.209550 1634 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:40:43.209849 kubelet[1634]: E0412 18:40:43.209769 1634 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.136:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.136:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17c59c712e6b3bd1 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-04-12 18:40:43.208358865 +0000 UTC m=+1.822114266,LastTimestamp:2024-04-12 18:40:43.208358865 +0000 UTC m=+1.822114266,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Apr 12 18:40:43.210525 kubelet[1634]: I0412 18:40:43.210497 1634 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:40:43.212139 kubelet[1634]: I0412 18:40:43.211964 1634 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:40:43.212139 kubelet[1634]: I0412 18:40:43.212110 1634 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:40:43.212139 kubelet[1634]: E0412 18:40:43.211964 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:43.212249 kubelet[1634]: I0412 18:40:43.212219 1634 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:40:43.212319 kubelet[1634]: E0412 18:40:43.212298 1634 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Apr 12 18:40:43.212377 kubelet[1634]: W0412 18:40:43.212334 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.212535 kubelet[1634]: E0412 18:40:43.212381 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.212861 kubelet[1634]: E0412 18:40:43.212785 1634 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="200ms" Apr 12 18:40:43.213006 kubelet[1634]: I0412 18:40:43.212986 1634 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:40:43.213080 kubelet[1634]: I0412 18:40:43.213060 1634 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:40:43.213000 audit[1646]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1646 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.213000 audit[1646]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe9a54130 a2=0 a3=1 items=0 ppid=1634 pid=1646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.213000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:40:43.214086 kubelet[1634]: I0412 18:40:43.214068 1634 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:40:43.216000 audit[1647]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1647 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.216000 audit[1647]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff4ef9020 a2=0 a3=1 items=0 ppid=1634 pid=1647 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.216000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:40:43.217000 audit[1649]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1649 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.217000 audit[1649]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffc7a673a0 a2=0 a3=1 items=0 ppid=1634 pid=1649 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.217000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:40:43.219000 audit[1651]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1651 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.219000 audit[1651]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe2bf4c10 a2=0 a3=1 items=0 ppid=1634 pid=1651 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:40:43.225402 kubelet[1634]: I0412 18:40:43.225385 1634 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:40:43.225489 kubelet[1634]: I0412 18:40:43.225475 1634 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:40:43.225561 kubelet[1634]: I0412 18:40:43.225551 1634 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:40:43.226000 audit[1657]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1657 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.226000 audit[1657]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd0cf33a0 a2=0 a3=1 items=0 ppid=1634 pid=1657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Apr 12 18:40:43.227796 kubelet[1634]: I0412 18:40:43.227785 1634 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:40:43.227000 audit[1658]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1658 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:40:43.227000 audit[1658]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffffb4672c0 a2=0 a3=1 items=0 ppid=1634 pid=1658 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Apr 12 18:40:43.228610 kubelet[1634]: I0412 18:40:43.228595 1634 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:40:43.228637 kubelet[1634]: I0412 18:40:43.228613 1634 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:40:43.228637 kubelet[1634]: I0412 18:40:43.228626 1634 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:40:43.228679 kubelet[1634]: E0412 18:40:43.228662 1634 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:40:43.228000 audit[1659]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1659 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.228000 audit[1659]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc9e2ae70 a2=0 a3=1 items=0 ppid=1634 pid=1659 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:40:43.228000 audit[1660]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1660 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.228000 audit[1660]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff43b2010 a2=0 a3=1 items=0 ppid=1634 pid=1660 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:40:43.229000 audit[1661]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1661 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:40:43.229000 audit[1661]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd407d570 a2=0 a3=1 items=0 ppid=1634 pid=1661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.229000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:40:43.230000 audit[1662]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1662 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:40:43.230000 audit[1662]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0b43ac0 a2=0 a3=1 items=0 ppid=1634 pid=1662 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Apr 12 18:40:43.232240 kubelet[1634]: W0412 18:40:43.231836 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.232240 kubelet[1634]: E0412 18:40:43.231887 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:43.231000 audit[1665]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1665 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:40:43.231000 audit[1665]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=fffff01deaf0 a2=0 a3=1 items=0 ppid=1634 pid=1665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Apr 12 18:40:43.232000 audit[1667]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1667 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:40:43.232000 audit[1667]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=fffff64cd600 a2=0 a3=1 items=0 ppid=1634 pid=1667 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Apr 12 18:40:43.255882 kubelet[1634]: I0412 18:40:43.255856 1634 policy_none.go:49] "None policy: Start" Apr 12 18:40:43.256567 kubelet[1634]: I0412 18:40:43.256547 1634 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:40:43.256626 kubelet[1634]: I0412 18:40:43.256576 1634 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:40:43.262379 systemd[1]: Created slice kubepods.slice. Apr 12 18:40:43.266137 systemd[1]: Created slice kubepods-burstable.slice. Apr 12 18:40:43.268385 systemd[1]: Created slice kubepods-besteffort.slice. Apr 12 18:40:43.280763 kubelet[1634]: I0412 18:40:43.280744 1634 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:40:43.279000 audit[1634]: AVC avc: denied { mac_admin } for pid=1634 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:43.279000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:43.279000 audit[1634]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000af6180 a1=4000af09d8 a2=4000af6150 a3=25 items=0 ppid=1 pid=1634 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:43.279000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:43.281079 kubelet[1634]: I0412 18:40:43.281064 1634 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:40:43.281321 kubelet[1634]: I0412 18:40:43.281303 1634 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:40:43.282702 kubelet[1634]: E0412 18:40:43.282667 1634 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Apr 12 18:40:43.313513 kubelet[1634]: I0412 18:40:43.313495 1634 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:40:43.314018 kubelet[1634]: E0412 18:40:43.313982 1634 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" Apr 12 18:40:43.329085 kubelet[1634]: I0412 18:40:43.329056 1634 topology_manager.go:215] "Topology Admit Handler" podUID="38f7e30b27d7b0c5eff00ffb60a87989" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:40:43.329872 kubelet[1634]: I0412 18:40:43.329845 1634 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:40:43.331338 kubelet[1634]: I0412 18:40:43.331311 1634 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:40:43.335582 systemd[1]: Created slice kubepods-burstable-pod38f7e30b27d7b0c5eff00ffb60a87989.slice. Apr 12 18:40:43.348762 systemd[1]: Created slice kubepods-burstable-podf4e8212a5db7e0401319814fa9ad65c9.slice. Apr 12 18:40:43.360816 systemd[1]: Created slice kubepods-burstable-pod5d5c5aff921df216fcba2c51c322ceb1.slice. Apr 12 18:40:43.413313 kubelet[1634]: E0412 18:40:43.413291 1634 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="400ms" Apr 12 18:40:43.514095 kubelet[1634]: I0412 18:40:43.514014 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:43.514286 kubelet[1634]: I0412 18:40:43.514256 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:43.514417 kubelet[1634]: I0412 18:40:43.514400 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:40:43.514669 kubelet[1634]: I0412 18:40:43.514643 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:43.514742 kubelet[1634]: I0412 18:40:43.514690 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:43.514742 kubelet[1634]: I0412 18:40:43.514721 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:43.514809 kubelet[1634]: I0412 18:40:43.514748 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:43.514809 kubelet[1634]: I0412 18:40:43.514772 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:43.514809 kubelet[1634]: I0412 18:40:43.514798 1634 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:43.516699 kubelet[1634]: I0412 18:40:43.516623 1634 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:40:43.517365 kubelet[1634]: E0412 18:40:43.517332 1634 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" Apr 12 18:40:43.648063 kubelet[1634]: E0412 18:40:43.648038 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:43.648648 env[1099]: time="2024-04-12T18:40:43.648615817Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:38f7e30b27d7b0c5eff00ffb60a87989,Namespace:kube-system,Attempt:0,}" Apr 12 18:40:43.660203 kubelet[1634]: E0412 18:40:43.660178 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:43.660577 env[1099]: time="2024-04-12T18:40:43.660547589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,}" Apr 12 18:40:43.663222 kubelet[1634]: E0412 18:40:43.663194 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:43.663776 env[1099]: time="2024-04-12T18:40:43.663579772Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,}" Apr 12 18:40:43.813799 kubelet[1634]: E0412 18:40:43.813712 1634 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.136:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.136:6443: connect: connection refused" interval="800ms" Apr 12 18:40:43.919182 kubelet[1634]: I0412 18:40:43.919154 1634 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:40:43.919461 kubelet[1634]: E0412 18:40:43.919431 1634 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.136:6443/api/v1/nodes\": dial tcp 10.0.0.136:6443: connect: connection refused" node="localhost" Apr 12 18:40:44.078797 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1623165072.mount: Deactivated successfully. Apr 12 18:40:44.083299 env[1099]: time="2024-04-12T18:40:44.083263636Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.089647 env[1099]: time="2024-04-12T18:40:44.089613263Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.091169 env[1099]: time="2024-04-12T18:40:44.091134760Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.092267 env[1099]: time="2024-04-12T18:40:44.092236544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.093252 env[1099]: time="2024-04-12T18:40:44.093219536Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.093848 env[1099]: time="2024-04-12T18:40:44.093826329Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.094769 env[1099]: time="2024-04-12T18:40:44.094738955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.097396 kubelet[1634]: W0412 18:40:44.097332 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.097396 kubelet[1634]: E0412 18:40:44.097398 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.136:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.097547 env[1099]: time="2024-04-12T18:40:44.097523784Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.098714 kubelet[1634]: W0412 18:40:44.098675 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.098714 kubelet[1634]: E0412 18:40:44.098717 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.136:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.101315 env[1099]: time="2024-04-12T18:40:44.101285292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.104794 env[1099]: time="2024-04-12T18:40:44.104756669Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.105787 env[1099]: time="2024-04-12T18:40:44.105746733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.106773 env[1099]: time="2024-04-12T18:40:44.106687369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:40:44.119827 env[1099]: time="2024-04-12T18:40:44.118921199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:40:44.119827 env[1099]: time="2024-04-12T18:40:44.118958519Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:40:44.119827 env[1099]: time="2024-04-12T18:40:44.118969108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:40:44.120341 env[1099]: time="2024-04-12T18:40:44.120277432Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/459634153012cf3f80ee5bfeb742fc60145941b0b8b9f8b001f9114344744d27 pid=1675 runtime=io.containerd.runc.v2 Apr 12 18:40:44.125659 env[1099]: time="2024-04-12T18:40:44.125597557Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:40:44.125659 env[1099]: time="2024-04-12T18:40:44.125633679Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:40:44.125794 env[1099]: time="2024-04-12T18:40:44.125644108Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:40:44.125937 env[1099]: time="2024-04-12T18:40:44.125887608Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d0d5ea419699362a8c89a3d3ea3bab6b3d00666168c849b891ff57337fb80be6 pid=1694 runtime=io.containerd.runc.v2 Apr 12 18:40:44.127917 env[1099]: time="2024-04-12T18:40:44.127858665Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:40:44.127997 env[1099]: time="2024-04-12T18:40:44.127901539Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:40:44.127997 env[1099]: time="2024-04-12T18:40:44.127912568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:40:44.128690 env[1099]: time="2024-04-12T18:40:44.128646465Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0cbb7dc183a64b74d469e78d30a4f70d506cbb5c41745f615c7e097badeba026 pid=1712 runtime=io.containerd.runc.v2 Apr 12 18:40:44.132687 systemd[1]: Started cri-containerd-459634153012cf3f80ee5bfeb742fc60145941b0b8b9f8b001f9114344744d27.scope. Apr 12 18:40:44.145790 systemd[1]: Started cri-containerd-0cbb7dc183a64b74d469e78d30a4f70d506cbb5c41745f615c7e097badeba026.scope. Apr 12 18:40:44.150007 systemd[1]: Started cri-containerd-d0d5ea419699362a8c89a3d3ea3bab6b3d00666168c849b891ff57337fb80be6.scope. Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.162000 audit: BPF prog-id=61 op=LOAD Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1675 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393633343135333031326366336638306565356266656237343266 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1675 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393633343135333031326366336638306565356266656237343266 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit: BPF prog-id=62 op=LOAD Apr 12 18:40:44.163000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1675 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393633343135333031326366336638306565356266656237343266 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit: BPF prog-id=63 op=LOAD Apr 12 18:40:44.163000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1675 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393633343135333031326366336638306565356266656237343266 Apr 12 18:40:44.163000 audit: BPF prog-id=63 op=UNLOAD Apr 12 18:40:44.163000 audit: BPF prog-id=62 op=UNLOAD Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { perfmon } for pid=1693 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit[1693]: AVC avc: denied { bpf } for pid=1693 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.163000 audit: BPF prog-id=64 op=LOAD Apr 12 18:40:44.163000 audit[1693]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1675 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.163000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435393633343135333031326366336638306565356266656237343266 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.171000 audit: BPF prog-id=65 op=LOAD Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626237646331383361363462373464343639653738643330613466 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626237646331383361363462373464343639653738643330613466 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit: BPF prog-id=66 op=LOAD Apr 12 18:40:44.172000 audit[1728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626237646331383361363462373464343639653738643330613466 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit: BPF prog-id=67 op=LOAD Apr 12 18:40:44.172000 audit[1728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626237646331383361363462373464343639653738643330613466 Apr 12 18:40:44.172000 audit: BPF prog-id=67 op=UNLOAD Apr 12 18:40:44.172000 audit: BPF prog-id=66 op=UNLOAD Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { perfmon } for pid=1728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit[1728]: AVC avc: denied { bpf } for pid=1728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.172000 audit: BPF prog-id=68 op=LOAD Apr 12 18:40:44.172000 audit[1728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1712 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3063626237646331383361363462373464343639653738643330613466 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit: BPF prog-id=69 op=LOAD Apr 12 18:40:44.177000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643565613431393639393336326138633839613364336561336261 Apr 12 18:40:44.177000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.177000 audit[1730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.177000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643565613431393639393336326138633839613364336561336261 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit: BPF prog-id=70 op=LOAD Apr 12 18:40:44.178000 audit[1730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643565613431393639393336326138633839613364336561336261 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.178000 audit: BPF prog-id=71 op=LOAD Apr 12 18:40:44.178000 audit[1730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.178000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643565613431393639393336326138633839613364336561336261 Apr 12 18:40:44.179000 audit: BPF prog-id=71 op=UNLOAD Apr 12 18:40:44.179000 audit: BPF prog-id=70 op=UNLOAD Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { perfmon } for pid=1730 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit[1730]: AVC avc: denied { bpf } for pid=1730 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.180000 audit: BPF prog-id=72 op=LOAD Apr 12 18:40:44.180000 audit[1730]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.180000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6430643565613431393639393336326138633839613364336561336261 Apr 12 18:40:44.196082 env[1099]: time="2024-04-12T18:40:44.195878227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:f4e8212a5db7e0401319814fa9ad65c9,Namespace:kube-system,Attempt:0,} returns sandbox id \"0cbb7dc183a64b74d469e78d30a4f70d506cbb5c41745f615c7e097badeba026\"" Apr 12 18:40:44.198354 kubelet[1634]: W0412 18:40:44.198294 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.198354 kubelet[1634]: E0412 18:40:44.198352 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.136:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.199196 env[1099]: time="2024-04-12T18:40:44.199159047Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:38f7e30b27d7b0c5eff00ffb60a87989,Namespace:kube-system,Attempt:0,} returns sandbox id \"459634153012cf3f80ee5bfeb742fc60145941b0b8b9f8b001f9114344744d27\"" Apr 12 18:40:44.200682 kubelet[1634]: E0412 18:40:44.200419 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:44.200682 kubelet[1634]: E0412 18:40:44.200529 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:44.203034 env[1099]: time="2024-04-12T18:40:44.202999470Z" level=info msg="CreateContainer within sandbox \"459634153012cf3f80ee5bfeb742fc60145941b0b8b9f8b001f9114344744d27\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Apr 12 18:40:44.203333 env[1099]: time="2024-04-12T18:40:44.203306782Z" level=info msg="CreateContainer within sandbox \"0cbb7dc183a64b74d469e78d30a4f70d506cbb5c41745f615c7e097badeba026\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Apr 12 18:40:44.210759 env[1099]: time="2024-04-12T18:40:44.210727307Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:5d5c5aff921df216fcba2c51c322ceb1,Namespace:kube-system,Attempt:0,} returns sandbox id \"d0d5ea419699362a8c89a3d3ea3bab6b3d00666168c849b891ff57337fb80be6\"" Apr 12 18:40:44.211515 kubelet[1634]: E0412 18:40:44.211497 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:44.212905 env[1099]: time="2024-04-12T18:40:44.212870660Z" level=info msg="CreateContainer within sandbox \"d0d5ea419699362a8c89a3d3ea3bab6b3d00666168c849b891ff57337fb80be6\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Apr 12 18:40:44.216219 env[1099]: time="2024-04-12T18:40:44.216177573Z" level=info msg="CreateContainer within sandbox \"0cbb7dc183a64b74d469e78d30a4f70d506cbb5c41745f615c7e097badeba026\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a4ec3d84ff8d755803f50e6db32669f92276794c53ad09848f22e8720844e08c\"" Apr 12 18:40:44.216816 env[1099]: time="2024-04-12T18:40:44.216781249Z" level=info msg="StartContainer for \"a4ec3d84ff8d755803f50e6db32669f92276794c53ad09848f22e8720844e08c\"" Apr 12 18:40:44.220061 env[1099]: time="2024-04-12T18:40:44.220022631Z" level=info msg="CreateContainer within sandbox \"459634153012cf3f80ee5bfeb742fc60145941b0b8b9f8b001f9114344744d27\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"af12592dce03fe397e26731e03ed7c312098dc57f921436c6cbc113b83ad4b05\"" Apr 12 18:40:44.220378 env[1099]: time="2024-04-12T18:40:44.220349682Z" level=info msg="StartContainer for \"af12592dce03fe397e26731e03ed7c312098dc57f921436c6cbc113b83ad4b05\"" Apr 12 18:40:44.228722 env[1099]: time="2024-04-12T18:40:44.228666451Z" level=info msg="CreateContainer within sandbox \"d0d5ea419699362a8c89a3d3ea3bab6b3d00666168c849b891ff57337fb80be6\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"08ba107541b6aa4c4c7d3032129e869d6c6d8310ab48d5f4d09dee3efaa4349b\"" Apr 12 18:40:44.229204 env[1099]: time="2024-04-12T18:40:44.229170912Z" level=info msg="StartContainer for \"08ba107541b6aa4c4c7d3032129e869d6c6d8310ab48d5f4d09dee3efaa4349b\"" Apr 12 18:40:44.233095 systemd[1]: Started cri-containerd-a4ec3d84ff8d755803f50e6db32669f92276794c53ad09848f22e8720844e08c.scope. Apr 12 18:40:44.243859 systemd[1]: Started cri-containerd-af12592dce03fe397e26731e03ed7c312098dc57f921436c6cbc113b83ad4b05.scope. Apr 12 18:40:44.252401 systemd[1]: Started cri-containerd-08ba107541b6aa4c4c7d3032129e869d6c6d8310ab48d5f4d09dee3efaa4349b.scope. Apr 12 18:40:44.274797 kubelet[1634]: W0412 18:40:44.274750 1634 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.274895 kubelet[1634]: E0412 18:40:44.274807 1634 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.136:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.136:6443: connect: connection refused Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.277000 audit: BPF prog-id=73 op=LOAD Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313235393264636530336665333937653236373331653033656437 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313235393264636530336665333937653236373331653033656437 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit: BPF prog-id=74 op=LOAD Apr 12 18:40:44.278000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313235393264636530336665333937653236373331653033656437 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit: BPF prog-id=75 op=LOAD Apr 12 18:40:44.278000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313235393264636530336665333937653236373331653033656437 Apr 12 18:40:44.278000 audit: BPF prog-id=75 op=UNLOAD Apr 12 18:40:44.278000 audit: BPF prog-id=74 op=UNLOAD Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { perfmon } for pid=1816 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit[1816]: AVC avc: denied { bpf } for pid=1816 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.278000 audit: BPF prog-id=76 op=LOAD Apr 12 18:40:44.278000 audit[1816]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=1675 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6166313235393264636530336665333937653236373331653033656437 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit: BPF prog-id=77 op=LOAD Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=1712 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656333643834666638643735353830336635306536646233323636 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=1712 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656333643834666638643735353830336635306536646233323636 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.281000 audit: BPF prog-id=78 op=LOAD Apr 12 18:40:44.281000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=1712 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.281000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656333643834666638643735353830336635306536646233323636 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit: BPF prog-id=79 op=LOAD Apr 12 18:40:44.282000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=1712 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656333643834666638643735353830336635306536646233323636 Apr 12 18:40:44.282000 audit: BPF prog-id=79 op=UNLOAD Apr 12 18:40:44.282000 audit: BPF prog-id=78 op=UNLOAD Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { perfmon } for pid=1806 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit[1806]: AVC avc: denied { bpf } for pid=1806 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.282000 audit: BPF prog-id=80 op=LOAD Apr 12 18:40:44.282000 audit[1806]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=1712 pid=1806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134656333643834666638643735353830336635306536646233323636 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.291000 audit: BPF prog-id=81 op=LOAD Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626131303735343162366161346334633764333033323132396538 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626131303735343162366161346334633764333033323132396538 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit: BPF prog-id=82 op=LOAD Apr 12 18:40:44.292000 audit[1838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626131303735343162366161346334633764333033323132396538 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit: BPF prog-id=83 op=LOAD Apr 12 18:40:44.292000 audit[1838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626131303735343162366161346334633764333033323132396538 Apr 12 18:40:44.292000 audit: BPF prog-id=83 op=UNLOAD Apr 12 18:40:44.292000 audit: BPF prog-id=82 op=UNLOAD Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { perfmon } for pid=1838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit[1838]: AVC avc: denied { bpf } for pid=1838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:44.292000 audit: BPF prog-id=84 op=LOAD Apr 12 18:40:44.292000 audit[1838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:44.292000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3038626131303735343162366161346334633764333033323132396538 Apr 12 18:40:44.311419 env[1099]: time="2024-04-12T18:40:44.311378299Z" level=info msg="StartContainer for \"a4ec3d84ff8d755803f50e6db32669f92276794c53ad09848f22e8720844e08c\" returns successfully" Apr 12 18:40:44.316341 env[1099]: time="2024-04-12T18:40:44.316311357Z" level=info msg="StartContainer for \"af12592dce03fe397e26731e03ed7c312098dc57f921436c6cbc113b83ad4b05\" returns successfully" Apr 12 18:40:44.341801 env[1099]: time="2024-04-12T18:40:44.341728244Z" level=info msg="StartContainer for \"08ba107541b6aa4c4c7d3032129e869d6c6d8310ab48d5f4d09dee3efaa4349b\" returns successfully" Apr 12 18:40:44.721251 kubelet[1634]: I0412 18:40:44.721219 1634 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:40:45.248919 kubelet[1634]: E0412 18:40:45.248895 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:45.251262 kubelet[1634]: E0412 18:40:45.251171 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:45.259179 kubelet[1634]: E0412 18:40:45.259061 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:46.024000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.024000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4004aee060 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.024000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.024000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40047459b0 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.024000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.024000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004745b30 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.026000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.026000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4004aee0e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.026000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.026000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.026000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=4004206510 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.026000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.036000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.036000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4a a1=4004745b60 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:40:46.036000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:40:46.060280 kubelet[1634]: E0412 18:40:46.060255 1634 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Apr 12 18:40:46.147683 kubelet[1634]: I0412 18:40:46.147654 1634 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:40:46.167512 kubelet[1634]: E0412 18:40:46.167443 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.260819 kubelet[1634]: E0412 18:40:46.260793 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:46.261092 kubelet[1634]: E0412 18:40:46.260920 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:46.261092 kubelet[1634]: E0412 18:40:46.261032 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:46.268129 kubelet[1634]: E0412 18:40:46.268105 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.368790 kubelet[1634]: E0412 18:40:46.368728 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.469080 kubelet[1634]: E0412 18:40:46.469038 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.476000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.480829 kernel: kauditd_printk_skb: 575 callbacks suppressed Apr 12 18:40:46.480936 kernel: audit: type=1400 audit(1712947246.476:681): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.480960 kernel: audit: type=1400 audit(1712947246.476:682): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.476000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:40:46.476000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000241ce0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:40:46.487193 kernel: audit: type=1300 audit(1712947246.476:682): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000241ce0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:40:46.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:40:46.490237 kernel: audit: type=1327 audit(1712947246.476:682): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:40:46.476000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400019a210 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:40:46.493859 kernel: audit: type=1300 audit(1712947246.476:681): arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400019a210 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:40:46.476000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:40:46.496880 kernel: audit: type=1327 audit(1712947246.476:681): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:40:46.569436 kubelet[1634]: E0412 18:40:46.569407 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.669983 kubelet[1634]: E0412 18:40:46.669921 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.770615 kubelet[1634]: E0412 18:40:46.770586 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:46.870702 kubelet[1634]: E0412 18:40:46.870656 1634 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"localhost\" not found" Apr 12 18:40:47.208843 kubelet[1634]: I0412 18:40:47.208807 1634 apiserver.go:52] "Watching apiserver" Apr 12 18:40:47.212570 kubelet[1634]: I0412 18:40:47.212545 1634 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:40:47.268375 kubelet[1634]: E0412 18:40:47.268355 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:47.269313 kubelet[1634]: E0412 18:40:47.269297 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:48.262609 kubelet[1634]: E0412 18:40:48.262575 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:48.262761 kubelet[1634]: E0412 18:40:48.262741 1634 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:48.474651 systemd[1]: Reloading. Apr 12 18:40:48.526512 /usr/lib/systemd/system-generators/torcx-generator[1934]: time="2024-04-12T18:40:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.3 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.3 /var/lib/torcx/store]" Apr 12 18:40:48.526540 /usr/lib/systemd/system-generators/torcx-generator[1934]: time="2024-04-12T18:40:48Z" level=info msg="torcx already run" Apr 12 18:40:48.578077 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Apr 12 18:40:48.578096 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Apr 12 18:40:48.593077 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656815 kernel: audit: type=1400 audit(1712947248.651:683): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656868 kernel: audit: type=1400 audit(1712947248.651:684): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656887 kernel: audit: type=1400 audit(1712947248.651:685): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.661382 kernel: audit: type=1400 audit(1712947248.651:686): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.651000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.653000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.653000 audit: BPF prog-id=85 op=LOAD Apr 12 18:40:48.653000 audit: BPF prog-id=81 op=UNLOAD Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.654000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.655000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.655000 audit: BPF prog-id=86 op=LOAD Apr 12 18:40:48.655000 audit: BPF prog-id=73 op=UNLOAD Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.656000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.657000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.657000 audit: BPF prog-id=87 op=LOAD Apr 12 18:40:48.658000 audit: BPF prog-id=69 op=UNLOAD Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.658000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit: BPF prog-id=88 op=LOAD Apr 12 18:40:48.660000 audit: BPF prog-id=46 op=UNLOAD Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.660000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.661000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.661000 audit: BPF prog-id=89 op=LOAD Apr 12 18:40:48.661000 audit: BPF prog-id=47 op=UNLOAD Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit: BPF prog-id=90 op=LOAD Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.662000 audit: BPF prog-id=91 op=LOAD Apr 12 18:40:48.662000 audit: BPF prog-id=48 op=UNLOAD Apr 12 18:40:48.662000 audit: BPF prog-id=49 op=UNLOAD Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit: BPF prog-id=92 op=LOAD Apr 12 18:40:48.663000 audit: BPF prog-id=61 op=UNLOAD Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit: BPF prog-id=93 op=LOAD Apr 12 18:40:48.663000 audit: BPF prog-id=50 op=UNLOAD Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit: BPF prog-id=94 op=LOAD Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.663000 audit: BPF prog-id=95 op=LOAD Apr 12 18:40:48.663000 audit: BPF prog-id=51 op=UNLOAD Apr 12 18:40:48.663000 audit: BPF prog-id=52 op=UNLOAD Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit: BPF prog-id=96 op=LOAD Apr 12 18:40:48.664000 audit: BPF prog-id=53 op=UNLOAD Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit: BPF prog-id=97 op=LOAD Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.664000 audit: BPF prog-id=98 op=LOAD Apr 12 18:40:48.664000 audit: BPF prog-id=54 op=UNLOAD Apr 12 18:40:48.664000 audit: BPF prog-id=55 op=UNLOAD Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit: BPF prog-id=99 op=LOAD Apr 12 18:40:48.665000 audit: BPF prog-id=56 op=UNLOAD Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit: BPF prog-id=100 op=LOAD Apr 12 18:40:48.666000 audit: BPF prog-id=65 op=UNLOAD Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit: BPF prog-id=101 op=LOAD Apr 12 18:40:48.666000 audit: BPF prog-id=77 op=UNLOAD Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit: BPF prog-id=102 op=LOAD Apr 12 18:40:48.667000 audit: BPF prog-id=57 op=UNLOAD Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit: BPF prog-id=103 op=LOAD Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.667000 audit: BPF prog-id=104 op=LOAD Apr 12 18:40:48.667000 audit: BPF prog-id=58 op=UNLOAD Apr 12 18:40:48.667000 audit: BPF prog-id=59 op=UNLOAD Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.668000 audit: BPF prog-id=105 op=LOAD Apr 12 18:40:48.668000 audit: BPF prog-id=60 op=UNLOAD Apr 12 18:40:48.678490 systemd[1]: Stopping kubelet.service... Apr 12 18:40:48.701386 systemd[1]: kubelet.service: Deactivated successfully. Apr 12 18:40:48.701559 systemd[1]: Stopped kubelet.service. Apr 12 18:40:48.700000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:48.701609 systemd[1]: kubelet.service: Consumed 2.061s CPU time. Apr 12 18:40:48.703061 systemd[1]: Started kubelet.service. Apr 12 18:40:48.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:48.758591 kubelet[1972]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:40:48.758591 kubelet[1972]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Apr 12 18:40:48.758591 kubelet[1972]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Apr 12 18:40:48.758929 kubelet[1972]: I0412 18:40:48.758628 1972 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Apr 12 18:40:48.762738 kubelet[1972]: I0412 18:40:48.762714 1972 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Apr 12 18:40:48.762821 kubelet[1972]: I0412 18:40:48.762809 1972 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Apr 12 18:40:48.763077 kubelet[1972]: I0412 18:40:48.763059 1972 server.go:919] "Client rotation is on, will bootstrap in background" Apr 12 18:40:48.764835 kubelet[1972]: I0412 18:40:48.764799 1972 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Apr 12 18:40:48.767226 kubelet[1972]: I0412 18:40:48.767205 1972 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Apr 12 18:40:48.772143 kubelet[1972]: I0412 18:40:48.772115 1972 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Apr 12 18:40:48.772434 kubelet[1972]: I0412 18:40:48.772419 1972 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Apr 12 18:40:48.772708 kubelet[1972]: I0412 18:40:48.772669 1972 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Apr 12 18:40:48.772830 kubelet[1972]: I0412 18:40:48.772818 1972 topology_manager.go:138] "Creating topology manager with none policy" Apr 12 18:40:48.772891 kubelet[1972]: I0412 18:40:48.772881 1972 container_manager_linux.go:301] "Creating device plugin manager" Apr 12 18:40:48.772978 kubelet[1972]: I0412 18:40:48.772967 1972 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:40:48.773147 kubelet[1972]: I0412 18:40:48.773133 1972 kubelet.go:396] "Attempting to sync node with API server" Apr 12 18:40:48.773254 kubelet[1972]: I0412 18:40:48.773243 1972 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Apr 12 18:40:48.773346 kubelet[1972]: I0412 18:40:48.773337 1972 kubelet.go:312] "Adding apiserver pod source" Apr 12 18:40:48.773535 kubelet[1972]: I0412 18:40:48.773524 1972 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Apr 12 18:40:48.774072 kubelet[1972]: I0412 18:40:48.774057 1972 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Apr 12 18:40:48.774334 kubelet[1972]: I0412 18:40:48.774318 1972 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Apr 12 18:40:48.774766 kubelet[1972]: I0412 18:40:48.774746 1972 server.go:1256] "Started kubelet" Apr 12 18:40:48.775063 kubelet[1972]: I0412 18:40:48.775027 1972 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Apr 12 18:40:48.775204 kubelet[1972]: I0412 18:40:48.775186 1972 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Apr 12 18:40:48.775479 kubelet[1972]: I0412 18:40:48.775461 1972 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Apr 12 18:40:48.775798 kubelet[1972]: I0412 18:40:48.775768 1972 server.go:461] "Adding debug handlers to kubelet server" Apr 12 18:40:48.777000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.777000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:48.777000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b3c3f0 a1=4000357278 a2=4000b3c3c0 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:48.777000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:48.779923 kubelet[1972]: I0412 18:40:48.779902 1972 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Apr 12 18:40:48.779000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.779000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:48.779000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bd3100 a1=4000357290 a2=4000b3c480 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:48.779000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:48.781265 kubelet[1972]: I0412 18:40:48.781247 1972 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Apr 12 18:40:48.781348 kubelet[1972]: I0412 18:40:48.781338 1972 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Apr 12 18:40:48.781562 kubelet[1972]: I0412 18:40:48.781547 1972 volume_manager.go:291] "Starting Kubelet Volume Manager" Apr 12 18:40:48.781769 kubelet[1972]: I0412 18:40:48.781755 1972 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Apr 12 18:40:48.781966 kubelet[1972]: I0412 18:40:48.781951 1972 reconciler_new.go:29] "Reconciler: start to sync state" Apr 12 18:40:48.801489 kubelet[1972]: I0412 18:40:48.801465 1972 factory.go:221] Registration of the systemd container factory successfully Apr 12 18:40:48.801614 kubelet[1972]: I0412 18:40:48.801592 1972 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Apr 12 18:40:48.804281 kubelet[1972]: I0412 18:40:48.803617 1972 factory.go:221] Registration of the containerd container factory successfully Apr 12 18:40:48.813475 kubelet[1972]: I0412 18:40:48.813431 1972 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Apr 12 18:40:48.816516 kubelet[1972]: I0412 18:40:48.816477 1972 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Apr 12 18:40:48.816516 kubelet[1972]: I0412 18:40:48.816520 1972 status_manager.go:217] "Starting to sync pod status with apiserver" Apr 12 18:40:48.816616 kubelet[1972]: I0412 18:40:48.816544 1972 kubelet.go:2329] "Starting kubelet main sync loop" Apr 12 18:40:48.816616 kubelet[1972]: E0412 18:40:48.816597 1972 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Apr 12 18:40:48.831644 kubelet[1972]: I0412 18:40:48.831623 1972 cpu_manager.go:214] "Starting CPU manager" policy="none" Apr 12 18:40:48.831752 kubelet[1972]: I0412 18:40:48.831740 1972 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Apr 12 18:40:48.831832 kubelet[1972]: I0412 18:40:48.831822 1972 state_mem.go:36] "Initialized new in-memory state store" Apr 12 18:40:48.832006 kubelet[1972]: I0412 18:40:48.831992 1972 state_mem.go:88] "Updated default CPUSet" cpuSet="" Apr 12 18:40:48.832087 kubelet[1972]: I0412 18:40:48.832074 1972 state_mem.go:96] "Updated CPUSet assignments" assignments={} Apr 12 18:40:48.832181 kubelet[1972]: I0412 18:40:48.832168 1972 policy_none.go:49] "None policy: Start" Apr 12 18:40:48.832790 kubelet[1972]: I0412 18:40:48.832773 1972 memory_manager.go:170] "Starting memorymanager" policy="None" Apr 12 18:40:48.832838 kubelet[1972]: I0412 18:40:48.832799 1972 state_mem.go:35] "Initializing new in-memory state store" Apr 12 18:40:48.832963 kubelet[1972]: I0412 18:40:48.832949 1972 state_mem.go:75] "Updated machine memory state" Apr 12 18:40:48.836516 kubelet[1972]: I0412 18:40:48.836493 1972 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Apr 12 18:40:48.835000 audit[1972]: AVC avc: denied { mac_admin } for pid=1972 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:40:48.835000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Apr 12 18:40:48.835000 audit[1972]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40010a2bd0 a1=4000cff980 a2=40010a2ba0 a3=25 items=0 ppid=1 pid=1972 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:40:48.835000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Apr 12 18:40:48.837405 kubelet[1972]: I0412 18:40:48.836548 1972 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Apr 12 18:40:48.837405 kubelet[1972]: I0412 18:40:48.836766 1972 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Apr 12 18:40:48.884714 kubelet[1972]: I0412 18:40:48.884678 1972 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Apr 12 18:40:48.890639 kubelet[1972]: I0412 18:40:48.890615 1972 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Apr 12 18:40:48.890794 kubelet[1972]: I0412 18:40:48.890782 1972 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Apr 12 18:40:48.917605 kubelet[1972]: I0412 18:40:48.917572 1972 topology_manager.go:215] "Topology Admit Handler" podUID="38f7e30b27d7b0c5eff00ffb60a87989" podNamespace="kube-system" podName="kube-apiserver-localhost" Apr 12 18:40:48.917707 kubelet[1972]: I0412 18:40:48.917655 1972 topology_manager.go:215] "Topology Admit Handler" podUID="f4e8212a5db7e0401319814fa9ad65c9" podNamespace="kube-system" podName="kube-controller-manager-localhost" Apr 12 18:40:48.917753 kubelet[1972]: I0412 18:40:48.917717 1972 topology_manager.go:215] "Topology Admit Handler" podUID="5d5c5aff921df216fcba2c51c322ceb1" podNamespace="kube-system" podName="kube-scheduler-localhost" Apr 12 18:40:48.924041 kubelet[1972]: E0412 18:40:48.924009 1972 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Apr 12 18:40:48.924041 kubelet[1972]: E0412 18:40:48.924039 1972 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:49.083093 kubelet[1972]: I0412 18:40:49.082833 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/5d5c5aff921df216fcba2c51c322ceb1-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"5d5c5aff921df216fcba2c51c322ceb1\") " pod="kube-system/kube-scheduler-localhost" Apr 12 18:40:49.083093 kubelet[1972]: I0412 18:40:49.082929 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:49.083093 kubelet[1972]: I0412 18:40:49.082954 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:49.083093 kubelet[1972]: I0412 18:40:49.082973 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:49.083093 kubelet[1972]: I0412 18:40:49.082993 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:49.083308 kubelet[1972]: I0412 18:40:49.083011 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/38f7e30b27d7b0c5eff00ffb60a87989-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"38f7e30b27d7b0c5eff00ffb60a87989\") " pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:49.083308 kubelet[1972]: I0412 18:40:49.083029 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:49.083308 kubelet[1972]: I0412 18:40:49.083079 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:49.083308 kubelet[1972]: I0412 18:40:49.083105 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/f4e8212a5db7e0401319814fa9ad65c9-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"f4e8212a5db7e0401319814fa9ad65c9\") " pod="kube-system/kube-controller-manager-localhost" Apr 12 18:40:49.222988 kubelet[1972]: E0412 18:40:49.222942 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.224642 kubelet[1972]: E0412 18:40:49.224608 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.224830 kubelet[1972]: E0412 18:40:49.224811 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.774032 kubelet[1972]: I0412 18:40:49.773998 1972 apiserver.go:52] "Watching apiserver" Apr 12 18:40:49.782024 kubelet[1972]: I0412 18:40:49.782002 1972 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Apr 12 18:40:49.824167 kubelet[1972]: E0412 18:40:49.824141 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.824785 kubelet[1972]: E0412 18:40:49.824764 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.828444 kubelet[1972]: E0412 18:40:49.828407 1972 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Apr 12 18:40:49.828815 kubelet[1972]: E0412 18:40:49.828785 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:49.848323 kubelet[1972]: I0412 18:40:49.848287 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=2.848226457 podStartE2EDuration="2.848226457s" podCreationTimestamp="2024-04-12 18:40:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:40:49.847988239 +0000 UTC m=+1.140915985" watchObservedRunningTime="2024-04-12 18:40:49.848226457 +0000 UTC m=+1.141154163" Apr 12 18:40:49.848441 kubelet[1972]: I0412 18:40:49.848380 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=1.848363811 podStartE2EDuration="1.848363811s" podCreationTimestamp="2024-04-12 18:40:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:40:49.84209532 +0000 UTC m=+1.135023026" watchObservedRunningTime="2024-04-12 18:40:49.848363811 +0000 UTC m=+1.141291477" Apr 12 18:40:50.481000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=521013 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Apr 12 18:40:50.481000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000c25d80 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:40:50.481000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:40:50.825546 kubelet[1972]: E0412 18:40:50.825462 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:51.826928 kubelet[1972]: E0412 18:40:51.826901 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:52.449775 sudo[1225]: pam_unix(sudo:session): session closed for user root Apr 12 18:40:52.448000 audit[1225]: USER_END pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.453278 kernel: kauditd_printk_skb: 257 callbacks suppressed Apr 12 18:40:52.453306 kernel: audit: type=1106 audit(1712947252.448:933): pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.453326 kernel: audit: type=1104 audit(1712947252.448:934): pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.448000 audit[1225]: CRED_DISP pid=1225 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.453705 sshd[1221]: pam_unix(sshd:session): session closed for user core Apr 12 18:40:52.453000 audit[1221]: USER_END pid=1221 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:52.459074 kernel: audit: type=1106 audit(1712947252.453:935): pid=1221 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:52.459434 systemd[1]: sshd@6-10.0.0.136:22-10.0.0.1:38820.service: Deactivated successfully. Apr 12 18:40:52.460153 systemd[1]: session-7.scope: Deactivated successfully. Apr 12 18:40:52.453000 audit[1221]: CRED_DISP pid=1221 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:52.460306 systemd[1]: session-7.scope: Consumed 6.278s CPU time. Apr 12 18:40:52.463148 kernel: audit: type=1104 audit(1712947252.453:936): pid=1221 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:40:52.463066 systemd-logind[1083]: Session 7 logged out. Waiting for processes to exit. Apr 12 18:40:52.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:38820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.466011 kernel: audit: type=1131 audit(1712947252.458:937): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.136:22-10.0.0.1:38820 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:40:52.466297 systemd-logind[1083]: Removed session 7. Apr 12 18:40:54.418718 kubelet[1972]: E0412 18:40:54.418666 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:54.432580 kubelet[1972]: I0412 18:40:54.432542 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=7.432488746 podStartE2EDuration="7.432488746s" podCreationTimestamp="2024-04-12 18:40:47 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:40:49.857348685 +0000 UTC m=+1.150276351" watchObservedRunningTime="2024-04-12 18:40:54.432488746 +0000 UTC m=+5.725416452" Apr 12 18:40:54.830595 kubelet[1972]: E0412 18:40:54.830565 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:55.131472 kubelet[1972]: E0412 18:40:55.131394 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:40:55.832515 kubelet[1972]: E0412 18:40:55.832486 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:01.016866 update_engine[1085]: I0412 18:41:01.016831 1085 update_attempter.cc:509] Updating boot flags... Apr 12 18:41:01.534424 kubelet[1972]: E0412 18:41:01.534394 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:02.335000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.335000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d3afa0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.343336 kernel: audit: type=1400 audit(1712947262.335:938): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.343394 kernel: audit: type=1300 audit(1712947262.335:938): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d3afa0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.343414 kernel: audit: type=1327 audit(1712947262.335:938): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.335000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.336000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.349206 kernel: audit: type=1400 audit(1712947262.336:939): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.349272 kernel: audit: type=1300 audit(1712947262.336:939): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c70ec0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.336000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c70ec0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.336000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.356014 kernel: audit: type=1327 audit(1712947262.336:939): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.336000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.358802 kernel: audit: type=1400 audit(1712947262.336:940): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.336000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c71080 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.362495 kernel: audit: type=1300 audit(1712947262.336:940): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c71080 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.362528 kernel: audit: type=1327 audit(1712947262.336:940): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.336000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.337000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.368322 kernel: audit: type=1400 audit(1712947262.337:941): avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:02.337000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400066ca00 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:02.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:02.835021 kubelet[1972]: I0412 18:41:02.834997 1972 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Apr 12 18:41:02.835396 env[1099]: time="2024-04-12T18:41:02.835354668Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Apr 12 18:41:02.835595 kubelet[1972]: I0412 18:41:02.835576 1972 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Apr 12 18:41:03.799562 kubelet[1972]: I0412 18:41:03.799514 1972 topology_manager.go:215] "Topology Admit Handler" podUID="a782b536-5aff-4842-9b70-438dd39c65e9" podNamespace="kube-system" podName="kube-proxy-5tssn" Apr 12 18:41:03.804452 systemd[1]: Created slice kubepods-besteffort-poda782b536_5aff_4842_9b70_438dd39c65e9.slice. Apr 12 18:41:03.884172 kubelet[1972]: I0412 18:41:03.884110 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zgfsm\" (UniqueName: \"kubernetes.io/projected/a782b536-5aff-4842-9b70-438dd39c65e9-kube-api-access-zgfsm\") pod \"kube-proxy-5tssn\" (UID: \"a782b536-5aff-4842-9b70-438dd39c65e9\") " pod="kube-system/kube-proxy-5tssn" Apr 12 18:41:03.884555 kubelet[1972]: I0412 18:41:03.884171 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/a782b536-5aff-4842-9b70-438dd39c65e9-kube-proxy\") pod \"kube-proxy-5tssn\" (UID: \"a782b536-5aff-4842-9b70-438dd39c65e9\") " pod="kube-system/kube-proxy-5tssn" Apr 12 18:41:03.884555 kubelet[1972]: I0412 18:41:03.884209 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/a782b536-5aff-4842-9b70-438dd39c65e9-xtables-lock\") pod \"kube-proxy-5tssn\" (UID: \"a782b536-5aff-4842-9b70-438dd39c65e9\") " pod="kube-system/kube-proxy-5tssn" Apr 12 18:41:03.884555 kubelet[1972]: I0412 18:41:03.884229 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/a782b536-5aff-4842-9b70-438dd39c65e9-lib-modules\") pod \"kube-proxy-5tssn\" (UID: \"a782b536-5aff-4842-9b70-438dd39c65e9\") " pod="kube-system/kube-proxy-5tssn" Apr 12 18:41:03.918765 kubelet[1972]: I0412 18:41:03.918719 1972 topology_manager.go:215] "Topology Admit Handler" podUID="8318f393-d185-4099-9b8c-b734643de322" podNamespace="tigera-operator" podName="tigera-operator-6bfc79cb9c-sxh6b" Apr 12 18:41:03.923229 systemd[1]: Created slice kubepods-besteffort-pod8318f393_d185_4099_9b8c_b734643de322.slice. Apr 12 18:41:03.985349 kubelet[1972]: I0412 18:41:03.985301 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/8318f393-d185-4099-9b8c-b734643de322-var-lib-calico\") pod \"tigera-operator-6bfc79cb9c-sxh6b\" (UID: \"8318f393-d185-4099-9b8c-b734643de322\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-sxh6b" Apr 12 18:41:03.985349 kubelet[1972]: I0412 18:41:03.985346 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lclt6\" (UniqueName: \"kubernetes.io/projected/8318f393-d185-4099-9b8c-b734643de322-kube-api-access-lclt6\") pod \"tigera-operator-6bfc79cb9c-sxh6b\" (UID: \"8318f393-d185-4099-9b8c-b734643de322\") " pod="tigera-operator/tigera-operator-6bfc79cb9c-sxh6b" Apr 12 18:41:04.117026 kubelet[1972]: E0412 18:41:04.116934 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:04.117892 env[1099]: time="2024-04-12T18:41:04.117811424Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5tssn,Uid:a782b536-5aff-4842-9b70-438dd39c65e9,Namespace:kube-system,Attempt:0,}" Apr 12 18:41:04.131408 env[1099]: time="2024-04-12T18:41:04.131331559Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:04.131408 env[1099]: time="2024-04-12T18:41:04.131383685Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:04.131598 env[1099]: time="2024-04-12T18:41:04.131394886Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:04.131837 env[1099]: time="2024-04-12T18:41:04.131781449Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9 pid=2086 runtime=io.containerd.runc.v2 Apr 12 18:41:04.143735 systemd[1]: Started cri-containerd-aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9.scope. Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.170000 audit: BPF prog-id=106 op=LOAD Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653266353131653536323764613330663936323666656632353337 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653266353131653536323764613330663936323666656632353337 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.171000 audit: BPF prog-id=107 op=LOAD Apr 12 18:41:04.171000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.171000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653266353131653536323764613330663936323666656632353337 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.172000 audit: BPF prog-id=108 op=LOAD Apr 12 18:41:04.172000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.172000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653266353131653536323764613330663936323666656632353337 Apr 12 18:41:04.173000 audit: BPF prog-id=108 op=UNLOAD Apr 12 18:41:04.173000 audit: BPF prog-id=107 op=UNLOAD Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { perfmon } for pid=2096 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit[2096]: AVC avc: denied { bpf } for pid=2096 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.173000 audit: BPF prog-id=109 op=LOAD Apr 12 18:41:04.173000 audit[2096]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2086 pid=2096 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165653266353131653536323764613330663936323666656632353337 Apr 12 18:41:04.185082 env[1099]: time="2024-04-12T18:41:04.185040617Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-5tssn,Uid:a782b536-5aff-4842-9b70-438dd39c65e9,Namespace:kube-system,Attempt:0,} returns sandbox id \"aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9\"" Apr 12 18:41:04.185805 kubelet[1972]: E0412 18:41:04.185782 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:04.188223 env[1099]: time="2024-04-12T18:41:04.187979662Z" level=info msg="CreateContainer within sandbox \"aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Apr 12 18:41:04.204099 env[1099]: time="2024-04-12T18:41:04.204052159Z" level=info msg="CreateContainer within sandbox \"aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"12b20b6d98317d6be1491a5f38153d3500a5a189f2914bf33a467dc78cd9b363\"" Apr 12 18:41:04.204643 env[1099]: time="2024-04-12T18:41:04.204618582Z" level=info msg="StartContainer for \"12b20b6d98317d6be1491a5f38153d3500a5a189f2914bf33a467dc78cd9b363\"" Apr 12 18:41:04.219357 systemd[1]: Started cri-containerd-12b20b6d98317d6be1491a5f38153d3500a5a189f2914bf33a467dc78cd9b363.scope. Apr 12 18:41:04.227223 env[1099]: time="2024-04-12T18:41:04.227179996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-sxh6b,Uid:8318f393-d185-4099-9b8c-b734643de322,Namespace:tigera-operator,Attempt:0,}" Apr 12 18:41:04.263949 env[1099]: time="2024-04-12T18:41:04.263861212Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:04.263949 env[1099]: time="2024-04-12T18:41:04.263905937Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:04.263949 env[1099]: time="2024-04-12T18:41:04.263916418Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:04.264152 env[1099]: time="2024-04-12T18:41:04.264025710Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0982796186c4b1e3e540dbcd88635d7fcc8265246022ee02db6ca0f3cc354c18 pid=2152 runtime=io.containerd.runc.v2 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2086 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132623230623664393833313764366265313439316135663338313533 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit: BPF prog-id=110 op=LOAD Apr 12 18:41:04.268000 audit[2129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2086 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132623230623664393833313764366265313439316135663338313533 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit: BPF prog-id=111 op=LOAD Apr 12 18:41:04.268000 audit[2129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2086 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132623230623664393833313764366265313439316135663338313533 Apr 12 18:41:04.268000 audit: BPF prog-id=111 op=UNLOAD Apr 12 18:41:04.268000 audit: BPF prog-id=110 op=UNLOAD Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { perfmon } for pid=2129 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit[2129]: AVC avc: denied { bpf } for pid=2129 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.268000 audit: BPF prog-id=112 op=LOAD Apr 12 18:41:04.268000 audit[2129]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2086 pid=2129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3132623230623664393833313764366265313439316135663338313533 Apr 12 18:41:04.278297 systemd[1]: Started cri-containerd-0982796186c4b1e3e540dbcd88635d7fcc8265246022ee02db6ca0f3cc354c18.scope. Apr 12 18:41:04.293375 env[1099]: time="2024-04-12T18:41:04.293164492Z" level=info msg="StartContainer for \"12b20b6d98317d6be1491a5f38153d3500a5a189f2914bf33a467dc78cd9b363\" returns successfully" Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit: BPF prog-id=113 op=LOAD Apr 12 18:41:04.308000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383237393631383663346231653365353430646263643838363335 Apr 12 18:41:04.308000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.308000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383237393631383663346231653365353430646263643838363335 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit: BPF prog-id=114 op=LOAD Apr 12 18:41:04.309000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383237393631383663346231653365353430646263643838363335 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit: BPF prog-id=115 op=LOAD Apr 12 18:41:04.309000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383237393631383663346231653365353430646263643838363335 Apr 12 18:41:04.309000 audit: BPF prog-id=115 op=UNLOAD Apr 12 18:41:04.309000 audit: BPF prog-id=114 op=UNLOAD Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { perfmon } for pid=2162 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit[2162]: AVC avc: denied { bpf } for pid=2162 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:04.309000 audit: BPF prog-id=116 op=LOAD Apr 12 18:41:04.309000 audit[2162]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2152 pid=2162 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039383237393631383663346231653365353430646263643838363335 Apr 12 18:41:04.329327 env[1099]: time="2024-04-12T18:41:04.329268363Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-6bfc79cb9c-sxh6b,Uid:8318f393-d185-4099-9b8c-b734643de322,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"0982796186c4b1e3e540dbcd88635d7fcc8265246022ee02db6ca0f3cc354c18\"" Apr 12 18:41:04.332562 env[1099]: time="2024-04-12T18:41:04.332528404Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\"" Apr 12 18:41:04.405000 audit[2222]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.405000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe994ae60 a2=0 a3=1 items=0 ppid=2139 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.405000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:41:04.407000 audit[2226]: NETFILTER_CFG table=nat:39 family=10 entries=1 op=nft_register_chain pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.407000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcd918560 a2=0 a3=1 items=0 ppid=2139 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.407000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:41:04.409000 audit[2223]: NETFILTER_CFG table=mangle:40 family=2 entries=1 op=nft_register_chain pid=2223 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.410000 audit[2227]: NETFILTER_CFG table=filter:41 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.410000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcb89a820 a2=0 a3=1 items=0 ppid=2139 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.410000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:41:04.409000 audit[2223]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe63ccc80 a2=0 a3=1 items=0 ppid=2139 pid=2223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Apr 12 18:41:04.412000 audit[2228]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.412000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe42635c0 a2=0 a3=1 items=0 ppid=2139 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Apr 12 18:41:04.413000 audit[2229]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.413000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce2b88d0 a2=0 a3=1 items=0 ppid=2139 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Apr 12 18:41:04.506000 audit[2230]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2230 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.506000 audit[2230]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe8eed6b0 a2=0 a3=1 items=0 ppid=2139 pid=2230 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.506000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:41:04.511000 audit[2232]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2232 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.511000 audit[2232]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe0b08a60 a2=0 a3=1 items=0 ppid=2139 pid=2232 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.511000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Apr 12 18:41:04.516000 audit[2235]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2235 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.516000 audit[2235]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd3583500 a2=0 a3=1 items=0 ppid=2139 pid=2235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.516000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Apr 12 18:41:04.517000 audit[2236]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2236 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.517000 audit[2236]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc98166a0 a2=0 a3=1 items=0 ppid=2139 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.517000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:41:04.519000 audit[2238]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2238 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.519000 audit[2238]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff2ce42b0 a2=0 a3=1 items=0 ppid=2139 pid=2238 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.519000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:41:04.521000 audit[2239]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2239 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.521000 audit[2239]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdc087980 a2=0 a3=1 items=0 ppid=2139 pid=2239 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.521000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:41:04.523000 audit[2241]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2241 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.523000 audit[2241]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd817b780 a2=0 a3=1 items=0 ppid=2139 pid=2241 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.523000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:41:04.526000 audit[2244]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2244 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.526000 audit[2244]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffde77d2c0 a2=0 a3=1 items=0 ppid=2139 pid=2244 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.526000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Apr 12 18:41:04.527000 audit[2245]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2245 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.527000 audit[2245]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff7bab250 a2=0 a3=1 items=0 ppid=2139 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.527000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:41:04.529000 audit[2247]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2247 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.529000 audit[2247]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea44f8a0 a2=0 a3=1 items=0 ppid=2139 pid=2247 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.529000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:41:04.530000 audit[2248]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.530000 audit[2248]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe6b2ebf0 a2=0 a3=1 items=0 ppid=2139 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.530000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:41:04.533000 audit[2250]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2250 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.533000 audit[2250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc49c4af0 a2=0 a3=1 items=0 ppid=2139 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.533000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:41:04.536000 audit[2253]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2253 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.536000 audit[2253]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd3cd98f0 a2=0 a3=1 items=0 ppid=2139 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.536000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:41:04.540000 audit[2256]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.540000 audit[2256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcc6a82f0 a2=0 a3=1 items=0 ppid=2139 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.540000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:41:04.541000 audit[2257]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2257 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.541000 audit[2257]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc1511210 a2=0 a3=1 items=0 ppid=2139 pid=2257 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.541000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:41:04.543000 audit[2259]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.543000 audit[2259]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=fffff3348220 a2=0 a3=1 items=0 ppid=2139 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.543000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:41:04.546000 audit[2262]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.546000 audit[2262]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd3fe0ba0 a2=0 a3=1 items=0 ppid=2139 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.546000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:41:04.548000 audit[2263]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.548000 audit[2263]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2a56ce0 a2=0 a3=1 items=0 ppid=2139 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.548000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:41:04.550000 audit[2265]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Apr 12 18:41:04.550000 audit[2265]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe3604410 a2=0 a3=1 items=0 ppid=2139 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.550000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:41:04.569000 audit[2271]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:04.569000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffc42478b0 a2=0 a3=1 items=0 ppid=2139 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.569000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:04.574000 audit[2271]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:04.574000 audit[2271]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=ffffc42478b0 a2=0 a3=1 items=0 ppid=2139 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.574000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:04.576000 audit[2276]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2276 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.576000 audit[2276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffda3f7f10 a2=0 a3=1 items=0 ppid=2139 pid=2276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.576000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Apr 12 18:41:04.578000 audit[2278]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2278 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.578000 audit[2278]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffd1671f10 a2=0 a3=1 items=0 ppid=2139 pid=2278 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Apr 12 18:41:04.582000 audit[2281]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.582000 audit[2281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffee8c07b0 a2=0 a3=1 items=0 ppid=2139 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Apr 12 18:41:04.583000 audit[2282]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2282 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.583000 audit[2282]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebdc1230 a2=0 a3=1 items=0 ppid=2139 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.583000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Apr 12 18:41:04.585000 audit[2284]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2284 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.585000 audit[2284]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe0cf5da0 a2=0 a3=1 items=0 ppid=2139 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Apr 12 18:41:04.586000 audit[2285]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2285 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.586000 audit[2285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbfc8fc0 a2=0 a3=1 items=0 ppid=2139 pid=2285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Apr 12 18:41:04.588000 audit[2287]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2287 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.588000 audit[2287]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd13aa7f0 a2=0 a3=1 items=0 ppid=2139 pid=2287 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.588000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Apr 12 18:41:04.591000 audit[2290]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2290 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.591000 audit[2290]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd2d80920 a2=0 a3=1 items=0 ppid=2139 pid=2290 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.591000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Apr 12 18:41:04.592000 audit[2291]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.592000 audit[2291]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcee23a70 a2=0 a3=1 items=0 ppid=2139 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.592000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Apr 12 18:41:04.594000 audit[2293]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.594000 audit[2293]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee58b7b0 a2=0 a3=1 items=0 ppid=2139 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.594000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Apr 12 18:41:04.595000 audit[2294]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2294 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.595000 audit[2294]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc44c4a80 a2=0 a3=1 items=0 ppid=2139 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Apr 12 18:41:04.598000 audit[2296]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2296 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.598000 audit[2296]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe93b6580 a2=0 a3=1 items=0 ppid=2139 pid=2296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Apr 12 18:41:04.601000 audit[2299]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2299 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.601000 audit[2299]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4452690 a2=0 a3=1 items=0 ppid=2139 pid=2299 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Apr 12 18:41:04.604000 audit[2302]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2302 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.604000 audit[2302]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6d42610 a2=0 a3=1 items=0 ppid=2139 pid=2302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Apr 12 18:41:04.605000 audit[2303]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.605000 audit[2303]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffe57e3b0 a2=0 a3=1 items=0 ppid=2139 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.605000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Apr 12 18:41:04.607000 audit[2305]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.607000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffea9e9e50 a2=0 a3=1 items=0 ppid=2139 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.607000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:41:04.610000 audit[2308]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.610000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffededd9e0 a2=0 a3=1 items=0 ppid=2139 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.610000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Apr 12 18:41:04.611000 audit[2309]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.611000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec6512e0 a2=0 a3=1 items=0 ppid=2139 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.611000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Apr 12 18:41:04.613000 audit[2311]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.613000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff56919f0 a2=0 a3=1 items=0 ppid=2139 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.613000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Apr 12 18:41:04.615000 audit[2312]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.615000 audit[2312]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd0a29e10 a2=0 a3=1 items=0 ppid=2139 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.615000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Apr 12 18:41:04.617000 audit[2314]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2314 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.617000 audit[2314]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe28f1600 a2=0 a3=1 items=0 ppid=2139 pid=2314 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.617000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:41:04.620000 audit[2317]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2317 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Apr 12 18:41:04.620000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe7a3c430 a2=0 a3=1 items=0 ppid=2139 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.620000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Apr 12 18:41:04.622000 audit[2319]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:41:04.622000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffda385940 a2=0 a3=1 items=0 ppid=2139 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.622000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:04.623000 audit[2319]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Apr 12 18:41:04.623000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffda385940 a2=0 a3=1 items=0 ppid=2139 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:04.623000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:04.846667 kubelet[1972]: E0412 18:41:04.846642 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:04.998145 systemd[1]: run-containerd-runc-k8s.io-aee2f511e5627da30f9626fef253760d1faef2a79d1f1595ce54daa8759a8ef9-runc.hT6xPO.mount: Deactivated successfully. Apr 12 18:41:06.008306 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2589428869.mount: Deactivated successfully. Apr 12 18:41:06.635585 env[1099]: time="2024-04-12T18:41:06.635534230Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:06.637207 env[1099]: time="2024-04-12T18:41:06.637168315Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:06.639105 env[1099]: time="2024-04-12T18:41:06.639076627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:06.640572 env[1099]: time="2024-04-12T18:41:06.640533614Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:cc11f43967358b5c5eccfc5da449498c6d80bb0d4831feb5b7904c7b1ca905bd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:06.641170 env[1099]: time="2024-04-12T18:41:06.641141635Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.7\" returns image reference \"sha256:c578d84ef425d69b1e535774752639ac2b078100e7525b71469799615b2d2aa0\"" Apr 12 18:41:06.644061 env[1099]: time="2024-04-12T18:41:06.644028165Z" level=info msg="CreateContainer within sandbox \"0982796186c4b1e3e540dbcd88635d7fcc8265246022ee02db6ca0f3cc354c18\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Apr 12 18:41:06.652499 env[1099]: time="2024-04-12T18:41:06.652451733Z" level=info msg="CreateContainer within sandbox \"0982796186c4b1e3e540dbcd88635d7fcc8265246022ee02db6ca0f3cc354c18\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"82207932b6c103cebb28edf28e49595e353a84d03fb6cbd809fa10e2ce9ba117\"" Apr 12 18:41:06.652855 env[1099]: time="2024-04-12T18:41:06.652828851Z" level=info msg="StartContainer for \"82207932b6c103cebb28edf28e49595e353a84d03fb6cbd809fa10e2ce9ba117\"" Apr 12 18:41:06.671309 systemd[1]: Started cri-containerd-82207932b6c103cebb28edf28e49595e353a84d03fb6cbd809fa10e2ce9ba117.scope. Apr 12 18:41:06.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit: BPF prog-id=117 op=LOAD Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2152 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323037393332623663313033636562623238656466323865343935 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2152 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323037393332623663313033636562623238656466323865343935 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit: BPF prog-id=118 op=LOAD Apr 12 18:41:06.691000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2152 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323037393332623663313033636562623238656466323865343935 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit: BPF prog-id=119 op=LOAD Apr 12 18:41:06.691000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2152 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323037393332623663313033636562623238656466323865343935 Apr 12 18:41:06.691000 audit: BPF prog-id=119 op=UNLOAD Apr 12 18:41:06.691000 audit: BPF prog-id=118 op=UNLOAD Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { perfmon } for pid=2328 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit[2328]: AVC avc: denied { bpf } for pid=2328 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:06.691000 audit: BPF prog-id=120 op=LOAD Apr 12 18:41:06.691000 audit[2328]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2152 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:06.691000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3832323037393332623663313033636562623238656466323865343935 Apr 12 18:41:06.708325 env[1099]: time="2024-04-12T18:41:06.708279273Z" level=info msg="StartContainer for \"82207932b6c103cebb28edf28e49595e353a84d03fb6cbd809fa10e2ce9ba117\" returns successfully" Apr 12 18:41:06.857489 kubelet[1972]: I0412 18:41:06.857452 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-6bfc79cb9c-sxh6b" podStartSLOduration=1.546602091 podStartE2EDuration="3.857412123s" podCreationTimestamp="2024-04-12 18:41:03 +0000 UTC" firstStartedPulling="2024-04-12 18:41:04.330550945 +0000 UTC m=+15.623478651" lastFinishedPulling="2024-04-12 18:41:06.641361017 +0000 UTC m=+17.934288683" observedRunningTime="2024-04-12 18:41:06.856732015 +0000 UTC m=+18.149659721" watchObservedRunningTime="2024-04-12 18:41:06.857412123 +0000 UTC m=+18.150339789" Apr 12 18:41:06.857846 kubelet[1972]: I0412 18:41:06.857651 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-5tssn" podStartSLOduration=3.857630345 podStartE2EDuration="3.857630345s" podCreationTimestamp="2024-04-12 18:41:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:41:04.855173109 +0000 UTC m=+16.148100815" watchObservedRunningTime="2024-04-12 18:41:06.857630345 +0000 UTC m=+18.150558011" Apr 12 18:41:07.008496 systemd[1]: run-containerd-runc-k8s.io-82207932b6c103cebb28edf28e49595e353a84d03fb6cbd809fa10e2ce9ba117-runc.nXcyZA.mount: Deactivated successfully. Apr 12 18:41:09.612000 audit[2359]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.614420 kernel: kauditd_printk_skb: 369 callbacks suppressed Apr 12 18:41:09.614485 kernel: audit: type=1325 audit(1712947269.612:1053): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.612000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd180c660 a2=0 a3=1 items=0 ppid=2139 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.619509 kernel: audit: type=1300 audit(1712947269.612:1053): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd180c660 a2=0 a3=1 items=0 ppid=2139 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.619559 kernel: audit: type=1327 audit(1712947269.612:1053): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.612000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.613000 audit[2359]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.613000 audit[2359]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd180c660 a2=0 a3=1 items=0 ppid=2139 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.631356 kernel: audit: type=1325 audit(1712947269.613:1054): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2359 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.631408 kernel: audit: type=1300 audit(1712947269.613:1054): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd180c660 a2=0 a3=1 items=0 ppid=2139 pid=2359 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.631430 kernel: audit: type=1327 audit(1712947269.613:1054): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.613000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.628000 audit[2361]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.628000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffde63dab0 a2=0 a3=1 items=0 ppid=2139 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.644488 kernel: audit: type=1325 audit(1712947269.628:1055): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.644532 kernel: audit: type=1300 audit(1712947269.628:1055): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffde63dab0 a2=0 a3=1 items=0 ppid=2139 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.644553 kernel: audit: type=1327 audit(1712947269.628:1055): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.628000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.638000 audit[2361]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.638000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffde63dab0 a2=0 a3=1 items=0 ppid=2139 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:09.638000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:09.662141 kernel: audit: type=1325 audit(1712947269.638:1056): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2361 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:09.738999 kubelet[1972]: I0412 18:41:09.738949 1972 topology_manager.go:215] "Topology Admit Handler" podUID="0b7240f2-0e43-412c-94c1-ab3f554ab736" podNamespace="calico-system" podName="calico-typha-69d68885dc-f985s" Apr 12 18:41:09.743767 systemd[1]: Created slice kubepods-besteffort-pod0b7240f2_0e43_412c_94c1_ab3f554ab736.slice. Apr 12 18:41:09.779889 kubelet[1972]: I0412 18:41:09.779846 1972 topology_manager.go:215] "Topology Admit Handler" podUID="4421bf7c-2c17-472e-8989-44bcbc83ef49" podNamespace="calico-system" podName="calico-node-bn4bx" Apr 12 18:41:09.785032 systemd[1]: Created slice kubepods-besteffort-pod4421bf7c_2c17_472e_8989_44bcbc83ef49.slice. Apr 12 18:41:09.825314 kubelet[1972]: I0412 18:41:09.825262 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0b7240f2-0e43-412c-94c1-ab3f554ab736-typha-certs\") pod \"calico-typha-69d68885dc-f985s\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " pod="calico-system/calico-typha-69d68885dc-f985s" Apr 12 18:41:09.825314 kubelet[1972]: I0412 18:41:09.825307 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-log-dir\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825500 kubelet[1972]: I0412 18:41:09.825331 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-bin-dir\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825500 kubelet[1972]: I0412 18:41:09.825351 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8t8gv\" (UniqueName: \"kubernetes.io/projected/4421bf7c-2c17-472e-8989-44bcbc83ef49-kube-api-access-8t8gv\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825500 kubelet[1972]: I0412 18:41:09.825371 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b7240f2-0e43-412c-94c1-ab3f554ab736-tigera-ca-bundle\") pod \"calico-typha-69d68885dc-f985s\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " pod="calico-system/calico-typha-69d68885dc-f985s" Apr 12 18:41:09.825500 kubelet[1972]: I0412 18:41:09.825389 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-lib-calico\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825500 kubelet[1972]: I0412 18:41:09.825408 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-run-calico\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825696 kubelet[1972]: I0412 18:41:09.825428 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-flexvol-driver-host\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825696 kubelet[1972]: I0412 18:41:09.825447 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4421bf7c-2c17-472e-8989-44bcbc83ef49-tigera-ca-bundle\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825696 kubelet[1972]: I0412 18:41:09.825467 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-txfs2\" (UniqueName: \"kubernetes.io/projected/0b7240f2-0e43-412c-94c1-ab3f554ab736-kube-api-access-txfs2\") pod \"calico-typha-69d68885dc-f985s\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " pod="calico-system/calico-typha-69d68885dc-f985s" Apr 12 18:41:09.825696 kubelet[1972]: I0412 18:41:09.825492 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-policysync\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825696 kubelet[1972]: I0412 18:41:09.825515 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-xtables-lock\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825804 kubelet[1972]: I0412 18:41:09.825533 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-net-dir\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825804 kubelet[1972]: I0412 18:41:09.825552 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-lib-modules\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.825804 kubelet[1972]: I0412 18:41:09.825573 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4421bf7c-2c17-472e-8989-44bcbc83ef49-node-certs\") pod \"calico-node-bn4bx\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " pod="calico-system/calico-node-bn4bx" Apr 12 18:41:09.887362 kubelet[1972]: I0412 18:41:09.887275 1972 topology_manager.go:215] "Topology Admit Handler" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" podNamespace="calico-system" podName="csi-node-driver-5svdz" Apr 12 18:41:09.887738 kubelet[1972]: E0412 18:41:09.887716 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:09.926822 kubelet[1972]: I0412 18:41:09.926780 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/9eed1024-4e4e-488d-b42b-1302198d0850-varrun\") pod \"csi-node-driver-5svdz\" (UID: \"9eed1024-4e4e-488d-b42b-1302198d0850\") " pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:09.926822 kubelet[1972]: I0412 18:41:09.926826 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/9eed1024-4e4e-488d-b42b-1302198d0850-registration-dir\") pod \"csi-node-driver-5svdz\" (UID: \"9eed1024-4e4e-488d-b42b-1302198d0850\") " pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:09.927257 kubelet[1972]: I0412 18:41:09.927221 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jrs2v\" (UniqueName: \"kubernetes.io/projected/9eed1024-4e4e-488d-b42b-1302198d0850-kube-api-access-jrs2v\") pod \"csi-node-driver-5svdz\" (UID: \"9eed1024-4e4e-488d-b42b-1302198d0850\") " pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:09.927410 kubelet[1972]: I0412 18:41:09.927378 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/9eed1024-4e4e-488d-b42b-1302198d0850-kubelet-dir\") pod \"csi-node-driver-5svdz\" (UID: \"9eed1024-4e4e-488d-b42b-1302198d0850\") " pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:09.927518 kubelet[1972]: I0412 18:41:09.927499 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/9eed1024-4e4e-488d-b42b-1302198d0850-socket-dir\") pod \"csi-node-driver-5svdz\" (UID: \"9eed1024-4e4e-488d-b42b-1302198d0850\") " pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:09.927958 kubelet[1972]: E0412 18:41:09.927922 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.927958 kubelet[1972]: W0412 18:41:09.927944 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.928050 kubelet[1972]: E0412 18:41:09.927964 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.928488 kubelet[1972]: E0412 18:41:09.928470 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.928488 kubelet[1972]: W0412 18:41:09.928483 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.928575 kubelet[1972]: E0412 18:41:09.928496 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.928676 kubelet[1972]: E0412 18:41:09.928659 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.928676 kubelet[1972]: W0412 18:41:09.928671 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.928743 kubelet[1972]: E0412 18:41:09.928687 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.928893 kubelet[1972]: E0412 18:41:09.928877 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.928893 kubelet[1972]: W0412 18:41:09.928890 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.928966 kubelet[1972]: E0412 18:41:09.928904 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.929071 kubelet[1972]: E0412 18:41:09.929055 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.929071 kubelet[1972]: W0412 18:41:09.929066 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.929140 kubelet[1972]: E0412 18:41:09.929084 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.929305 kubelet[1972]: E0412 18:41:09.929289 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.929305 kubelet[1972]: W0412 18:41:09.929303 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.929371 kubelet[1972]: E0412 18:41:09.929319 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.929526 kubelet[1972]: E0412 18:41:09.929510 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.929526 kubelet[1972]: W0412 18:41:09.929522 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.929592 kubelet[1972]: E0412 18:41:09.929537 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.929736 kubelet[1972]: E0412 18:41:09.929722 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.929736 kubelet[1972]: W0412 18:41:09.929733 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.929804 kubelet[1972]: E0412 18:41:09.929748 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.929916 kubelet[1972]: E0412 18:41:09.929903 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.929916 kubelet[1972]: W0412 18:41:09.929914 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.929975 kubelet[1972]: E0412 18:41:09.929926 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.930115 kubelet[1972]: E0412 18:41:09.930102 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.930115 kubelet[1972]: W0412 18:41:09.930113 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.930191 kubelet[1972]: E0412 18:41:09.930162 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.930277 kubelet[1972]: E0412 18:41:09.930264 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.930277 kubelet[1972]: W0412 18:41:09.930275 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.930337 kubelet[1972]: E0412 18:41:09.930286 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.933109 kubelet[1972]: E0412 18:41:09.933088 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.933109 kubelet[1972]: W0412 18:41:09.933104 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.933258 kubelet[1972]: E0412 18:41:09.933161 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.933367 kubelet[1972]: E0412 18:41:09.933353 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.933367 kubelet[1972]: W0412 18:41:09.933365 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.933429 kubelet[1972]: E0412 18:41:09.933377 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.933622 kubelet[1972]: E0412 18:41:09.933609 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.933688 kubelet[1972]: W0412 18:41:09.933676 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.933745 kubelet[1972]: E0412 18:41:09.933734 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.938639 kubelet[1972]: E0412 18:41:09.938616 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.938639 kubelet[1972]: W0412 18:41:09.938631 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.938745 kubelet[1972]: E0412 18:41:09.938645 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.944620 kubelet[1972]: E0412 18:41:09.943446 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.944620 kubelet[1972]: W0412 18:41:09.943461 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.944620 kubelet[1972]: E0412 18:41:09.943476 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:09.944620 kubelet[1972]: E0412 18:41:09.943991 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:09.944620 kubelet[1972]: W0412 18:41:09.944003 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:09.944620 kubelet[1972]: E0412 18:41:09.944016 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.030625 kubelet[1972]: E0412 18:41:10.030598 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.030765 kubelet[1972]: W0412 18:41:10.030749 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.030861 kubelet[1972]: E0412 18:41:10.030847 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.031115 kubelet[1972]: E0412 18:41:10.031103 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.031219 kubelet[1972]: W0412 18:41:10.031206 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.031289 kubelet[1972]: E0412 18:41:10.031278 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.031577 kubelet[1972]: E0412 18:41:10.031552 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.031577 kubelet[1972]: W0412 18:41:10.031569 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.031639 kubelet[1972]: E0412 18:41:10.031590 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.031766 kubelet[1972]: E0412 18:41:10.031751 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.031766 kubelet[1972]: W0412 18:41:10.031760 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.031824 kubelet[1972]: E0412 18:41:10.031774 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.031928 kubelet[1972]: E0412 18:41:10.031914 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.031928 kubelet[1972]: W0412 18:41:10.031924 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.031980 kubelet[1972]: E0412 18:41:10.031938 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032145 kubelet[1972]: E0412 18:41:10.032130 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032145 kubelet[1972]: W0412 18:41:10.032142 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.032216 kubelet[1972]: E0412 18:41:10.032161 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032348 kubelet[1972]: E0412 18:41:10.032332 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032348 kubelet[1972]: W0412 18:41:10.032344 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.032408 kubelet[1972]: E0412 18:41:10.032358 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032543 kubelet[1972]: E0412 18:41:10.032530 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032543 kubelet[1972]: W0412 18:41:10.032540 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.032604 kubelet[1972]: E0412 18:41:10.032580 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032686 kubelet[1972]: E0412 18:41:10.032672 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032686 kubelet[1972]: W0412 18:41:10.032681 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.032746 kubelet[1972]: E0412 18:41:10.032720 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032836 kubelet[1972]: E0412 18:41:10.032817 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032836 kubelet[1972]: W0412 18:41:10.032826 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.032900 kubelet[1972]: E0412 18:41:10.032849 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.032999 kubelet[1972]: E0412 18:41:10.032983 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.032999 kubelet[1972]: W0412 18:41:10.032993 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033056 kubelet[1972]: E0412 18:41:10.033002 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.033166 kubelet[1972]: E0412 18:41:10.033153 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.033166 kubelet[1972]: W0412 18:41:10.033164 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033228 kubelet[1972]: E0412 18:41:10.033178 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.033343 kubelet[1972]: E0412 18:41:10.033330 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.033343 kubelet[1972]: W0412 18:41:10.033341 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033403 kubelet[1972]: E0412 18:41:10.033355 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.033524 kubelet[1972]: E0412 18:41:10.033505 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.033524 kubelet[1972]: W0412 18:41:10.033520 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033586 kubelet[1972]: E0412 18:41:10.033537 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.033730 kubelet[1972]: E0412 18:41:10.033713 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.033730 kubelet[1972]: W0412 18:41:10.033725 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033853 kubelet[1972]: E0412 18:41:10.033741 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.033888 kubelet[1972]: E0412 18:41:10.033879 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.033888 kubelet[1972]: W0412 18:41:10.033886 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.033936 kubelet[1972]: E0412 18:41:10.033927 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.034040 kubelet[1972]: E0412 18:41:10.034025 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.034040 kubelet[1972]: W0412 18:41:10.034034 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.034105 kubelet[1972]: E0412 18:41:10.034070 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.034185 kubelet[1972]: E0412 18:41:10.034171 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.034185 kubelet[1972]: W0412 18:41:10.034180 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.034298 kubelet[1972]: E0412 18:41:10.034219 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.034323 kubelet[1972]: E0412 18:41:10.034301 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.034323 kubelet[1972]: W0412 18:41:10.034307 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.034370 kubelet[1972]: E0412 18:41:10.034324 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.034494 kubelet[1972]: E0412 18:41:10.034481 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.034494 kubelet[1972]: W0412 18:41:10.034492 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.034552 kubelet[1972]: E0412 18:41:10.034503 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.036238 kubelet[1972]: E0412 18:41:10.036222 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.036314 kubelet[1972]: W0412 18:41:10.036300 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.036396 kubelet[1972]: E0412 18:41:10.036384 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.036651 kubelet[1972]: E0412 18:41:10.036638 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.036719 kubelet[1972]: W0412 18:41:10.036707 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.036856 kubelet[1972]: E0412 18:41:10.036805 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.036963 kubelet[1972]: E0412 18:41:10.036950 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.037022 kubelet[1972]: W0412 18:41:10.037011 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.037093 kubelet[1972]: E0412 18:41:10.037081 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.038243 kubelet[1972]: E0412 18:41:10.038223 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.038243 kubelet[1972]: W0412 18:41:10.038238 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.038329 kubelet[1972]: E0412 18:41:10.038261 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.038448 kubelet[1972]: E0412 18:41:10.038432 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.038448 kubelet[1972]: W0412 18:41:10.038443 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.038499 kubelet[1972]: E0412 18:41:10.038454 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.047061 kubelet[1972]: E0412 18:41:10.047037 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:10.047061 kubelet[1972]: W0412 18:41:10.047052 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:10.047061 kubelet[1972]: E0412 18:41:10.047064 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:10.047508 kubelet[1972]: E0412 18:41:10.047485 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:10.048302 env[1099]: time="2024-04-12T18:41:10.047956594Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-69d68885dc-f985s,Uid:0b7240f2-0e43-412c-94c1-ab3f554ab736,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:10.064683 env[1099]: time="2024-04-12T18:41:10.064462985Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:10.064683 env[1099]: time="2024-04-12T18:41:10.064505149Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:10.064683 env[1099]: time="2024-04-12T18:41:10.064515310Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:10.064818 env[1099]: time="2024-04-12T18:41:10.064714246Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6 pid=2416 runtime=io.containerd.runc.v2 Apr 12 18:41:10.075087 systemd[1]: Started cri-containerd-e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6.scope. Apr 12 18:41:10.087898 kubelet[1972]: E0412 18:41:10.087871 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:10.089950 env[1099]: time="2024-04-12T18:41:10.089912930Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bn4bx,Uid:4421bf7c-2c17-472e-8989-44bcbc83ef49,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit: BPF prog-id=121 op=LOAD Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2416 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323462663637633537373536386265373331633933316663653933 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2416 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323462663637633537373536386265373331633933316663653933 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit: BPF prog-id=122 op=LOAD Apr 12 18:41:10.097000 audit[2424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2416 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323462663637633537373536386265373331633933316663653933 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit: BPF prog-id=123 op=LOAD Apr 12 18:41:10.097000 audit[2424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2416 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323462663637633537373536386265373331633933316663653933 Apr 12 18:41:10.097000 audit: BPF prog-id=123 op=UNLOAD Apr 12 18:41:10.097000 audit: BPF prog-id=122 op=UNLOAD Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { perfmon } for pid=2424 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit[2424]: AVC avc: denied { bpf } for pid=2424 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.097000 audit: BPF prog-id=124 op=LOAD Apr 12 18:41:10.097000 audit[2424]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2416 pid=2424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532323462663637633537373536386265373331633933316663653933 Apr 12 18:41:10.107148 env[1099]: time="2024-04-12T18:41:10.105164456Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:10.107148 env[1099]: time="2024-04-12T18:41:10.105212460Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:10.107148 env[1099]: time="2024-04-12T18:41:10.105223261Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:10.107148 env[1099]: time="2024-04-12T18:41:10.105376754Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03 pid=2448 runtime=io.containerd.runc.v2 Apr 12 18:41:10.116720 systemd[1]: Started cri-containerd-5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03.scope. Apr 12 18:41:10.128231 env[1099]: time="2024-04-12T18:41:10.128190277Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-69d68885dc-f985s,Uid:0b7240f2-0e43-412c-94c1-ab3f554ab736,Namespace:calico-system,Attempt:0,} returns sandbox id \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\"" Apr 12 18:41:10.132318 kubelet[1972]: E0412 18:41:10.132293 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:10.135312 env[1099]: time="2024-04-12T18:41:10.135284915Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\"" Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.138000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit: BPF prog-id=125 op=LOAD Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333335383562303536303337376435613432363061313039646237 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333335383562303536303337376435613432363061313039646237 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit: BPF prog-id=126 op=LOAD Apr 12 18:41:10.139000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333335383562303536303337376435613432363061313039646237 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit: BPF prog-id=127 op=LOAD Apr 12 18:41:10.139000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333335383562303536303337376435613432363061313039646237 Apr 12 18:41:10.139000 audit: BPF prog-id=127 op=UNLOAD Apr 12 18:41:10.139000 audit: BPF prog-id=126 op=UNLOAD Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { perfmon } for pid=2457 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit[2457]: AVC avc: denied { bpf } for pid=2457 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:10.139000 audit: BPF prog-id=128 op=LOAD Apr 12 18:41:10.139000 audit[2457]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2448 pid=2457 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537333335383562303536303337376435613432363061313039646237 Apr 12 18:41:10.153763 env[1099]: time="2024-04-12T18:41:10.153725749Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bn4bx,Uid:4421bf7c-2c17-472e-8989-44bcbc83ef49,Namespace:calico-system,Attempt:0,} returns sandbox id \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\"" Apr 12 18:41:10.154340 kubelet[1972]: E0412 18:41:10.154310 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:10.664000 audit[2490]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:10.664000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=fffffd475f80 a2=0 a3=1 items=0 ppid=2139 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:10.664000 audit[2490]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2490 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:10.664000 audit[2490]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=fffffd475f80 a2=0 a3=1 items=0 ppid=2139 pid=2490 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:10.664000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:11.107317 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount629656536.mount: Deactivated successfully. Apr 12 18:41:11.677000 audit[2492]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:11.677000 audit[2492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffe69a86b0 a2=0 a3=1 items=0 ppid=2139 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:11.677000 audit[2492]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2492 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:11.677000 audit[2492]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffe69a86b0 a2=0 a3=1 items=0 ppid=2139 pid=2492 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.677000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:11.805180 env[1099]: time="2024-04-12T18:41:11.805142433Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:11.807586 env[1099]: time="2024-04-12T18:41:11.807549228Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:11.809176 env[1099]: time="2024-04-12T18:41:11.809148997Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:11.810772 env[1099]: time="2024-04-12T18:41:11.810747166Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:418671dc5b90134cba7b93a914c8329e8ecafd45de67165aeee74252e5f14f3e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:11.811377 env[1099]: time="2024-04-12T18:41:11.811353695Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.3\" returns image reference \"sha256:a3fec2ec51dbbf4821da3fe949ec3b82082fa0a43548d22fd4af49bac4164545\"" Apr 12 18:41:11.813260 env[1099]: time="2024-04-12T18:41:11.813221366Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\"" Apr 12 18:41:11.817881 kubelet[1972]: E0412 18:41:11.816868 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:11.821276 env[1099]: time="2024-04-12T18:41:11.821235654Z" level=info msg="CreateContainer within sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:41:11.831339 env[1099]: time="2024-04-12T18:41:11.831301427Z" level=info msg="CreateContainer within sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\"" Apr 12 18:41:11.832333 env[1099]: time="2024-04-12T18:41:11.832296308Z" level=info msg="StartContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\"" Apr 12 18:41:11.846245 systemd[1]: Started cri-containerd-c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e.scope. Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit: BPF prog-id=129 op=LOAD Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2416 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643763623537353733366465633763326632666363373562316631 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2416 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643763623537353733366465633763326632666363373562316631 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.874000 audit: BPF prog-id=130 op=LOAD Apr 12 18:41:11.874000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2416 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643763623537353733366465633763326632666363373562316631 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit: BPF prog-id=131 op=LOAD Apr 12 18:41:11.875000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2416 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643763623537353733366465633763326632666363373562316631 Apr 12 18:41:11.875000 audit: BPF prog-id=131 op=UNLOAD Apr 12 18:41:11.875000 audit: BPF prog-id=130 op=UNLOAD Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:11.875000 audit: BPF prog-id=132 op=LOAD Apr 12 18:41:11.875000 audit[2502]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2416 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:11.875000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333643763623537353733366465633763326632666363373562316631 Apr 12 18:41:11.898389 env[1099]: time="2024-04-12T18:41:11.898352406Z" level=info msg="StartContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" returns successfully" Apr 12 18:41:12.868862 env[1099]: time="2024-04-12T18:41:12.868818170Z" level=info msg="StopContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" with timeout 300 (s)" Apr 12 18:41:12.869500 env[1099]: time="2024-04-12T18:41:12.869459699Z" level=info msg="Stop container \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" with signal terminated" Apr 12 18:41:12.878592 kubelet[1972]: I0412 18:41:12.878557 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-69d68885dc-f985s" podStartSLOduration=2.200570906 podStartE2EDuration="3.878519722s" podCreationTimestamp="2024-04-12 18:41:09 +0000 UTC" firstStartedPulling="2024-04-12 18:41:10.134082894 +0000 UTC m=+21.427010600" lastFinishedPulling="2024-04-12 18:41:11.81203171 +0000 UTC m=+23.104959416" observedRunningTime="2024-04-12 18:41:12.878355349 +0000 UTC m=+24.171283055" watchObservedRunningTime="2024-04-12 18:41:12.878519722 +0000 UTC m=+24.171447428" Apr 12 18:41:12.906000 audit[2542]: NETFILTER_CFG table=filter:97 family=2 entries=15 op=nft_register_rule pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:12.906000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff65bdd00 a2=0 a3=1 items=0 ppid=2139 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:12.906000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:12.909802 systemd[1]: cri-containerd-c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e.scope: Deactivated successfully. Apr 12 18:41:12.908000 audit: BPF prog-id=129 op=UNLOAD Apr 12 18:41:12.907000 audit[2542]: NETFILTER_CFG table=nat:98 family=2 entries=19 op=nft_register_chain pid=2542 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:12.907000 audit[2542]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=fffff65bdd00 a2=0 a3=1 items=0 ppid=2139 pid=2542 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:12.907000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:12.913000 audit: BPF prog-id=132 op=UNLOAD Apr 12 18:41:12.942709 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e-rootfs.mount: Deactivated successfully. Apr 12 18:41:12.989069 env[1099]: time="2024-04-12T18:41:12.989019453Z" level=info msg="shim disconnected" id=c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e Apr 12 18:41:12.989298 env[1099]: time="2024-04-12T18:41:12.989276553Z" level=warning msg="cleaning up after shim disconnected" id=c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e namespace=k8s.io Apr 12 18:41:12.989361 env[1099]: time="2024-04-12T18:41:12.989347878Z" level=info msg="cleaning up dead shim" Apr 12 18:41:13.000413 env[1099]: time="2024-04-12T18:41:13.000371653Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:12Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2555 runtime=io.containerd.runc.v2\n" Apr 12 18:41:13.002334 env[1099]: time="2024-04-12T18:41:13.002298719Z" level=info msg="StopContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" returns successfully" Apr 12 18:41:13.003158 env[1099]: time="2024-04-12T18:41:13.003126821Z" level=info msg="StopPodSandbox for \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\"" Apr 12 18:41:13.003231 env[1099]: time="2024-04-12T18:41:13.003189066Z" level=info msg="Container to stop \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Apr 12 18:41:13.004733 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6-shm.mount: Deactivated successfully. Apr 12 18:41:13.009905 systemd[1]: cri-containerd-e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6.scope: Deactivated successfully. Apr 12 18:41:13.009000 audit: BPF prog-id=121 op=UNLOAD Apr 12 18:41:13.013000 audit: BPF prog-id=124 op=UNLOAD Apr 12 18:41:13.032961 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6-rootfs.mount: Deactivated successfully. Apr 12 18:41:13.046536 env[1099]: time="2024-04-12T18:41:13.046476811Z" level=info msg="shim disconnected" id=e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6 Apr 12 18:41:13.046536 env[1099]: time="2024-04-12T18:41:13.046535015Z" level=warning msg="cleaning up after shim disconnected" id=e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6 namespace=k8s.io Apr 12 18:41:13.046731 env[1099]: time="2024-04-12T18:41:13.046546536Z" level=info msg="cleaning up dead shim" Apr 12 18:41:13.058060 env[1099]: time="2024-04-12T18:41:13.058010670Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2588 runtime=io.containerd.runc.v2\n" Apr 12 18:41:13.058391 env[1099]: time="2024-04-12T18:41:13.058345735Z" level=info msg="TearDown network for sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" successfully" Apr 12 18:41:13.058431 env[1099]: time="2024-04-12T18:41:13.058388979Z" level=info msg="StopPodSandbox for \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" returns successfully" Apr 12 18:41:13.081938 kubelet[1972]: I0412 18:41:13.079676 1972 topology_manager.go:215] "Topology Admit Handler" podUID="1a266c43-d103-48db-92f7-8569c6c0f46b" podNamespace="calico-system" podName="calico-typha-776f85f984-p48sr" Apr 12 18:41:13.081938 kubelet[1972]: E0412 18:41:13.079828 1972 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="0b7240f2-0e43-412c-94c1-ab3f554ab736" containerName="calico-typha" Apr 12 18:41:13.081938 kubelet[1972]: I0412 18:41:13.079865 1972 memory_manager.go:354] "RemoveStaleState removing state" podUID="0b7240f2-0e43-412c-94c1-ab3f554ab736" containerName="calico-typha" Apr 12 18:41:13.085418 systemd[1]: Created slice kubepods-besteffort-pod1a266c43_d103_48db_92f7_8569c6c0f46b.slice. Apr 12 18:41:13.101758 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1973235343.mount: Deactivated successfully. Apr 12 18:41:13.142232 kubelet[1972]: E0412 18:41:13.142115 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.142232 kubelet[1972]: W0412 18:41:13.142150 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.142232 kubelet[1972]: E0412 18:41:13.142170 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142345 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143158 kubelet[1972]: W0412 18:41:13.142354 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142366 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142520 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143158 kubelet[1972]: W0412 18:41:13.142529 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142539 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142690 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143158 kubelet[1972]: W0412 18:41:13.142698 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142710 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143158 kubelet[1972]: E0412 18:41:13.142866 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143437 kubelet[1972]: W0412 18:41:13.142874 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.142884 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.143019 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143437 kubelet[1972]: W0412 18:41:13.143026 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.143035 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.143247 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143437 kubelet[1972]: W0412 18:41:13.143258 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.143270 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143437 kubelet[1972]: E0412 18:41:13.143418 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143437 kubelet[1972]: W0412 18:41:13.143425 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143661 kubelet[1972]: E0412 18:41:13.143435 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143661 kubelet[1972]: E0412 18:41:13.143576 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143661 kubelet[1972]: W0412 18:41:13.143584 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143661 kubelet[1972]: E0412 18:41:13.143594 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143755 kubelet[1972]: E0412 18:41:13.143714 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143755 kubelet[1972]: W0412 18:41:13.143721 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143755 kubelet[1972]: E0412 18:41:13.143732 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.143885 kubelet[1972]: E0412 18:41:13.143855 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.143885 kubelet[1972]: W0412 18:41:13.143866 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.143885 kubelet[1972]: E0412 18:41:13.143876 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.144054 kubelet[1972]: E0412 18:41:13.144034 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.144054 kubelet[1972]: W0412 18:41:13.144047 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.144114 kubelet[1972]: E0412 18:41:13.144057 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.154995 kubelet[1972]: E0412 18:41:13.154955 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.154995 kubelet[1972]: W0412 18:41:13.154982 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.154995 kubelet[1972]: E0412 18:41:13.154999 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.155160 kubelet[1972]: I0412 18:41:13.155034 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0b7240f2-0e43-412c-94c1-ab3f554ab736-typha-certs\") pod \"0b7240f2-0e43-412c-94c1-ab3f554ab736\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " Apr 12 18:41:13.155348 kubelet[1972]: E0412 18:41:13.155320 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.155348 kubelet[1972]: W0412 18:41:13.155334 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.155406 kubelet[1972]: E0412 18:41:13.155356 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.155406 kubelet[1972]: I0412 18:41:13.155382 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b7240f2-0e43-412c-94c1-ab3f554ab736-tigera-ca-bundle\") pod \"0b7240f2-0e43-412c-94c1-ab3f554ab736\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " Apr 12 18:41:13.155815 kubelet[1972]: E0412 18:41:13.155773 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.155815 kubelet[1972]: W0412 18:41:13.155797 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.155815 kubelet[1972]: E0412 18:41:13.155815 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.155969 kubelet[1972]: I0412 18:41:13.155839 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-txfs2\" (UniqueName: \"kubernetes.io/projected/0b7240f2-0e43-412c-94c1-ab3f554ab736-kube-api-access-txfs2\") pod \"0b7240f2-0e43-412c-94c1-ab3f554ab736\" (UID: \"0b7240f2-0e43-412c-94c1-ab3f554ab736\") " Apr 12 18:41:13.156266 kubelet[1972]: E0412 18:41:13.156047 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.156266 kubelet[1972]: W0412 18:41:13.156063 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.156266 kubelet[1972]: E0412 18:41:13.156086 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.156266 kubelet[1972]: I0412 18:41:13.156106 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/1a266c43-d103-48db-92f7-8569c6c0f46b-typha-certs\") pod \"calico-typha-776f85f984-p48sr\" (UID: \"1a266c43-d103-48db-92f7-8569c6c0f46b\") " pod="calico-system/calico-typha-776f85f984-p48sr" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.156523 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.158733 kubelet[1972]: W0412 18:41:13.156540 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.156568 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.156811 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.158733 kubelet[1972]: W0412 18:41:13.156824 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.156845 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.157024 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.158733 kubelet[1972]: W0412 18:41:13.157036 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.158733 kubelet[1972]: E0412 18:41:13.157049 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159008 kubelet[1972]: I0412 18:41:13.157086 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/1a266c43-d103-48db-92f7-8569c6c0f46b-tigera-ca-bundle\") pod \"calico-typha-776f85f984-p48sr\" (UID: \"1a266c43-d103-48db-92f7-8569c6c0f46b\") " pod="calico-system/calico-typha-776f85f984-p48sr" Apr 12 18:41:13.159008 kubelet[1972]: E0412 18:41:13.157267 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159008 kubelet[1972]: W0412 18:41:13.157276 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159008 kubelet[1972]: E0412 18:41:13.157287 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159008 kubelet[1972]: I0412 18:41:13.157305 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wjgcc\" (UniqueName: \"kubernetes.io/projected/1a266c43-d103-48db-92f7-8569c6c0f46b-kube-api-access-wjgcc\") pod \"calico-typha-776f85f984-p48sr\" (UID: \"1a266c43-d103-48db-92f7-8569c6c0f46b\") " pod="calico-system/calico-typha-776f85f984-p48sr" Apr 12 18:41:13.159008 kubelet[1972]: E0412 18:41:13.157458 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159008 kubelet[1972]: W0412 18:41:13.157466 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159008 kubelet[1972]: E0412 18:41:13.157476 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.157734 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159241 kubelet[1972]: W0412 18:41:13.157745 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.157837 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.157983 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159241 kubelet[1972]: W0412 18:41:13.157991 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.158005 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.158170 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159241 kubelet[1972]: W0412 18:41:13.158178 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.158210 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159241 kubelet[1972]: E0412 18:41:13.158373 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159457 kubelet[1972]: W0412 18:41:13.158382 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159457 kubelet[1972]: E0412 18:41:13.158392 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159457 kubelet[1972]: E0412 18:41:13.158523 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.159457 kubelet[1972]: W0412 18:41:13.158530 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.159457 kubelet[1972]: E0412 18:41:13.158540 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.159457 kubelet[1972]: I0412 18:41:13.159393 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/0b7240f2-0e43-412c-94c1-ab3f554ab736-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "0b7240f2-0e43-412c-94c1-ab3f554ab736" (UID: "0b7240f2-0e43-412c-94c1-ab3f554ab736"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Apr 12 18:41:13.160849 kubelet[1972]: E0412 18:41:13.160824 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.160849 kubelet[1972]: W0412 18:41:13.160842 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.160955 kubelet[1972]: E0412 18:41:13.160859 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.161202 kubelet[1972]: I0412 18:41:13.161179 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/0b7240f2-0e43-412c-94c1-ab3f554ab736-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "0b7240f2-0e43-412c-94c1-ab3f554ab736" (UID: "0b7240f2-0e43-412c-94c1-ab3f554ab736"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Apr 12 18:41:13.162039 kubelet[1972]: I0412 18:41:13.161988 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/0b7240f2-0e43-412c-94c1-ab3f554ab736-kube-api-access-txfs2" (OuterVolumeSpecName: "kube-api-access-txfs2") pod "0b7240f2-0e43-412c-94c1-ab3f554ab736" (UID: "0b7240f2-0e43-412c-94c1-ab3f554ab736"). InnerVolumeSpecName "kube-api-access-txfs2". PluginName "kubernetes.io/projected", VolumeGidValue "" Apr 12 18:41:13.183047 env[1099]: time="2024-04-12T18:41:13.183001824Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:13.185077 env[1099]: time="2024-04-12T18:41:13.185033815Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:13.186527 env[1099]: time="2024-04-12T18:41:13.186495084Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:13.188133 env[1099]: time="2024-04-12T18:41:13.188094083Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:256c6fee1c0cd345ce1c83a28132e3134a9f271704d41d214436bf7ec48ba4b8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:13.188529 env[1099]: time="2024-04-12T18:41:13.188501994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.3\" returns image reference \"sha256:66b34d81f14321f94491856962a59366e9d87f710670399b48c106cb0970c607\"" Apr 12 18:41:13.189925 env[1099]: time="2024-04-12T18:41:13.189891417Z" level=info msg="CreateContainer within sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:41:13.201651 env[1099]: time="2024-04-12T18:41:13.201601050Z" level=info msg="CreateContainer within sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\"" Apr 12 18:41:13.202209 env[1099]: time="2024-04-12T18:41:13.202165092Z" level=info msg="StartContainer for \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\"" Apr 12 18:41:13.216772 systemd[1]: Started cri-containerd-696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95.scope. Apr 12 18:41:13.240000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.240000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2448 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366537623336383439316162343662613730666238653362643939 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit: BPF prog-id=133 op=LOAD Apr 12 18:41:13.241000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2448 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366537623336383439316162343662613730666238653362643939 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit: BPF prog-id=134 op=LOAD Apr 12 18:41:13.241000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2448 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366537623336383439316162343662613730666238653362643939 Apr 12 18:41:13.241000 audit: BPF prog-id=134 op=UNLOAD Apr 12 18:41:13.241000 audit: BPF prog-id=133 op=UNLOAD Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.241000 audit: BPF prog-id=135 op=LOAD Apr 12 18:41:13.241000 audit[2637]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2448 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.241000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639366537623336383439316162343662613730666238653362643939 Apr 12 18:41:13.258550 kubelet[1972]: E0412 18:41:13.258523 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.258550 kubelet[1972]: W0412 18:41:13.258543 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.258746 kubelet[1972]: E0412 18:41:13.258564 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.258826 kubelet[1972]: E0412 18:41:13.258812 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.258826 kubelet[1972]: W0412 18:41:13.258823 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.258896 kubelet[1972]: E0412 18:41:13.258837 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.258999 kubelet[1972]: E0412 18:41:13.258987 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.258999 kubelet[1972]: W0412 18:41:13.258997 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.259065 kubelet[1972]: E0412 18:41:13.259011 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.259065 kubelet[1972]: I0412 18:41:13.259051 1972 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/0b7240f2-0e43-412c-94c1-ab3f554ab736-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:13.259065 kubelet[1972]: I0412 18:41:13.259063 1972 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-txfs2\" (UniqueName: \"kubernetes.io/projected/0b7240f2-0e43-412c-94c1-ab3f554ab736-kube-api-access-txfs2\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:13.259243 kubelet[1972]: I0412 18:41:13.259073 1972 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/0b7240f2-0e43-412c-94c1-ab3f554ab736-typha-certs\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:13.259305 kubelet[1972]: E0412 18:41:13.259288 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.259305 kubelet[1972]: W0412 18:41:13.259302 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.259382 kubelet[1972]: E0412 18:41:13.259318 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.259539 kubelet[1972]: E0412 18:41:13.259519 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.259579 kubelet[1972]: W0412 18:41:13.259540 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.259579 kubelet[1972]: E0412 18:41:13.259562 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.259725 kubelet[1972]: E0412 18:41:13.259711 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.259725 kubelet[1972]: W0412 18:41:13.259724 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.259796 kubelet[1972]: E0412 18:41:13.259741 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.260654 kubelet[1972]: E0412 18:41:13.260619 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.260654 kubelet[1972]: W0412 18:41:13.260638 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.260654 kubelet[1972]: E0412 18:41:13.260658 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.260958 kubelet[1972]: E0412 18:41:13.260939 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.260958 kubelet[1972]: W0412 18:41:13.260954 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.261091 kubelet[1972]: E0412 18:41:13.261019 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.261209 kubelet[1972]: E0412 18:41:13.261190 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.261264 kubelet[1972]: W0412 18:41:13.261214 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.261384 kubelet[1972]: E0412 18:41:13.261321 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.261560 kubelet[1972]: E0412 18:41:13.261541 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.261560 kubelet[1972]: W0412 18:41:13.261557 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.261625 kubelet[1972]: E0412 18:41:13.261577 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.261751 kubelet[1972]: E0412 18:41:13.261733 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.261751 kubelet[1972]: W0412 18:41:13.261747 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.261825 kubelet[1972]: E0412 18:41:13.261763 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.261954 kubelet[1972]: E0412 18:41:13.261932 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.261954 kubelet[1972]: W0412 18:41:13.261944 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.262044 kubelet[1972]: E0412 18:41:13.261961 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.262244 kubelet[1972]: E0412 18:41:13.262222 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.262293 kubelet[1972]: W0412 18:41:13.262238 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.262293 kubelet[1972]: E0412 18:41:13.262262 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.265986 kubelet[1972]: E0412 18:41:13.265961 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.265986 kubelet[1972]: W0412 18:41:13.265982 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.265986 kubelet[1972]: E0412 18:41:13.265999 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.266503 kubelet[1972]: E0412 18:41:13.266479 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.266503 kubelet[1972]: W0412 18:41:13.266494 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.266614 kubelet[1972]: E0412 18:41:13.266508 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.267409 kubelet[1972]: E0412 18:41:13.267388 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.267409 kubelet[1972]: W0412 18:41:13.267404 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.267629 kubelet[1972]: E0412 18:41:13.267417 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.268580 kubelet[1972]: E0412 18:41:13.268561 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.268580 kubelet[1972]: W0412 18:41:13.268578 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.268671 kubelet[1972]: E0412 18:41:13.268592 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.270808 env[1099]: time="2024-04-12T18:41:13.270750002Z" level=info msg="StartContainer for \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\" returns successfully" Apr 12 18:41:13.274731 kubelet[1972]: E0412 18:41:13.274655 1972 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Apr 12 18:41:13.274731 kubelet[1972]: W0412 18:41:13.274672 1972 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Apr 12 18:41:13.274731 kubelet[1972]: E0412 18:41:13.274697 1972 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Apr 12 18:41:13.276000 systemd[1]: cri-containerd-696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95.scope: Deactivated successfully. Apr 12 18:41:13.281000 audit: BPF prog-id=135 op=UNLOAD Apr 12 18:41:13.306953 env[1099]: time="2024-04-12T18:41:13.306904896Z" level=info msg="shim disconnected" id=696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95 Apr 12 18:41:13.306953 env[1099]: time="2024-04-12T18:41:13.306955380Z" level=warning msg="cleaning up after shim disconnected" id=696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95 namespace=k8s.io Apr 12 18:41:13.307191 env[1099]: time="2024-04-12T18:41:13.306965620Z" level=info msg="cleaning up dead shim" Apr 12 18:41:13.313803 env[1099]: time="2024-04-12T18:41:13.313771247Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2695 runtime=io.containerd.runc.v2\n" Apr 12 18:41:13.387668 kubelet[1972]: E0412 18:41:13.387631 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:13.389391 env[1099]: time="2024-04-12T18:41:13.389358160Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-776f85f984-p48sr,Uid:1a266c43-d103-48db-92f7-8569c6c0f46b,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:13.401821 env[1099]: time="2024-04-12T18:41:13.401695639Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:13.401821 env[1099]: time="2024-04-12T18:41:13.401738402Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:13.401821 env[1099]: time="2024-04-12T18:41:13.401748723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:13.405508 env[1099]: time="2024-04-12T18:41:13.405464520Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c79691ccc810e7ca69aa9d258a9d3d5d505bc3d1a9652535809c6bb904e07b90 pid=2716 runtime=io.containerd.runc.v2 Apr 12 18:41:13.415192 systemd[1]: Started cri-containerd-c79691ccc810e7ca69aa9d258a9d3d5d505bc3d1a9652535809c6bb904e07b90.scope. Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.436000 audit: BPF prog-id=136 op=LOAD Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2716 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393639316363633831306537636136396161396432353861396433 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2716 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393639316363633831306537636136396161396432353861396433 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit: BPF prog-id=137 op=LOAD Apr 12 18:41:13.437000 audit[2725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2716 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393639316363633831306537636136396161396432353861396433 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit: BPF prog-id=138 op=LOAD Apr 12 18:41:13.437000 audit[2725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2716 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393639316363633831306537636136396161396432353861396433 Apr 12 18:41:13.437000 audit: BPF prog-id=138 op=UNLOAD Apr 12 18:41:13.437000 audit: BPF prog-id=137 op=UNLOAD Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { perfmon } for pid=2725 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit[2725]: AVC avc: denied { bpf } for pid=2725 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.437000 audit: BPF prog-id=139 op=LOAD Apr 12 18:41:13.437000 audit[2725]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2716 pid=2725 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.437000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337393639316363633831306537636136396161396432353861396433 Apr 12 18:41:13.455387 env[1099]: time="2024-04-12T18:41:13.455353717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-776f85f984-p48sr,Uid:1a266c43-d103-48db-92f7-8569c6c0f46b,Namespace:calico-system,Attempt:0,} returns sandbox id \"c79691ccc810e7ca69aa9d258a9d3d5d505bc3d1a9652535809c6bb904e07b90\"" Apr 12 18:41:13.456412 kubelet[1972]: E0412 18:41:13.455954 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:13.462990 env[1099]: time="2024-04-12T18:41:13.462943722Z" level=info msg="CreateContainer within sandbox \"c79691ccc810e7ca69aa9d258a9d3d5d505bc3d1a9652535809c6bb904e07b90\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Apr 12 18:41:13.472461 env[1099]: time="2024-04-12T18:41:13.472420469Z" level=info msg="CreateContainer within sandbox \"c79691ccc810e7ca69aa9d258a9d3d5d505bc3d1a9652535809c6bb904e07b90\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"00df8011dd79fae0623b952f9693afd80e3cbb80c2dd5e3cf626bb3e719f8425\"" Apr 12 18:41:13.472882 env[1099]: time="2024-04-12T18:41:13.472812218Z" level=info msg="StartContainer for \"00df8011dd79fae0623b952f9693afd80e3cbb80c2dd5e3cf626bb3e719f8425\"" Apr 12 18:41:13.486712 systemd[1]: Started cri-containerd-00df8011dd79fae0623b952f9693afd80e3cbb80c2dd5e3cf626bb3e719f8425.scope. Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.506000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.506000 audit: BPF prog-id=140 op=LOAD Apr 12 18:41:13.506000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.506000 audit[2758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2716 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646638303131646437396661653036323362393532663936393361 Apr 12 18:41:13.506000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.506000 audit[2758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2716 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.506000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646638303131646437396661653036323362393532663936393361 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit: BPF prog-id=141 op=LOAD Apr 12 18:41:13.507000 audit[2758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2716 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646638303131646437396661653036323362393532663936393361 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.507000 audit: BPF prog-id=142 op=LOAD Apr 12 18:41:13.507000 audit[2758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2716 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646638303131646437396661653036323362393532663936393361 Apr 12 18:41:13.508000 audit: BPF prog-id=142 op=UNLOAD Apr 12 18:41:13.508000 audit: BPF prog-id=141 op=UNLOAD Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { perfmon } for pid=2758 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit[2758]: AVC avc: denied { bpf } for pid=2758 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:13.508000 audit: BPF prog-id=143 op=LOAD Apr 12 18:41:13.508000 audit[2758]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2716 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.508000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030646638303131646437396661653036323362393532663936393361 Apr 12 18:41:13.532604 env[1099]: time="2024-04-12T18:41:13.532547469Z" level=info msg="StartContainer for \"00df8011dd79fae0623b952f9693afd80e3cbb80c2dd5e3cf626bb3e719f8425\" returns successfully" Apr 12 18:41:13.816836 kubelet[1972]: E0412 18:41:13.816805 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:13.871346 env[1099]: time="2024-04-12T18:41:13.871172940Z" level=info msg="StopPodSandbox for \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\"" Apr 12 18:41:13.871667 env[1099]: time="2024-04-12T18:41:13.871372275Z" level=info msg="Container to stop \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Apr 12 18:41:13.872238 kubelet[1972]: I0412 18:41:13.872215 1972 scope.go:117] "RemoveContainer" containerID="c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e" Apr 12 18:41:13.876207 systemd[1]: Removed slice kubepods-besteffort-pod0b7240f2_0e43_412c_94c1_ab3f554ab736.slice. Apr 12 18:41:13.876732 kubelet[1972]: E0412 18:41:13.876713 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:13.879578 env[1099]: time="2024-04-12T18:41:13.879529163Z" level=info msg="RemoveContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\"" Apr 12 18:41:13.883227 env[1099]: time="2024-04-12T18:41:13.883193436Z" level=info msg="RemoveContainer for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" returns successfully" Apr 12 18:41:13.883473 kubelet[1972]: I0412 18:41:13.883454 1972 scope.go:117] "RemoveContainer" containerID="c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e" Apr 12 18:41:13.883968 env[1099]: time="2024-04-12T18:41:13.883899768Z" level=error msg="ContainerStatus for \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\": not found" Apr 12 18:41:13.884111 kubelet[1972]: E0412 18:41:13.884097 1972 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\": not found" containerID="c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e" Apr 12 18:41:13.884246 kubelet[1972]: I0412 18:41:13.884229 1972 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e"} err="failed to get container status \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\": rpc error: code = NotFound desc = an error occurred when try to find container \"c3d7cb575736dec7c2f2fcc75b1f17627c11251e0d66845c26d0d6b3d263d33e\": not found" Apr 12 18:41:13.885504 systemd[1]: cri-containerd-5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03.scope: Deactivated successfully. Apr 12 18:41:13.884000 audit: BPF prog-id=125 op=UNLOAD Apr 12 18:41:13.889000 audit: BPF prog-id=128 op=UNLOAD Apr 12 18:41:13.911284 kubelet[1972]: I0412 18:41:13.910703 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-776f85f984-p48sr" podStartSLOduration=3.910666403 podStartE2EDuration="3.910666403s" podCreationTimestamp="2024-04-12 18:41:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:41:13.90230498 +0000 UTC m=+25.195232686" watchObservedRunningTime="2024-04-12 18:41:13.910666403 +0000 UTC m=+25.203594109" Apr 12 18:41:13.916000 audit[2809]: NETFILTER_CFG table=filter:99 family=2 entries=15 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:13.916000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc6866990 a2=0 a3=1 items=0 ppid=2139 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:13.919647 env[1099]: time="2024-04-12T18:41:13.919598668Z" level=info msg="shim disconnected" id=5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03 Apr 12 18:41:13.919647 env[1099]: time="2024-04-12T18:41:13.919647472Z" level=warning msg="cleaning up after shim disconnected" id=5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03 namespace=k8s.io Apr 12 18:41:13.919780 env[1099]: time="2024-04-12T18:41:13.919657393Z" level=info msg="cleaning up dead shim" Apr 12 18:41:13.916000 audit[2809]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_unregister_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:13.928013 env[1099]: time="2024-04-12T18:41:13.927916528Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:13Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2810 runtime=io.containerd.runc.v2\n" Apr 12 18:41:13.916000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2956 a0=3 a1=ffffc6866990 a2=0 a3=1 items=0 ppid=2139 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:13.928282 env[1099]: time="2024-04-12T18:41:13.928243873Z" level=info msg="TearDown network for sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" successfully" Apr 12 18:41:13.928282 env[1099]: time="2024-04-12T18:41:13.928274275Z" level=info msg="StopPodSandbox for \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" returns successfully" Apr 12 18:41:13.916000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:13.949896 systemd[1]: var-lib-kubelet-pods-0b7240f2\x2d0e43\x2d412c\x2d94c1\x2dab3f554ab736-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Apr 12 18:41:13.949986 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03-rootfs.mount: Deactivated successfully. Apr 12 18:41:13.950043 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03-shm.mount: Deactivated successfully. Apr 12 18:41:13.950095 systemd[1]: var-lib-kubelet-pods-0b7240f2\x2d0e43\x2d412c\x2d94c1\x2dab3f554ab736-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dtxfs2.mount: Deactivated successfully. Apr 12 18:41:13.950176 systemd[1]: var-lib-kubelet-pods-0b7240f2\x2d0e43\x2d412c\x2d94c1\x2dab3f554ab736-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully. Apr 12 18:41:13.964008 kubelet[1972]: I0412 18:41:13.963957 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-net-dir\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964008 kubelet[1972]: I0412 18:41:13.964004 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-run-calico\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964029 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4421bf7c-2c17-472e-8989-44bcbc83ef49-node-certs\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964051 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-xtables-lock\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964063 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964073 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4421bf7c-2c17-472e-8989-44bcbc83ef49-tigera-ca-bundle\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964145 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-bin-dir\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964188 kubelet[1972]: I0412 18:41:13.964166 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-log-dir\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964333 kubelet[1972]: I0412 18:41:13.964184 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-lib-modules\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964333 kubelet[1972]: I0412 18:41:13.964210 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-8t8gv\" (UniqueName: \"kubernetes.io/projected/4421bf7c-2c17-472e-8989-44bcbc83ef49-kube-api-access-8t8gv\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964333 kubelet[1972]: I0412 18:41:13.964231 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-lib-calico\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:13.964333 kubelet[1972]: I0412 18:41:13.964299 1972 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-net-dir\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:13.964700 kubelet[1972]: I0412 18:41:13.964429 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/4421bf7c-2c17-472e-8989-44bcbc83ef49-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Apr 12 18:41:13.964700 kubelet[1972]: I0412 18:41:13.964473 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.964700 kubelet[1972]: I0412 18:41:13.964534 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.965002 kubelet[1972]: I0412 18:41:13.964959 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.965002 kubelet[1972]: I0412 18:41:13.964996 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.965075 kubelet[1972]: I0412 18:41:13.965013 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.965075 kubelet[1972]: I0412 18:41:13.965045 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:13.968216 systemd[1]: var-lib-kubelet-pods-4421bf7c\x2d2c17\x2d472e\x2d8989\x2d44bcbc83ef49-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d8t8gv.mount: Deactivated successfully. Apr 12 18:41:13.968317 systemd[1]: var-lib-kubelet-pods-4421bf7c\x2d2c17\x2d472e\x2d8989\x2d44bcbc83ef49-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Apr 12 18:41:13.970944 kubelet[1972]: I0412 18:41:13.970913 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/4421bf7c-2c17-472e-8989-44bcbc83ef49-kube-api-access-8t8gv" (OuterVolumeSpecName: "kube-api-access-8t8gv") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "kube-api-access-8t8gv". PluginName "kubernetes.io/projected", VolumeGidValue "" Apr 12 18:41:13.971068 kubelet[1972]: I0412 18:41:13.971044 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/4421bf7c-2c17-472e-8989-44bcbc83ef49-node-certs" (OuterVolumeSpecName: "node-certs") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Apr 12 18:41:14.064676 kubelet[1972]: I0412 18:41:14.064649 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-policysync\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:14.064838 kubelet[1972]: I0412 18:41:14.064824 1972 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-flexvol-driver-host\") pod \"4421bf7c-2c17-472e-8989-44bcbc83ef49\" (UID: \"4421bf7c-2c17-472e-8989-44bcbc83ef49\") " Apr 12 18:41:14.064923 kubelet[1972]: I0412 18:41:14.064890 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-policysync" (OuterVolumeSpecName: "policysync") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:14.065017 kubelet[1972]: I0412 18:41:14.064992 1972 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "4421bf7c-2c17-472e-8989-44bcbc83ef49" (UID: "4421bf7c-2c17-472e-8989-44bcbc83ef49"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Apr 12 18:41:14.065083 kubelet[1972]: I0412 18:41:14.065067 1972 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4421bf7c-2c17-472e-8989-44bcbc83ef49-node-certs\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065186 kubelet[1972]: I0412 18:41:14.065173 1972 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-run-calico\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065247 kubelet[1972]: I0412 18:41:14.065238 1972 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-xtables-lock\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065315 kubelet[1972]: I0412 18:41:14.065305 1972 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-log-dir\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065381 kubelet[1972]: I0412 18:41:14.065371 1972 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4421bf7c-2c17-472e-8989-44bcbc83ef49-tigera-ca-bundle\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065445 kubelet[1972]: I0412 18:41:14.065435 1972 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-cni-bin-dir\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065507 kubelet[1972]: I0412 18:41:14.065497 1972 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-8t8gv\" (UniqueName: \"kubernetes.io/projected/4421bf7c-2c17-472e-8989-44bcbc83ef49-kube-api-access-8t8gv\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065627 kubelet[1972]: I0412 18:41:14.065614 1972 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-var-lib-calico\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065697 kubelet[1972]: I0412 18:41:14.065686 1972 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-lib-modules\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.065782 kubelet[1972]: I0412 18:41:14.065754 1972 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-policysync\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.166037 kubelet[1972]: I0412 18:41:14.165924 1972 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4421bf7c-2c17-472e-8989-44bcbc83ef49-flexvol-driver-host\") on node \"localhost\" DevicePath \"\"" Apr 12 18:41:14.819624 kubelet[1972]: I0412 18:41:14.819572 1972 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="0b7240f2-0e43-412c-94c1-ab3f554ab736" path="/var/lib/kubelet/pods/0b7240f2-0e43-412c-94c1-ab3f554ab736/volumes" Apr 12 18:41:14.823317 systemd[1]: Removed slice kubepods-besteffort-pod4421bf7c_2c17_472e_8989_44bcbc83ef49.slice. Apr 12 18:41:14.879503 kubelet[1972]: I0412 18:41:14.879477 1972 scope.go:117] "RemoveContainer" containerID="696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95" Apr 12 18:41:14.880517 env[1099]: time="2024-04-12T18:41:14.880474827Z" level=info msg="RemoveContainer for \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\"" Apr 12 18:41:14.883324 env[1099]: time="2024-04-12T18:41:14.883286349Z" level=info msg="RemoveContainer for \"696e7b368491ab46ba70fb8e3bd99b73c1d2f2378cad23af4b8aae684655be95\" returns successfully" Apr 12 18:41:14.909749 kubelet[1972]: I0412 18:41:14.909705 1972 topology_manager.go:215] "Topology Admit Handler" podUID="3bfe51ea-fef6-4a3e-be1a-11ae0f212a18" podNamespace="calico-system" podName="calico-node-4pzjn" Apr 12 18:41:14.910063 kubelet[1972]: E0412 18:41:14.909774 1972 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="4421bf7c-2c17-472e-8989-44bcbc83ef49" containerName="flexvol-driver" Apr 12 18:41:14.910063 kubelet[1972]: I0412 18:41:14.909800 1972 memory_manager.go:354] "RemoveStaleState removing state" podUID="4421bf7c-2c17-472e-8989-44bcbc83ef49" containerName="flexvol-driver" Apr 12 18:41:14.915279 systemd[1]: Created slice kubepods-besteffort-pod3bfe51ea_fef6_4a3e_be1a_11ae0f212a18.slice. Apr 12 18:41:14.971193 kubelet[1972]: I0412 18:41:14.971156 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-var-run-calico\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971318 kubelet[1972]: I0412 18:41:14.971203 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-cni-log-dir\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971318 kubelet[1972]: I0412 18:41:14.971242 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-policysync\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971318 kubelet[1972]: I0412 18:41:14.971274 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-tigera-ca-bundle\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971401 kubelet[1972]: I0412 18:41:14.971340 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-xtables-lock\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971401 kubelet[1972]: I0412 18:41:14.971374 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jhk5s\" (UniqueName: \"kubernetes.io/projected/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-kube-api-access-jhk5s\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971447 kubelet[1972]: I0412 18:41:14.971407 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-node-certs\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971447 kubelet[1972]: I0412 18:41:14.971426 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-var-lib-calico\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971497 kubelet[1972]: I0412 18:41:14.971459 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-lib-modules\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971497 kubelet[1972]: I0412 18:41:14.971486 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-cni-net-dir\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971544 kubelet[1972]: I0412 18:41:14.971507 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-flexvol-driver-host\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:14.971544 kubelet[1972]: I0412 18:41:14.971538 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/3bfe51ea-fef6-4a3e-be1a-11ae0f212a18-cni-bin-dir\") pod \"calico-node-4pzjn\" (UID: \"3bfe51ea-fef6-4a3e-be1a-11ae0f212a18\") " pod="calico-system/calico-node-4pzjn" Apr 12 18:41:15.217135 kubelet[1972]: E0412 18:41:15.217088 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:15.217900 env[1099]: time="2024-04-12T18:41:15.217551117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4pzjn,Uid:3bfe51ea-fef6-4a3e-be1a-11ae0f212a18,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:15.228911 env[1099]: time="2024-04-12T18:41:15.228838495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:15.228996 env[1099]: time="2024-04-12T18:41:15.228929662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:15.228996 env[1099]: time="2024-04-12T18:41:15.228970264Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:15.229278 env[1099]: time="2024-04-12T18:41:15.229165878Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e pid=2840 runtime=io.containerd.runc.v2 Apr 12 18:41:15.249270 systemd[1]: Started cri-containerd-b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e.scope. Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.320586 kernel: kauditd_printk_skb: 361 callbacks suppressed Apr 12 18:41:15.320640 kernel: audit: type=1400 audit(1712947275.318:1168): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.325276 kernel: audit: type=1400 audit(1712947275.318:1169): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.325323 kernel: audit: type=1400 audit(1712947275.318:1170): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329976 kernel: audit: type=1400 audit(1712947275.318:1171): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.332320 kernel: audit: type=1400 audit(1712947275.318:1172): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.334702 kernel: audit: type=1400 audit(1712947275.318:1173): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.337255 kernel: audit: type=1400 audit(1712947275.318:1174): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.339756 kernel: audit: type=1400 audit(1712947275.318:1175): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.318000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.342179 kernel: audit: type=1400 audit(1712947275.318:1176): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.344645 kernel: audit: type=1400 audit(1712947275.319:1177): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.319000 audit: BPF prog-id=144 op=LOAD Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=2840 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376630376563653739616262616237643332376131346665623433 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2840 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376630376563653739616262616237643332376131346665623433 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.324000 audit: BPF prog-id=145 op=LOAD Apr 12 18:41:15.324000 audit[2849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2840 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376630376563653739616262616237643332376131346665623433 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.326000 audit: BPF prog-id=146 op=LOAD Apr 12 18:41:15.326000 audit[2849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2840 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376630376563653739616262616237643332376131346665623433 Apr 12 18:41:15.329000 audit: BPF prog-id=146 op=UNLOAD Apr 12 18:41:15.329000 audit: BPF prog-id=145 op=UNLOAD Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { perfmon } for pid=2849 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit[2849]: AVC avc: denied { bpf } for pid=2849 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.329000 audit: BPF prog-id=147 op=LOAD Apr 12 18:41:15.329000 audit[2849]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2840 pid=2849 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.329000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233376630376563653739616262616237643332376131346665623433 Apr 12 18:41:15.352105 env[1099]: time="2024-04-12T18:41:15.352067234Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-4pzjn,Uid:3bfe51ea-fef6-4a3e-be1a-11ae0f212a18,Namespace:calico-system,Attempt:0,} returns sandbox id \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\"" Apr 12 18:41:15.352929 kubelet[1972]: E0412 18:41:15.352906 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:15.356182 env[1099]: time="2024-04-12T18:41:15.356146796Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Apr 12 18:41:15.369529 env[1099]: time="2024-04-12T18:41:15.369467674Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e\"" Apr 12 18:41:15.370004 env[1099]: time="2024-04-12T18:41:15.369975469Z" level=info msg="StartContainer for \"8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e\"" Apr 12 18:41:15.387854 systemd[1]: Started cri-containerd-8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e.scope. Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2840 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862383266646664663539633035303061303562643538383965663065 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit: BPF prog-id=148 op=LOAD Apr 12 18:41:15.442000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2840 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862383266646664663539633035303061303562643538383965663065 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit: BPF prog-id=149 op=LOAD Apr 12 18:41:15.442000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2840 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862383266646664663539633035303061303562643538383965663065 Apr 12 18:41:15.442000 audit: BPF prog-id=149 op=UNLOAD Apr 12 18:41:15.442000 audit: BPF prog-id=148 op=UNLOAD Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:15.442000 audit: BPF prog-id=150 op=LOAD Apr 12 18:41:15.442000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2840 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:15.442000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3862383266646664663539633035303061303562643538383965663065 Apr 12 18:41:15.460479 env[1099]: time="2024-04-12T18:41:15.460419427Z" level=info msg="StartContainer for \"8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e\" returns successfully" Apr 12 18:41:15.463707 systemd[1]: cri-containerd-8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e.scope: Deactivated successfully. Apr 12 18:41:15.469000 audit: BPF prog-id=150 op=UNLOAD Apr 12 18:41:15.495921 env[1099]: time="2024-04-12T18:41:15.495876272Z" level=info msg="shim disconnected" id=8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e Apr 12 18:41:15.495921 env[1099]: time="2024-04-12T18:41:15.495916115Z" level=warning msg="cleaning up after shim disconnected" id=8b82fdfdf59c0500a05bd5889ef0eb98a46fe9e5c5e11b588c3281f3074b0f2e namespace=k8s.io Apr 12 18:41:15.495921 env[1099]: time="2024-04-12T18:41:15.495925476Z" level=info msg="cleaning up dead shim" Apr 12 18:41:15.504505 env[1099]: time="2024-04-12T18:41:15.504464225Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:15Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2918 runtime=io.containerd.runc.v2\n" Apr 12 18:41:15.817165 kubelet[1972]: E0412 18:41:15.817041 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:15.884129 kubelet[1972]: E0412 18:41:15.884092 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:15.885094 env[1099]: time="2024-04-12T18:41:15.885043032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\"" Apr 12 18:41:16.158559 systemd[1]: Started sshd@7-10.0.0.136:22-10.0.0.1:48080.service. Apr 12 18:41:16.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:16.192000 audit[2935]: USER_ACCT pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.193559 sshd[2935]: Accepted publickey for core from 10.0.0.1 port 48080 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:16.193000 audit[2935]: CRED_ACQ pid=2935 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.193000 audit[2935]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe4b8a6f0 a2=3 a3=1 items=0 ppid=1 pid=2935 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:16.193000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:16.194752 sshd[2935]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:16.198195 systemd-logind[1083]: New session 8 of user core. Apr 12 18:41:16.198798 systemd[1]: Started session-8.scope. Apr 12 18:41:16.201000 audit[2935]: USER_START pid=2935 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.202000 audit[2937]: CRED_ACQ pid=2937 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.326449 sshd[2935]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:16.326000 audit[2935]: USER_END pid=2935 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.326000 audit[2935]: CRED_DISP pid=2935 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:16.329324 systemd[1]: sshd@7-10.0.0.136:22-10.0.0.1:48080.service: Deactivated successfully. Apr 12 18:41:16.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.136:22-10.0.0.1:48080 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:16.330066 systemd[1]: session-8.scope: Deactivated successfully. Apr 12 18:41:16.330626 systemd-logind[1083]: Session 8 logged out. Waiting for processes to exit. Apr 12 18:41:16.331388 systemd-logind[1083]: Removed session 8. Apr 12 18:41:16.820276 kubelet[1972]: I0412 18:41:16.820243 1972 kubelet_volumes.go:161] "Cleaned up orphaned pod volumes dir" podUID="4421bf7c-2c17-472e-8989-44bcbc83ef49" path="/var/lib/kubelet/pods/4421bf7c-2c17-472e-8989-44bcbc83ef49/volumes" Apr 12 18:41:16.827197 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2895498080.mount: Deactivated successfully. Apr 12 18:41:17.821840 kubelet[1972]: E0412 18:41:17.817741 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:19.106385 env[1099]: time="2024-04-12T18:41:19.106316883Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:19.107711 env[1099]: time="2024-04-12T18:41:19.107676605Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:19.109181 env[1099]: time="2024-04-12T18:41:19.109150333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:19.110382 env[1099]: time="2024-04-12T18:41:19.110353605Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21ccc42ae417f1082c03737e9da5fbfbd4a21732babfcef4cd34240eacf26b41,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:19.110822 env[1099]: time="2024-04-12T18:41:19.110774310Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.3\" returns image reference \"sha256:2e7a18c897a455a364faa2c5ad2d2539f25e81e451e894d58c0107c58979291a\"" Apr 12 18:41:19.114503 env[1099]: time="2024-04-12T18:41:19.114467531Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Apr 12 18:41:19.124033 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2450833135.mount: Deactivated successfully. Apr 12 18:41:19.127511 env[1099]: time="2024-04-12T18:41:19.127468868Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d\"" Apr 12 18:41:19.127914 env[1099]: time="2024-04-12T18:41:19.127878853Z" level=info msg="StartContainer for \"328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d\"" Apr 12 18:41:19.153663 systemd[1]: run-containerd-runc-k8s.io-328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d-runc.zPe29Y.mount: Deactivated successfully. Apr 12 18:41:19.154974 systemd[1]: Started cri-containerd-328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d.scope. Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:19.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386364326662393137633737393635616239386536656261333137 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.195000 audit: BPF prog-id=151 op=LOAD Apr 12 18:41:19.195000 audit[2957]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:19.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386364326662393137633737393635616239386536656261333137 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.196000 audit: BPF prog-id=152 op=LOAD Apr 12 18:41:19.196000 audit[2957]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:19.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386364326662393137633737393635616239386536656261333137 Apr 12 18:41:19.196000 audit: BPF prog-id=152 op=UNLOAD Apr 12 18:41:19.196000 audit: BPF prog-id=151 op=UNLOAD Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { perfmon } for pid=2957 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit[2957]: AVC avc: denied { bpf } for pid=2957 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:19.197000 audit: BPF prog-id=153 op=LOAD Apr 12 18:41:19.197000 audit[2957]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2840 pid=2957 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:19.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3332386364326662393137633737393635616239386536656261333137 Apr 12 18:41:19.210506 env[1099]: time="2024-04-12T18:41:19.210443431Z" level=info msg="StartContainer for \"328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d\" returns successfully" Apr 12 18:41:19.650692 env[1099]: time="2024-04-12T18:41:19.650641321Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Apr 12 18:41:19.652580 systemd[1]: cri-containerd-328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d.scope: Deactivated successfully. Apr 12 18:41:19.657000 audit: BPF prog-id=153 op=UNLOAD Apr 12 18:41:19.686389 kubelet[1972]: I0412 18:41:19.685589 1972 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Apr 12 18:41:19.750651 kubelet[1972]: I0412 18:41:19.750609 1972 topology_manager.go:215] "Topology Admit Handler" podUID="0154281d-3fde-47d9-89e8-3cea82f840e1" podNamespace="kube-system" podName="coredns-76f75df574-9kglg" Apr 12 18:41:19.752620 kubelet[1972]: I0412 18:41:19.752595 1972 topology_manager.go:215] "Topology Admit Handler" podUID="5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c" podNamespace="kube-system" podName="coredns-76f75df574-xf8s9" Apr 12 18:41:19.756480 systemd[1]: Created slice kubepods-burstable-pod0154281d_3fde_47d9_89e8_3cea82f840e1.slice. Apr 12 18:41:19.758504 kubelet[1972]: I0412 18:41:19.758466 1972 topology_manager.go:215] "Topology Admit Handler" podUID="53c95e4d-f2d4-4add-8000-570ea0ed1825" podNamespace="calico-system" podName="calico-kube-controllers-79cb8c8f67-j29zs" Apr 12 18:41:19.761192 env[1099]: time="2024-04-12T18:41:19.761153891Z" level=info msg="shim disconnected" id=328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d Apr 12 18:41:19.761746 env[1099]: time="2024-04-12T18:41:19.761721325Z" level=warning msg="cleaning up after shim disconnected" id=328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d namespace=k8s.io Apr 12 18:41:19.761842 env[1099]: time="2024-04-12T18:41:19.761826531Z" level=info msg="cleaning up dead shim" Apr 12 18:41:19.762731 systemd[1]: Created slice kubepods-burstable-pod5258b256_aa24_4f1c_bf5b_e0c3b5eeb64c.slice. Apr 12 18:41:19.766103 systemd[1]: Created slice kubepods-besteffort-pod53c95e4d_f2d4_4add_8000_570ea0ed1825.slice. Apr 12 18:41:19.774920 env[1099]: time="2024-04-12T18:41:19.774880112Z" level=warning msg="cleanup warnings time=\"2024-04-12T18:41:19Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2998 runtime=io.containerd.runc.v2\n" Apr 12 18:41:19.821947 systemd[1]: Created slice kubepods-besteffort-pod9eed1024_4e4e_488d_b42b_1302198d0850.slice. Apr 12 18:41:19.823917 env[1099]: time="2024-04-12T18:41:19.823862602Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5svdz,Uid:9eed1024-4e4e-488d-b42b-1302198d0850,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:19.897168 kubelet[1972]: E0412 18:41:19.896780 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:19.898082 env[1099]: time="2024-04-12T18:41:19.897813185Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\"" Apr 12 18:41:19.920934 kubelet[1972]: I0412 18:41:19.920203 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/0154281d-3fde-47d9-89e8-3cea82f840e1-config-volume\") pod \"coredns-76f75df574-9kglg\" (UID: \"0154281d-3fde-47d9-89e8-3cea82f840e1\") " pod="kube-system/coredns-76f75df574-9kglg" Apr 12 18:41:19.920934 kubelet[1972]: I0412 18:41:19.920281 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-klgxk\" (UniqueName: \"kubernetes.io/projected/0154281d-3fde-47d9-89e8-3cea82f840e1-kube-api-access-klgxk\") pod \"coredns-76f75df574-9kglg\" (UID: \"0154281d-3fde-47d9-89e8-3cea82f840e1\") " pod="kube-system/coredns-76f75df574-9kglg" Apr 12 18:41:19.920934 kubelet[1972]: I0412 18:41:19.920334 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-4skt6\" (UniqueName: \"kubernetes.io/projected/5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c-kube-api-access-4skt6\") pod \"coredns-76f75df574-xf8s9\" (UID: \"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c\") " pod="kube-system/coredns-76f75df574-xf8s9" Apr 12 18:41:19.920934 kubelet[1972]: I0412 18:41:19.920381 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dh4ht\" (UniqueName: \"kubernetes.io/projected/53c95e4d-f2d4-4add-8000-570ea0ed1825-kube-api-access-dh4ht\") pod \"calico-kube-controllers-79cb8c8f67-j29zs\" (UID: \"53c95e4d-f2d4-4add-8000-570ea0ed1825\") " pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" Apr 12 18:41:19.920934 kubelet[1972]: I0412 18:41:19.920402 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/53c95e4d-f2d4-4add-8000-570ea0ed1825-tigera-ca-bundle\") pod \"calico-kube-controllers-79cb8c8f67-j29zs\" (UID: \"53c95e4d-f2d4-4add-8000-570ea0ed1825\") " pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" Apr 12 18:41:19.921201 kubelet[1972]: I0412 18:41:19.920433 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c-config-volume\") pod \"coredns-76f75df574-xf8s9\" (UID: \"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c\") " pod="kube-system/coredns-76f75df574-xf8s9" Apr 12 18:41:19.962834 env[1099]: time="2024-04-12T18:41:19.962762230Z" level=error msg="Failed to destroy network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:19.963186 env[1099]: time="2024-04-12T18:41:19.963141733Z" level=error msg="encountered an error cleaning up failed sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:19.963239 env[1099]: time="2024-04-12T18:41:19.963197176Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5svdz,Uid:9eed1024-4e4e-488d-b42b-1302198d0850,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:19.963784 kubelet[1972]: E0412 18:41:19.963612 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:19.963784 kubelet[1972]: E0412 18:41:19.963675 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:19.963784 kubelet[1972]: E0412 18:41:19.963695 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-5svdz" Apr 12 18:41:19.963937 kubelet[1972]: E0412 18:41:19.963759 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-5svdz_calico-system(9eed1024-4e4e-488d-b42b-1302198d0850)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-5svdz_calico-system(9eed1024-4e4e-488d-b42b-1302198d0850)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:20.060142 kubelet[1972]: E0412 18:41:20.060101 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:20.060634 env[1099]: time="2024-04-12T18:41:20.060584486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9kglg,Uid:0154281d-3fde-47d9-89e8-3cea82f840e1,Namespace:kube-system,Attempt:0,}" Apr 12 18:41:20.066699 kubelet[1972]: E0412 18:41:20.066676 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:20.067238 env[1099]: time="2024-04-12T18:41:20.067206910Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-xf8s9,Uid:5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c,Namespace:kube-system,Attempt:0,}" Apr 12 18:41:20.070737 env[1099]: time="2024-04-12T18:41:20.070704912Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79cb8c8f67-j29zs,Uid:53c95e4d-f2d4-4add-8000-570ea0ed1825,Namespace:calico-system,Attempt:0,}" Apr 12 18:41:20.127157 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-328cd2fb917c77965ab98e6eba3170b958bba49255629c8c0e9e8e54d25ddb5d-rootfs.mount: Deactivated successfully. Apr 12 18:41:20.133868 env[1099]: time="2024-04-12T18:41:20.133776642Z" level=error msg="Failed to destroy network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.135373 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6-shm.mount: Deactivated successfully. Apr 12 18:41:20.136204 env[1099]: time="2024-04-12T18:41:20.136155780Z" level=error msg="encountered an error cleaning up failed sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.136291 env[1099]: time="2024-04-12T18:41:20.136216303Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9kglg,Uid:0154281d-3fde-47d9-89e8-3cea82f840e1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.137499 kubelet[1972]: E0412 18:41:20.137468 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.137629 kubelet[1972]: E0412 18:41:20.137533 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9kglg" Apr 12 18:41:20.137629 kubelet[1972]: E0412 18:41:20.137556 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-9kglg" Apr 12 18:41:20.137629 kubelet[1972]: E0412 18:41:20.137609 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-9kglg_kube-system(0154281d-3fde-47d9-89e8-3cea82f840e1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-9kglg_kube-system(0154281d-3fde-47d9-89e8-3cea82f840e1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9kglg" podUID="0154281d-3fde-47d9-89e8-3cea82f840e1" Apr 12 18:41:20.150319 env[1099]: time="2024-04-12T18:41:20.150274317Z" level=error msg="Failed to destroy network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.151813 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968-shm.mount: Deactivated successfully. Apr 12 18:41:20.152422 env[1099]: time="2024-04-12T18:41:20.152383159Z" level=error msg="encountered an error cleaning up failed sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.152496 env[1099]: time="2024-04-12T18:41:20.152442522Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-xf8s9,Uid:5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.153000 kubelet[1972]: E0412 18:41:20.152671 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.153000 kubelet[1972]: E0412 18:41:20.152724 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-xf8s9" Apr 12 18:41:20.153000 kubelet[1972]: E0412 18:41:20.152746 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-xf8s9" Apr 12 18:41:20.153213 kubelet[1972]: E0412 18:41:20.152810 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-xf8s9_kube-system(5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-xf8s9_kube-system(5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-xf8s9" podUID="5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c" Apr 12 18:41:20.158396 env[1099]: time="2024-04-12T18:41:20.158356865Z" level=error msg="Failed to destroy network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.159399 env[1099]: time="2024-04-12T18:41:20.159361643Z" level=error msg="encountered an error cleaning up failed sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.159549 env[1099]: time="2024-04-12T18:41:20.159496810Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79cb8c8f67-j29zs,Uid:53c95e4d-f2d4-4add-8000-570ea0ed1825,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.159797 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08-shm.mount: Deactivated successfully. Apr 12 18:41:20.160241 kubelet[1972]: E0412 18:41:20.160220 1972 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.160318 kubelet[1972]: E0412 18:41:20.160264 1972 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" Apr 12 18:41:20.160318 kubelet[1972]: E0412 18:41:20.160287 1972 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" Apr 12 18:41:20.160383 kubelet[1972]: E0412 18:41:20.160335 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-79cb8c8f67-j29zs_calico-system(53c95e4d-f2d4-4add-8000-570ea0ed1825)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-79cb8c8f67-j29zs_calico-system(53c95e4d-f2d4-4add-8000-570ea0ed1825)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" podUID="53c95e4d-f2d4-4add-8000-570ea0ed1825" Apr 12 18:41:20.899077 kubelet[1972]: I0412 18:41:20.899041 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:20.899598 env[1099]: time="2024-04-12T18:41:20.899565399Z" level=info msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" Apr 12 18:41:20.902441 kubelet[1972]: I0412 18:41:20.901978 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:20.902530 env[1099]: time="2024-04-12T18:41:20.902452366Z" level=info msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" Apr 12 18:41:20.905953 kubelet[1972]: I0412 18:41:20.905598 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:20.906227 env[1099]: time="2024-04-12T18:41:20.906192022Z" level=info msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" Apr 12 18:41:20.908407 kubelet[1972]: I0412 18:41:20.908386 1972 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:20.911489 env[1099]: time="2024-04-12T18:41:20.911453687Z" level=info msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" Apr 12 18:41:20.936722 env[1099]: time="2024-04-12T18:41:20.936583021Z" level=error msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" failed" error="failed to destroy network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.937093 kubelet[1972]: E0412 18:41:20.937068 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:20.937195 kubelet[1972]: E0412 18:41:20.937141 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08"} Apr 12 18:41:20.937195 kubelet[1972]: E0412 18:41:20.937180 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53c95e4d-f2d4-4add-8000-570ea0ed1825\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:41:20.937280 kubelet[1972]: E0412 18:41:20.937208 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53c95e4d-f2d4-4add-8000-570ea0ed1825\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" podUID="53c95e4d-f2d4-4add-8000-570ea0ed1825" Apr 12 18:41:20.944831 env[1099]: time="2024-04-12T18:41:20.944784615Z" level=error msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" failed" error="failed to destroy network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.945285 kubelet[1972]: E0412 18:41:20.945148 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:20.945285 kubelet[1972]: E0412 18:41:20.945194 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05"} Apr 12 18:41:20.945285 kubelet[1972]: E0412 18:41:20.945228 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9eed1024-4e4e-488d-b42b-1302198d0850\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:41:20.945285 kubelet[1972]: E0412 18:41:20.945265 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9eed1024-4e4e-488d-b42b-1302198d0850\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-5svdz" podUID="9eed1024-4e4e-488d-b42b-1302198d0850" Apr 12 18:41:20.957985 env[1099]: time="2024-04-12T18:41:20.957941657Z" level=error msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" failed" error="failed to destroy network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.958319 kubelet[1972]: E0412 18:41:20.958293 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:20.958403 kubelet[1972]: E0412 18:41:20.958334 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6"} Apr 12 18:41:20.958403 kubelet[1972]: E0412 18:41:20.958366 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"0154281d-3fde-47d9-89e8-3cea82f840e1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:41:20.958403 kubelet[1972]: E0412 18:41:20.958403 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"0154281d-3fde-47d9-89e8-3cea82f840e1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-9kglg" podUID="0154281d-3fde-47d9-89e8-3cea82f840e1" Apr 12 18:41:20.965178 env[1099]: time="2024-04-12T18:41:20.965136393Z" level=error msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" failed" error="failed to destroy network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Apr 12 18:41:20.965596 kubelet[1972]: E0412 18:41:20.965457 1972 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:20.965596 kubelet[1972]: E0412 18:41:20.965491 1972 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968"} Apr 12 18:41:20.965596 kubelet[1972]: E0412 18:41:20.965534 1972 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Apr 12 18:41:20.965596 kubelet[1972]: E0412 18:41:20.965569 1972 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-xf8s9" podUID="5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c" Apr 12 18:41:21.330000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:38806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:21.331796 systemd[1]: Started sshd@8-10.0.0.136:22-10.0.0.1:38806.service. Apr 12 18:41:21.332788 kernel: kauditd_printk_skb: 146 callbacks suppressed Apr 12 18:41:21.332832 kernel: audit: type=1130 audit(1712947281.330:1209): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:38806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:21.373000 audit[3264]: USER_ACCT pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.374846 sshd[3264]: Accepted publickey for core from 10.0.0.1 port 38806 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:21.378550 sshd[3264]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:21.374000 audit[3264]: CRED_ACQ pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.382561 kernel: audit: type=1101 audit(1712947281.373:1210): pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.382628 kernel: audit: type=1103 audit(1712947281.374:1211): pid=3264 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.385166 kernel: audit: type=1006 audit(1712947281.374:1212): pid=3264 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Apr 12 18:41:21.374000 audit[3264]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb47b560 a2=3 a3=1 items=0 ppid=1 pid=3264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.387755 systemd-logind[1083]: New session 9 of user core. Apr 12 18:41:21.388244 systemd[1]: Started session-9.scope. Apr 12 18:41:21.389542 kernel: audit: type=1300 audit(1712947281.374:1212): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb47b560 a2=3 a3=1 items=0 ppid=1 pid=3264 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.374000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:21.391342 kernel: audit: type=1327 audit(1712947281.374:1212): proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:21.391000 audit[3264]: USER_START pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.393000 audit[3266]: CRED_ACQ pid=3266 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.401418 kernel: audit: type=1105 audit(1712947281.391:1213): pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.401481 kernel: audit: type=1103 audit(1712947281.393:1214): pid=3266 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.551689 sshd[3264]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:21.551000 audit[3264]: USER_END pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.554336 systemd[1]: sshd@8-10.0.0.136:22-10.0.0.1:38806.service: Deactivated successfully. Apr 12 18:41:21.555084 systemd[1]: session-9.scope: Deactivated successfully. Apr 12 18:41:21.555672 systemd-logind[1083]: Session 9 logged out. Waiting for processes to exit. Apr 12 18:41:21.556421 systemd-logind[1083]: Removed session 9. Apr 12 18:41:21.551000 audit[3264]: CRED_DISP pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.561504 kernel: audit: type=1106 audit(1712947281.551:1215): pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.561576 kernel: audit: type=1104 audit(1712947281.551:1216): pid=3264 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:21.553000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.136:22-10.0.0.1:38806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:21.830312 kubelet[1972]: I0412 18:41:21.830267 1972 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:41:21.830980 kubelet[1972]: E0412 18:41:21.830957 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:21.841000 audit[3281]: NETFILTER_CFG table=filter:101 family=2 entries=15 op=nft_register_rule pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:21.841000 audit[3281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffde4a3320 a2=0 a3=1 items=0 ppid=2139 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:21.842000 audit[3281]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3281 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:21.842000 audit[3281]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffde4a3320 a2=0 a3=1 items=0 ppid=2139 pid=3281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.842000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:21.862000 audit[3283]: NETFILTER_CFG table=filter:103 family=2 entries=15 op=nft_register_rule pid=3283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:21.862000 audit[3283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffffeffda0 a2=0 a3=1 items=0 ppid=2139 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.862000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:21.863000 audit[3283]: NETFILTER_CFG table=nat:104 family=2 entries=19 op=nft_unregister_chain pid=3283 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:21.863000 audit[3283]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2956 a0=3 a1=ffffffeffda0 a2=0 a3=1 items=0 ppid=2139 pid=3283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:21.863000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:21.910833 kubelet[1972]: E0412 18:41:21.910792 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:22.871000 audit[3285]: NETFILTER_CFG table=filter:105 family=2 entries=15 op=nft_register_rule pid=3285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:22.871000 audit[3285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffc6759410 a2=0 a3=1 items=0 ppid=2139 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:22.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:22.880000 audit[3285]: NETFILTER_CFG table=nat:106 family=2 entries=19 op=nft_register_chain pid=3285 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:22.880000 audit[3285]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6276 a0=3 a1=ffffc6759410 a2=0 a3=1 items=0 ppid=2139 pid=3285 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:22.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:24.844507 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2212772221.mount: Deactivated successfully. Apr 12 18:41:25.175842 env[1099]: time="2024-04-12T18:41:25.175730150Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:25.177096 env[1099]: time="2024-04-12T18:41:25.177062897Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:25.178597 env[1099]: time="2024-04-12T18:41:25.178570052Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:25.179977 env[1099]: time="2024-04-12T18:41:25.179928839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:0dec3ede02137c9bc7a49b50006739ddb7c20fc2b8fa12d2bd8234c680e8df34,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:25.180404 env[1099]: time="2024-04-12T18:41:25.180370061Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.3\" returns image reference \"sha256:39692ef1d182c22e6162a9c49869a9092df8da5455f3c75e4aa19a347e4a375d\"" Apr 12 18:41:25.191537 env[1099]: time="2024-04-12T18:41:25.191495656Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Apr 12 18:41:25.204108 env[1099]: time="2024-04-12T18:41:25.204072123Z" level=info msg="CreateContainer within sandbox \"b37f07ece79abbab7d327a14feb43d634422b594def7e75d561de3f7d277776e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a\"" Apr 12 18:41:25.204638 env[1099]: time="2024-04-12T18:41:25.204612429Z" level=info msg="StartContainer for \"b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a\"" Apr 12 18:41:25.222809 systemd[1]: Started cri-containerd-b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a.scope. Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2840 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:25.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326431626361396631653262656331336330623637366434333337 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit: BPF prog-id=154 op=LOAD Apr 12 18:41:25.267000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2840 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:25.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326431626361396631653262656331336330623637366434333337 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.267000 audit: BPF prog-id=155 op=LOAD Apr 12 18:41:25.267000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2840 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:25.267000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326431626361396631653262656331336330623637366434333337 Apr 12 18:41:25.268000 audit: BPF prog-id=155 op=UNLOAD Apr 12 18:41:25.268000 audit: BPF prog-id=154 op=UNLOAD Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { perfmon } for pid=3296 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit[3296]: AVC avc: denied { bpf } for pid=3296 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:25.268000 audit: BPF prog-id=156 op=LOAD Apr 12 18:41:25.268000 audit[3296]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2840 pid=3296 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:25.268000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237326431626361396631653262656331336330623637366434333337 Apr 12 18:41:25.282816 env[1099]: time="2024-04-12T18:41:25.282765444Z" level=info msg="StartContainer for \"b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a\" returns successfully" Apr 12 18:41:25.420471 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Apr 12 18:41:25.420580 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Apr 12 18:41:26.148360 kubelet[1972]: E0412 18:41:26.148331 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:26.160426 kubelet[1972]: I0412 18:41:26.160392 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-4pzjn" podStartSLOduration=2.864544669 podStartE2EDuration="12.160350167s" podCreationTimestamp="2024-04-12 18:41:14 +0000 UTC" firstStartedPulling="2024-04-12 18:41:15.884778174 +0000 UTC m=+27.177705880" lastFinishedPulling="2024-04-12 18:41:25.180583712 +0000 UTC m=+36.473511378" observedRunningTime="2024-04-12 18:41:26.160224281 +0000 UTC m=+37.453152307" watchObservedRunningTime="2024-04-12 18:41:26.160350167 +0000 UTC m=+37.453277873" Apr 12 18:41:26.557000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:26.557188 systemd[1]: Started sshd@9-10.0.0.136:22-10.0.0.1:38818.service. Apr 12 18:41:26.560811 kernel: kauditd_printk_skb: 62 callbacks suppressed Apr 12 18:41:26.561319 kernel: audit: type=1130 audit(1712947286.557:1230): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:26.598000 audit[3354]: USER_ACCT pid=3354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.598568 sshd[3354]: Accepted publickey for core from 10.0.0.1 port 38818 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:26.599000 audit[3354]: CRED_ACQ pid=3354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.601737 sshd[3354]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:26.604245 kernel: audit: type=1101 audit(1712947286.598:1231): pid=3354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.604312 kernel: audit: type=1103 audit(1712947286.599:1232): pid=3354 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.606211 kernel: audit: type=1006 audit(1712947286.599:1233): pid=3354 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Apr 12 18:41:26.599000 audit[3354]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed1d7270 a2=3 a3=1 items=0 ppid=1 pid=3354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.609304 kernel: audit: type=1300 audit(1712947286.599:1233): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed1d7270 a2=3 a3=1 items=0 ppid=1 pid=3354 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.599000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:26.610445 kernel: audit: type=1327 audit(1712947286.599:1233): proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:26.611732 systemd-logind[1083]: New session 10 of user core. Apr 12 18:41:26.612534 systemd[1]: Started session-10.scope. Apr 12 18:41:26.615000 audit[3354]: USER_START pid=3354 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.619000 audit[3356]: CRED_ACQ pid=3356 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.622342 kernel: audit: type=1105 audit(1712947286.615:1234): pid=3354 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.622408 kernel: audit: type=1103 audit(1712947286.619:1235): pid=3356 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.680000 audit[3404]: AVC avc: denied { write } for pid=3404 comm="tee" name="fd" dev="proc" ino=19902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.680000 audit[3404]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0bef98f a2=241 a3=1b6 items=1 ppid=3367 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.686654 kernel: audit: type=1400 audit(1712947286.680:1236): avc: denied { write } for pid=3404 comm="tee" name="fd" dev="proc" ino=19902 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.686722 kernel: audit: type=1300 audit(1712947286.680:1236): arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd0bef98f a2=241 a3=1b6 items=1 ppid=3367 pid=3404 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.680000 audit: CWD cwd="/etc/service/enabled/confd/log" Apr 12 18:41:26.680000 audit: PATH item=0 name="/dev/fd/63" inode=21553 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.708000 audit[3433]: AVC avc: denied { write } for pid=3433 comm="tee" name="fd" dev="proc" ino=19917 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.708000 audit[3433]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff952098f a2=241 a3=1b6 items=1 ppid=3381 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.708000 audit: CWD cwd="/etc/service/enabled/felix/log" Apr 12 18:41:26.708000 audit: PATH item=0 name="/dev/fd/63" inode=18815 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.708000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.726000 audit[3420]: AVC avc: denied { write } for pid=3420 comm="tee" name="fd" dev="proc" ino=18821 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.726000 audit[3420]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc6b4c980 a2=241 a3=1b6 items=1 ppid=3371 pid=3420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.726000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Apr 12 18:41:26.726000 audit: PATH item=0 name="/dev/fd/63" inode=18812 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.727000 audit[3430]: AVC avc: denied { write } for pid=3430 comm="tee" name="fd" dev="proc" ino=18825 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.727000 audit[3430]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffff9b97f a2=241 a3=1b6 items=1 ppid=3383 pid=3430 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.727000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Apr 12 18:41:26.727000 audit: PATH item=0 name="/dev/fd/63" inode=21564 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.727000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.732000 audit[3418]: AVC avc: denied { write } for pid=3418 comm="tee" name="fd" dev="proc" ino=20641 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.732000 audit[3418]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff5b1991 a2=241 a3=1b6 items=1 ppid=3370 pid=3418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.732000 audit: CWD cwd="/etc/service/enabled/cni/log" Apr 12 18:41:26.732000 audit: PATH item=0 name="/dev/fd/63" inode=19912 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.737000 audit[3449]: AVC avc: denied { write } for pid=3449 comm="tee" name="fd" dev="proc" ino=21570 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.737000 audit[3449]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcc6a798f a2=241 a3=1b6 items=1 ppid=3375 pid=3449 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.737000 audit: CWD cwd="/etc/service/enabled/bird6/log" Apr 12 18:41:26.737000 audit: PATH item=0 name="/dev/fd/63" inode=19919 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.737000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.740000 audit[3454]: AVC avc: denied { write } for pid=3454 comm="tee" name="fd" dev="proc" ino=21576 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Apr 12 18:41:26.740000 audit[3454]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd991e990 a2=241 a3=1b6 items=1 ppid=3378 pid=3454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.740000 audit: CWD cwd="/etc/service/enabled/bird/log" Apr 12 18:41:26.740000 audit: PATH item=0 name="/dev/fd/63" inode=19920 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Apr 12 18:41:26.740000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Apr 12 18:41:26.792533 sshd[3354]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:26.793963 systemd[1]: Started sshd@10-10.0.0.136:22-10.0.0.1:38832.service. Apr 12 18:41:26.793000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:38832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:26.795000 audit[3354]: USER_END pid=3354 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.795000 audit[3354]: CRED_DISP pid=3354 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.798433 systemd[1]: sshd@9-10.0.0.136:22-10.0.0.1:38818.service: Deactivated successfully. Apr 12 18:41:26.799317 systemd[1]: session-10.scope: Deactivated successfully. Apr 12 18:41:26.798000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.136:22-10.0.0.1:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:26.805568 systemd-logind[1083]: Session 10 logged out. Waiting for processes to exit. Apr 12 18:41:26.806336 systemd-logind[1083]: Removed session 10. Apr 12 18:41:26.831000 audit[3466]: USER_ACCT pid=3466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.831672 sshd[3466]: Accepted publickey for core from 10.0.0.1 port 38832 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:26.832825 sshd[3466]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:26.832000 audit[3466]: CRED_ACQ pid=3466 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.832000 audit[3466]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff9b96570 a2=3 a3=1 items=0 ppid=1 pid=3466 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:26.832000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:26.836184 systemd-logind[1083]: New session 11 of user core. Apr 12 18:41:26.836988 systemd[1]: Started session-11.scope. Apr 12 18:41:26.841000 audit[3466]: USER_START pid=3466 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:26.842000 audit[3473]: CRED_ACQ pid=3473 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.021305 sshd[3466]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:27.023587 systemd[1]: Started sshd@11-10.0.0.136:22-10.0.0.1:38842.service. Apr 12 18:41:27.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:38842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:27.025000 audit[3466]: USER_END pid=3466 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.026000 audit[3466]: CRED_DISP pid=3466 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.136:22-10.0.0.1:38832 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:27.028609 systemd[1]: sshd@10-10.0.0.136:22-10.0.0.1:38832.service: Deactivated successfully. Apr 12 18:41:27.029319 systemd[1]: session-11.scope: Deactivated successfully. Apr 12 18:41:27.034483 systemd-logind[1083]: Session 11 logged out. Waiting for processes to exit. Apr 12 18:41:27.039226 systemd-logind[1083]: Removed session 11. Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.044000 audit: BPF prog-id=157 op=LOAD Apr 12 18:41:27.044000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6895fc8 a2=70 a3=ffffc6896038 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.044000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.045000 audit: BPF prog-id=157 op=UNLOAD Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit: BPF prog-id=158 op=LOAD Apr 12 18:41:27.045000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc6895fc8 a2=70 a3=4b243c items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.045000 audit: BPF prog-id=158 op=UNLOAD Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc6895f80 a2=70 a3=ffffc6895ff0 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit: BPF prog-id=159 op=LOAD Apr 12 18:41:27.045000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc6895f68 a2=70 a3=ffffc6895fd8 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.045000 audit: BPF prog-id=159 op=UNLOAD Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6896038 a2=70 a3=0 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.045000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.045000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6896028 a2=70 a3=0 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.045000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc6895f98 a2=70 a3=0 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc6896070 a2=70 a3=aab9ef items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc6896070 a2=70 a3=aab9ef items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { perfmon } for pid=3538 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit[3538]: AVC avc: denied { bpf } for pid=3538 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.047000 audit: BPF prog-id=160 op=LOAD Apr 12 18:41:27.047000 audit[3538]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc6895f98 a2=70 a3=aaba09 items=0 ppid=3382 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.047000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Apr 12 18:41:27.056000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.056000 audit[3544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffed254b98 a2=70 a3=ffffed254c08 items=0 ppid=3382 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.056000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:41:27.057000 audit[3544]: AVC avc: denied { bpf } for pid=3544 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:27.057000 audit[3544]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffed254a68 a2=70 a3=ffffed254ad8 items=0 ppid=3382 pid=3544 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.057000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Apr 12 18:41:27.067000 audit: BPF prog-id=160 op=UNLOAD Apr 12 18:41:27.068000 audit[3536]: USER_ACCT pid=3536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.068667 sshd[3536]: Accepted publickey for core from 10.0.0.1 port 38842 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:27.069000 audit[3536]: CRED_ACQ pid=3536 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.069000 audit[3536]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea761c10 a2=3 a3=1 items=0 ppid=1 pid=3536 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:27.069943 sshd[3536]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:27.074190 systemd-logind[1083]: New session 12 of user core. Apr 12 18:41:27.074382 systemd[1]: Started session-12.scope. Apr 12 18:41:27.079000 audit[3536]: USER_START pid=3536 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.081000 audit[3559]: CRED_ACQ pid=3559 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.117000 audit[3574]: NETFILTER_CFG table=raw:107 family=2 entries=19 op=nft_register_chain pid=3574 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:27.117000 audit[3574]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffdaacaf20 a2=0 a3=ffff96aa1fa8 items=0 ppid=3382 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.117000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:27.118000 audit[3572]: NETFILTER_CFG table=nat:108 family=2 entries=15 op=nft_register_chain pid=3572 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:27.118000 audit[3572]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffcf3f5690 a2=0 a3=ffff845d7fa8 items=0 ppid=3382 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.118000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:27.119000 audit[3577]: NETFILTER_CFG table=mangle:109 family=2 entries=16 op=nft_register_chain pid=3577 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:27.119000 audit[3577]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffff018d5d0 a2=0 a3=ffff88145fa8 items=0 ppid=3382 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:27.119000 audit[3573]: NETFILTER_CFG table=filter:110 family=2 entries=39 op=nft_register_chain pid=3573 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:27.119000 audit[3573]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18968 a0=3 a1=fffff838a590 a2=0 a3=ffffaaa47fa8 items=0 ppid=3382 pid=3573 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:27.119000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:27.195776 sshd[3536]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:27.196000 audit[3536]: USER_END pid=3536 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.196000 audit[3536]: CRED_DISP pid=3536 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:27.198000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.136:22-10.0.0.1:38842 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:27.198374 systemd-logind[1083]: Session 12 logged out. Waiting for processes to exit. Apr 12 18:41:27.198596 systemd[1]: sshd@11-10.0.0.136:22-10.0.0.1:38842.service: Deactivated successfully. Apr 12 18:41:27.199296 systemd[1]: session-12.scope: Deactivated successfully. Apr 12 18:41:27.199889 systemd-logind[1083]: Removed session 12. Apr 12 18:41:27.856269 kubelet[1972]: I0412 18:41:27.856187 1972 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Apr 12 18:41:27.858872 kubelet[1972]: E0412 18:41:27.857050 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:27.873802 systemd[1]: run-containerd-runc-k8s.io-b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a-runc.1jloYT.mount: Deactivated successfully. Apr 12 18:41:27.928644 systemd-networkd[1006]: vxlan.calico: Link UP Apr 12 18:41:27.928649 systemd-networkd[1006]: vxlan.calico: Gained carrier Apr 12 18:41:28.870145 systemd[1]: run-containerd-runc-k8s.io-b72d1bca9f1e2bec13c0b676d433720561f9c84aa327227a7f3a0e1ca18fcd6a-runc.Hln1pk.mount: Deactivated successfully. Apr 12 18:41:29.561250 systemd-networkd[1006]: vxlan.calico: Gained IPv6LL Apr 12 18:41:31.817598 env[1099]: time="2024-04-12T18:41:31.817554391Z" level=info msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.872 [INFO][3663] k8s.go 585: Cleaning up netns ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.872 [INFO][3663] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" iface="eth0" netns="/var/run/netns/cni-fb875556-2865-c9ca-58a4-96f4b80b3f2f" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.873 [INFO][3663] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" iface="eth0" netns="/var/run/netns/cni-fb875556-2865-c9ca-58a4-96f4b80b3f2f" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.874 [INFO][3663] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" iface="eth0" netns="/var/run/netns/cni-fb875556-2865-c9ca-58a4-96f4b80b3f2f" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.874 [INFO][3663] k8s.go 592: Releasing IP address(es) ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.874 [INFO][3663] utils.go 188: Calico CNI releasing IP address ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.946 [INFO][3671] ipam_plugin.go 415: Releasing address using handleID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.948 [INFO][3671] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.948 [INFO][3671] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.959 [WARNING][3671] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.959 [INFO][3671] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.961 [INFO][3671] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:31.964406 env[1099]: 2024-04-12 18:41:31.962 [INFO][3663] k8s.go 598: Teardown processing complete. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:31.966388 env[1099]: time="2024-04-12T18:41:31.966220192Z" level=info msg="TearDown network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" successfully" Apr 12 18:41:31.966388 env[1099]: time="2024-04-12T18:41:31.966261874Z" level=info msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" returns successfully" Apr 12 18:41:31.966575 kubelet[1972]: E0412 18:41:31.966531 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:31.967651 systemd[1]: run-netns-cni\x2dfb875556\x2d2865\x2dc9ca\x2d58a4\x2d96f4b80b3f2f.mount: Deactivated successfully. Apr 12 18:41:31.968426 env[1099]: time="2024-04-12T18:41:31.967964147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9kglg,Uid:0154281d-3fde-47d9-89e8-3cea82f840e1,Namespace:kube-system,Attempt:1,}" Apr 12 18:41:32.084538 systemd-networkd[1006]: cali8ef467587d2: Link UP Apr 12 18:41:32.086762 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:41:32.086852 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali8ef467587d2: link becomes ready Apr 12 18:41:32.086915 systemd-networkd[1006]: cali8ef467587d2: Gained carrier Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.016 [INFO][3678] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--9kglg-eth0 coredns-76f75df574- kube-system 0154281d-3fde-47d9-89e8-3cea82f840e1 942 0 2024-04-12 18:41:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-9kglg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali8ef467587d2 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.016 [INFO][3678] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.043 [INFO][3690] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" HandleID="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.054 [INFO][3690] ipam_plugin.go 268: Auto assigning IP ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" HandleID="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002aa220), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-9kglg", "timestamp":"2024-04-12 18:41:32.043186269 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.054 [INFO][3690] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.055 [INFO][3690] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.055 [INFO][3690] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.056 [INFO][3690] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.060 [INFO][3690] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.064 [INFO][3690] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.065 [INFO][3690] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.067 [INFO][3690] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.067 [INFO][3690] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.069 [INFO][3690] ipam.go 1682: Creating new handle: k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685 Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.072 [INFO][3690] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.076 [INFO][3690] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.076 [INFO][3690] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" host="localhost" Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.076 [INFO][3690] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:32.100321 env[1099]: 2024-04-12 18:41:32.076 [INFO][3690] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" HandleID="k8s-pod-network.028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.080 [INFO][3678] k8s.go 385: Populated endpoint ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--9kglg-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0154281d-3fde-47d9-89e8-3cea82f840e1", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-9kglg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ef467587d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.080 [INFO][3678] k8s.go 386: Calico CNI using IPs: [192.168.88.129/32] ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.080 [INFO][3678] dataplane_linux.go 68: Setting the host side veth name to cali8ef467587d2 ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.087 [INFO][3678] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.087 [INFO][3678] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--9kglg-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0154281d-3fde-47d9-89e8-3cea82f840e1", ResourceVersion:"942", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685", Pod:"coredns-76f75df574-9kglg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ef467587d2", MAC:"7e:7e:6e:27:0a:a3", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:32.100843 env[1099]: 2024-04-12 18:41:32.094 [INFO][3678] k8s.go 498: Wrote updated endpoint to datastore ContainerID="028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685" Namespace="kube-system" Pod="coredns-76f75df574-9kglg" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:32.113238 kernel: kauditd_printk_skb: 147 callbacks suppressed Apr 12 18:41:32.113351 kernel: audit: type=1325 audit(1712947292.110:1284): table=filter:111 family=2 entries=36 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:32.110000 audit[3716]: NETFILTER_CFG table=filter:111 family=2 entries=36 op=nft_register_chain pid=3716 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:32.110000 audit[3716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffed2b4d60 a2=0 a3=ffffb5130fa8 items=0 ppid=3382 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.116233 env[1099]: time="2024-04-12T18:41:32.116170906Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:32.116233 env[1099]: time="2024-04-12T18:41:32.116211868Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:32.116233 env[1099]: time="2024-04-12T18:41:32.116222308Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:32.116547 env[1099]: time="2024-04-12T18:41:32.116463758Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685 pid=3724 runtime=io.containerd.runc.v2 Apr 12 18:41:32.117870 kernel: audit: type=1300 audit(1712947292.110:1284): arch=c00000b7 syscall=211 success=yes exit=20404 a0=3 a1=ffffed2b4d60 a2=0 a3=ffffb5130fa8 items=0 ppid=3382 pid=3716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.110000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:32.120504 kernel: audit: type=1327 audit(1712947292.110:1284): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:32.134006 systemd[1]: Started cri-containerd-028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685.scope. Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.156716 kernel: audit: type=1400 audit(1712947292.150:1285): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.156788 kernel: audit: type=1400 audit(1712947292.150:1286): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.156813 kernel: audit: type=1400 audit(1712947292.150:1287): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.161328 kernel: audit: type=1400 audit(1712947292.150:1288): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.161380 kernel: audit: type=1400 audit(1712947292.150:1289): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.163758 systemd-resolved[1040]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:41:32.165895 kernel: audit: type=1400 audit(1712947292.150:1290): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.165952 kernel: audit: type=1400 audit(1712947292.150:1291): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.150000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit: BPF prog-id=161 op=LOAD Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383034306135663939326633636666626231386630666130656635 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383034306135663939326633636666626231386630666130656635 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.153000 audit: BPF prog-id=162 op=LOAD Apr 12 18:41:32.153000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.153000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383034306135663939326633636666626231386630666130656635 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.155000 audit: BPF prog-id=163 op=LOAD Apr 12 18:41:32.155000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.155000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383034306135663939326633636666626231386630666130656635 Apr 12 18:41:32.157000 audit: BPF prog-id=163 op=UNLOAD Apr 12 18:41:32.157000 audit: BPF prog-id=162 op=UNLOAD Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.158000 audit: BPF prog-id=164 op=LOAD Apr 12 18:41:32.158000 audit[3733]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3724 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.158000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032383034306135663939326633636666626231386630666130656635 Apr 12 18:41:32.185643 env[1099]: time="2024-04-12T18:41:32.185314661Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-9kglg,Uid:0154281d-3fde-47d9-89e8-3cea82f840e1,Namespace:kube-system,Attempt:1,} returns sandbox id \"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685\"" Apr 12 18:41:32.185944 kubelet[1972]: E0412 18:41:32.185921 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:32.190572 env[1099]: time="2024-04-12T18:41:32.190538161Z" level=info msg="CreateContainer within sandbox \"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:41:32.200092 systemd[1]: Started sshd@12-10.0.0.136:22-10.0.0.1:35522.service. Apr 12 18:41:32.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:35522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:32.202744 env[1099]: time="2024-04-12T18:41:32.202706034Z" level=info msg="CreateContainer within sandbox \"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4687b098d56010d3e422e7afe8b723a95fd4059b310218795af225ccf08552a3\"" Apr 12 18:41:32.203511 env[1099]: time="2024-04-12T18:41:32.203482547Z" level=info msg="StartContainer for \"4687b098d56010d3e422e7afe8b723a95fd4059b310218795af225ccf08552a3\"" Apr 12 18:41:32.221239 systemd[1]: Started cri-containerd-4687b098d56010d3e422e7afe8b723a95fd4059b310218795af225ccf08552a3.scope. Apr 12 18:41:32.234000 audit[3763]: USER_ACCT pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.236195 sshd[3763]: Accepted publickey for core from 10.0.0.1 port 35522 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:32.235000 audit[3763]: CRED_ACQ pid=3763 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.235000 audit[3763]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff86ff7a0 a2=3 a3=1 items=0 ppid=1 pid=3763 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.235000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:32.237478 sshd[3763]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.238000 audit: BPF prog-id=165 op=LOAD Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3724 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383762303938643536303130643365343232653761666538623732 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3724 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383762303938643536303130643365343232653761666538623732 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit: BPF prog-id=166 op=LOAD Apr 12 18:41:32.239000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3724 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383762303938643536303130643365343232653761666538623732 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit: BPF prog-id=167 op=LOAD Apr 12 18:41:32.239000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3724 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383762303938643536303130643365343232653761666538623732 Apr 12 18:41:32.239000 audit: BPF prog-id=167 op=UNLOAD Apr 12 18:41:32.239000 audit: BPF prog-id=166 op=UNLOAD Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { perfmon } for pid=3771 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit[3771]: AVC avc: denied { bpf } for pid=3771 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:32.239000 audit: BPF prog-id=168 op=LOAD Apr 12 18:41:32.239000 audit[3771]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3724 pid=3771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:32.239000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3436383762303938643536303130643365343232653761666538623732 Apr 12 18:41:32.242554 systemd[1]: Started session-13.scope. Apr 12 18:41:32.243458 systemd-logind[1083]: New session 13 of user core. Apr 12 18:41:32.246000 audit[3763]: USER_START pid=3763 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.248000 audit[3788]: CRED_ACQ pid=3788 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.257803 env[1099]: time="2024-04-12T18:41:32.257755076Z" level=info msg="StartContainer for \"4687b098d56010d3e422e7afe8b723a95fd4059b310218795af225ccf08552a3\" returns successfully" Apr 12 18:41:32.387920 sshd[3763]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:32.390000 audit[3763]: USER_END pid=3763 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.390000 audit[3763]: CRED_DISP pid=3763 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:32.394390 systemd[1]: sshd@12-10.0.0.136:22-10.0.0.1:35522.service: Deactivated successfully. Apr 12 18:41:32.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.136:22-10.0.0.1:35522 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:32.395106 systemd[1]: session-13.scope: Deactivated successfully. Apr 12 18:41:32.395666 systemd-logind[1083]: Session 13 logged out. Waiting for processes to exit. Apr 12 18:41:32.396595 systemd-logind[1083]: Removed session 13. Apr 12 18:41:32.817987 env[1099]: time="2024-04-12T18:41:32.817903533Z" level=info msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.863 [INFO][3831] k8s.go 585: Cleaning up netns ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.863 [INFO][3831] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" iface="eth0" netns="/var/run/netns/cni-0424f8e5-4547-464f-fed3-490e255f8333" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.864 [INFO][3831] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" iface="eth0" netns="/var/run/netns/cni-0424f8e5-4547-464f-fed3-490e255f8333" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.864 [INFO][3831] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" iface="eth0" netns="/var/run/netns/cni-0424f8e5-4547-464f-fed3-490e255f8333" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.864 [INFO][3831] k8s.go 592: Releasing IP address(es) ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.864 [INFO][3831] utils.go 188: Calico CNI releasing IP address ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.882 [INFO][3839] ipam_plugin.go 415: Releasing address using handleID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.882 [INFO][3839] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.882 [INFO][3839] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.891 [WARNING][3839] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.891 [INFO][3839] ipam_plugin.go 443: Releasing address using workloadID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.892 [INFO][3839] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:32.895611 env[1099]: 2024-04-12 18:41:32.893 [INFO][3831] k8s.go 598: Teardown processing complete. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:32.896028 env[1099]: time="2024-04-12T18:41:32.895739695Z" level=info msg="TearDown network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" successfully" Apr 12 18:41:32.896028 env[1099]: time="2024-04-12T18:41:32.895770496Z" level=info msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" returns successfully" Apr 12 18:41:32.896508 env[1099]: time="2024-04-12T18:41:32.896474566Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79cb8c8f67-j29zs,Uid:53c95e4d-f2d4-4add-8000-570ea0ed1825,Namespace:calico-system,Attempt:1,}" Apr 12 18:41:32.967832 systemd[1]: run-netns-cni\x2d0424f8e5\x2d4547\x2d464f\x2dfed3\x2d490e255f8333.mount: Deactivated successfully. Apr 12 18:41:33.003754 systemd-networkd[1006]: calia1d9691659b: Link UP Apr 12 18:41:33.004497 systemd-networkd[1006]: calia1d9691659b: Gained carrier Apr 12 18:41:33.005149 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia1d9691659b: link becomes ready Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.935 [INFO][3848] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0 calico-kube-controllers-79cb8c8f67- calico-system 53c95e4d-f2d4-4add-8000-570ea0ed1825 954 0 2024-04-12 18:41:10 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:79cb8c8f67 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-79cb8c8f67-j29zs eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calia1d9691659b [] []}} ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.935 [INFO][3848] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.958 [INFO][3861] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" HandleID="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.974 [INFO][3861] ipam_plugin.go 268: Auto assigning IP ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" HandleID="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d100), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-79cb8c8f67-j29zs", "timestamp":"2024-04-12 18:41:32.958284252 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.974 [INFO][3861] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.974 [INFO][3861] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.974 [INFO][3861] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.975 [INFO][3861] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.979 [INFO][3861] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.982 [INFO][3861] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.984 [INFO][3861] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.986 [INFO][3861] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.986 [INFO][3861] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.987 [INFO][3861] ipam.go 1682: Creating new handle: k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.993 [INFO][3861] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.999 [INFO][3861] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.999 [INFO][3861] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" host="localhost" Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.999 [INFO][3861] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:33.018939 env[1099]: 2024-04-12 18:41:32.999 [INFO][3861] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" HandleID="k8s-pod-network.9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.001 [INFO][3848] k8s.go 385: Populated endpoint ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0", GenerateName:"calico-kube-controllers-79cb8c8f67-", Namespace:"calico-system", SelfLink:"", UID:"53c95e4d-f2d4-4add-8000-570ea0ed1825", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79cb8c8f67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-79cb8c8f67-j29zs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia1d9691659b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.001 [INFO][3848] k8s.go 386: Calico CNI using IPs: [192.168.88.130/32] ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.001 [INFO][3848] dataplane_linux.go 68: Setting the host side veth name to calia1d9691659b ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.005 [INFO][3848] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.005 [INFO][3848] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0", GenerateName:"calico-kube-controllers-79cb8c8f67-", Namespace:"calico-system", SelfLink:"", UID:"53c95e4d-f2d4-4add-8000-570ea0ed1825", ResourceVersion:"954", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79cb8c8f67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e", Pod:"calico-kube-controllers-79cb8c8f67-j29zs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia1d9691659b", MAC:"0a:5f:05:d4:7b:f4", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:33.019573 env[1099]: 2024-04-12 18:41:33.013 [INFO][3848] k8s.go 498: Wrote updated endpoint to datastore ContainerID="9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e" Namespace="calico-system" Pod="calico-kube-controllers-79cb8c8f67-j29zs" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:33.027000 audit[3887]: NETFILTER_CFG table=filter:112 family=2 entries=40 op=nft_register_chain pid=3887 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:33.027000 audit[3887]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21592 a0=3 a1=ffffd8b533e0 a2=0 a3=ffff8ac9cfa8 items=0 ppid=3382 pid=3887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:33.031547 env[1099]: time="2024-04-12T18:41:33.031463912Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:33.031547 env[1099]: time="2024-04-12T18:41:33.031509714Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:33.031547 env[1099]: time="2024-04-12T18:41:33.031520074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:33.031812 env[1099]: time="2024-04-12T18:41:33.031765404Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e pid=3894 runtime=io.containerd.runc.v2 Apr 12 18:41:33.048185 systemd[1]: Started cri-containerd-9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e.scope. Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.061000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit: BPF prog-id=169 op=LOAD Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3894 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326435333962356563363531353838393135623462623064373238 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3894 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326435333962356563363531353838393135623462623064373238 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit: BPF prog-id=170 op=LOAD Apr 12 18:41:33.062000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3894 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326435333962356563363531353838393135623462623064373238 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.062000 audit: BPF prog-id=171 op=LOAD Apr 12 18:41:33.062000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3894 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.062000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326435333962356563363531353838393135623462623064373238 Apr 12 18:41:33.063000 audit: BPF prog-id=171 op=UNLOAD Apr 12 18:41:33.063000 audit: BPF prog-id=170 op=UNLOAD Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { perfmon } for pid=3903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit[3903]: AVC avc: denied { bpf } for pid=3903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:33.063000 audit: BPF prog-id=172 op=LOAD Apr 12 18:41:33.063000 audit[3903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3894 pid=3903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.063000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961326435333962356563363531353838393135623462623064373238 Apr 12 18:41:33.064725 systemd-resolved[1040]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:41:33.082191 env[1099]: time="2024-04-12T18:41:33.082032201Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-79cb8c8f67-j29zs,Uid:53c95e4d-f2d4-4add-8000-570ea0ed1825,Namespace:calico-system,Attempt:1,} returns sandbox id \"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e\"" Apr 12 18:41:33.086094 env[1099]: time="2024-04-12T18:41:33.085718034Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\"" Apr 12 18:41:33.164163 kubelet[1972]: E0412 18:41:33.161706 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:33.171534 kubelet[1972]: I0412 18:41:33.170567 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-9kglg" podStartSLOduration=30.170530578 podStartE2EDuration="30.170530578s" podCreationTimestamp="2024-04-12 18:41:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:41:33.169976076 +0000 UTC m=+44.462903782" watchObservedRunningTime="2024-04-12 18:41:33.170530578 +0000 UTC m=+44.463458284" Apr 12 18:41:33.181000 audit[3929]: NETFILTER_CFG table=filter:113 family=2 entries=14 op=nft_register_rule pid=3929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:33.181000 audit[3929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=ffffcb126480 a2=0 a3=1 items=0 ppid=2139 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:33.181000 audit[3929]: NETFILTER_CFG table=nat:114 family=2 entries=14 op=nft_register_rule pid=3929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:33.181000 audit[3929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3468 a0=3 a1=ffffcb126480 a2=0 a3=1 items=0 ppid=2139 pid=3929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.181000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:33.190000 audit[3931]: NETFILTER_CFG table=filter:115 family=2 entries=11 op=nft_register_rule pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:33.190000 audit[3931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffd731f4c0 a2=0 a3=1 items=0 ppid=2139 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:33.195000 audit[3931]: NETFILTER_CFG table=nat:116 family=2 entries=35 op=nft_register_chain pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:33.195000 audit[3931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14196 a0=3 a1=ffffd731f4c0 a2=0 a3=1 items=0 ppid=2139 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:33.195000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:33.209253 systemd-networkd[1006]: cali8ef467587d2: Gained IPv6LL Apr 12 18:41:33.818040 env[1099]: time="2024-04-12T18:41:33.817997574Z" level=info msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] k8s.go 585: Cleaning up netns ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" iface="eth0" netns="/var/run/netns/cni-0d47a6a7-b136-9b81-b34e-73050085fd0f" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" iface="eth0" netns="/var/run/netns/cni-0d47a6a7-b136-9b81-b34e-73050085fd0f" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" iface="eth0" netns="/var/run/netns/cni-0d47a6a7-b136-9b81-b34e-73050085fd0f" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] k8s.go 592: Releasing IP address(es) ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.865 [INFO][3948] utils.go 188: Calico CNI releasing IP address ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.884 [INFO][3955] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.884 [INFO][3955] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.884 [INFO][3955] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.893 [WARNING][3955] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.893 [INFO][3955] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.894 [INFO][3955] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:33.897673 env[1099]: 2024-04-12 18:41:33.896 [INFO][3948] k8s.go 598: Teardown processing complete. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:33.900512 env[1099]: time="2024-04-12T18:41:33.900148849Z" level=info msg="TearDown network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" successfully" Apr 12 18:41:33.900512 env[1099]: time="2024-04-12T18:41:33.900183170Z" level=info msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" returns successfully" Apr 12 18:41:33.899527 systemd[1]: run-netns-cni\x2d0d47a6a7\x2db136\x2d9b81\x2db34e\x2d73050085fd0f.mount: Deactivated successfully. Apr 12 18:41:33.900856 env[1099]: time="2024-04-12T18:41:33.900818996Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5svdz,Uid:9eed1024-4e4e-488d-b42b-1302198d0850,Namespace:calico-system,Attempt:1,}" Apr 12 18:41:33.998670 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2595705376.mount: Deactivated successfully. Apr 12 18:41:34.004128 systemd-networkd[1006]: caliad39b181f8d: Link UP Apr 12 18:41:34.005557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:41:34.005628 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliad39b181f8d: link becomes ready Apr 12 18:41:34.005679 systemd-networkd[1006]: caliad39b181f8d: Gained carrier Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.938 [INFO][3963] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--5svdz-eth0 csi-node-driver- calico-system 9eed1024-4e4e-488d-b42b-1302198d0850 970 0 2024-04-12 18:41:09 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:64699887c5 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-5svdz eth0 default [] [] [kns.calico-system ksa.calico-system.default] caliad39b181f8d [] []}} ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.938 [INFO][3963] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.963 [INFO][3977] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" HandleID="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.974 [INFO][3977] ipam_plugin.go 268: Auto assigning IP ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" HandleID="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40000d1670), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-5svdz", "timestamp":"2024-04-12 18:41:33.963471865 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.974 [INFO][3977] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.974 [INFO][3977] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.974 [INFO][3977] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.976 [INFO][3977] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.979 [INFO][3977] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.983 [INFO][3977] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.984 [INFO][3977] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.986 [INFO][3977] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.986 [INFO][3977] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.988 [INFO][3977] ipam.go 1682: Creating new handle: k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.993 [INFO][3977] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.999 [INFO][3977] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.999 [INFO][3977] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" host="localhost" Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.999 [INFO][3977] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:34.018192 env[1099]: 2024-04-12 18:41:33.999 [INFO][3977] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" HandleID="k8s-pod-network.1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.002 [INFO][3963] k8s.go 385: Populated endpoint ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5svdz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9eed1024-4e4e-488d-b42b-1302198d0850", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-5svdz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad39b181f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.002 [INFO][3963] k8s.go 386: Calico CNI using IPs: [192.168.88.131/32] ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.002 [INFO][3963] dataplane_linux.go 68: Setting the host side veth name to caliad39b181f8d ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.006 [INFO][3963] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.006 [INFO][3963] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5svdz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9eed1024-4e4e-488d-b42b-1302198d0850", ResourceVersion:"970", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f", Pod:"csi-node-driver-5svdz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad39b181f8d", MAC:"e2:4b:dd:72:60:90", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:34.018730 env[1099]: 2024-04-12 18:41:34.015 [INFO][3963] k8s.go 498: Wrote updated endpoint to datastore ContainerID="1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f" Namespace="calico-system" Pod="csi-node-driver-5svdz" WorkloadEndpoint="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:34.027000 audit[4000]: NETFILTER_CFG table=filter:117 family=2 entries=44 op=nft_register_chain pid=4000 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:34.027000 audit[4000]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22680 a0=3 a1=ffffe87d3340 a2=0 a3=ffffb55affa8 items=0 ppid=3382 pid=4000 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.027000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:34.031920 env[1099]: time="2024-04-12T18:41:34.031855747Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:34.032035 env[1099]: time="2024-04-12T18:41:34.031896149Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:34.032035 env[1099]: time="2024-04-12T18:41:34.031907709Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:34.032138 env[1099]: time="2024-04-12T18:41:34.032047835Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f pid=4009 runtime=io.containerd.runc.v2 Apr 12 18:41:34.047055 systemd[1]: Started cri-containerd-1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f.scope. Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.077000 audit: BPF prog-id=173 op=LOAD Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4009 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166656431393335336662653830353365323531306661306430313266 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4009 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166656431393335336662653830353365323531306661306430313266 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.078000 audit: BPF prog-id=174 op=LOAD Apr 12 18:41:34.078000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4009 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166656431393335336662653830353365323531306661306430313266 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit: BPF prog-id=175 op=LOAD Apr 12 18:41:34.079000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4009 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166656431393335336662653830353365323531306661306430313266 Apr 12 18:41:34.079000 audit: BPF prog-id=175 op=UNLOAD Apr 12 18:41:34.079000 audit: BPF prog-id=174 op=UNLOAD Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { perfmon } for pid=4018 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit[4018]: AVC avc: denied { bpf } for pid=4018 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:34.079000 audit: BPF prog-id=176 op=LOAD Apr 12 18:41:34.079000 audit[4018]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4009 pid=4018 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:34.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166656431393335336662653830353365323531306661306430313266 Apr 12 18:41:34.082090 systemd-resolved[1040]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:41:34.093994 env[1099]: time="2024-04-12T18:41:34.093958704Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-5svdz,Uid:9eed1024-4e4e-488d-b42b-1302198d0850,Namespace:calico-system,Attempt:1,} returns sandbox id \"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f\"" Apr 12 18:41:34.167188 kubelet[1972]: E0412 18:41:34.167164 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:34.819012 env[1099]: time="2024-04-12T18:41:34.818957133Z" level=info msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.865 [INFO][4059] k8s.go 585: Cleaning up netns ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.865 [INFO][4059] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" iface="eth0" netns="/var/run/netns/cni-852acd45-a3f5-1eff-66c7-5a51c1562ef3" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.866 [INFO][4059] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" iface="eth0" netns="/var/run/netns/cni-852acd45-a3f5-1eff-66c7-5a51c1562ef3" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.866 [INFO][4059] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" iface="eth0" netns="/var/run/netns/cni-852acd45-a3f5-1eff-66c7-5a51c1562ef3" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.866 [INFO][4059] k8s.go 592: Releasing IP address(es) ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.866 [INFO][4059] utils.go 188: Calico CNI releasing IP address ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.884 [INFO][4067] ipam_plugin.go 415: Releasing address using handleID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.885 [INFO][4067] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.885 [INFO][4067] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.894 [WARNING][4067] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.894 [INFO][4067] ipam_plugin.go 443: Releasing address using workloadID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.895 [INFO][4067] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:34.898348 env[1099]: 2024-04-12 18:41:34.897 [INFO][4059] k8s.go 598: Teardown processing complete. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:34.898927 env[1099]: time="2024-04-12T18:41:34.898891493Z" level=info msg="TearDown network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" successfully" Apr 12 18:41:34.899012 env[1099]: time="2024-04-12T18:41:34.898991257Z" level=info msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" returns successfully" Apr 12 18:41:34.899404 kubelet[1972]: E0412 18:41:34.899366 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:34.900931 env[1099]: time="2024-04-12T18:41:34.900894055Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-xf8s9,Uid:5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c,Namespace:kube-system,Attempt:1,}" Apr 12 18:41:34.967343 systemd[1]: run-netns-cni\x2d852acd45\x2da3f5\x2d1eff\x2d66c7\x2d5a51c1562ef3.mount: Deactivated successfully. Apr 12 18:41:35.011696 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:41:35.011885 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali801d0b4fe4b: link becomes ready Apr 12 18:41:35.012228 systemd-networkd[1006]: cali801d0b4fe4b: Link UP Apr 12 18:41:35.012780 systemd-networkd[1006]: cali801d0b4fe4b: Gained carrier Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.942 [INFO][4077] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--xf8s9-eth0 coredns-76f75df574- kube-system 5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c 979 0 2024-04-12 18:41:03 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-xf8s9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali801d0b4fe4b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.942 [INFO][4077] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.969 [INFO][4091] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" HandleID="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.980 [INFO][4091] ipam_plugin.go 268: Auto assigning IP ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" HandleID="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ea350), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-xf8s9", "timestamp":"2024-04-12 18:41:34.969520956 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.980 [INFO][4091] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.980 [INFO][4091] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.980 [INFO][4091] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.982 [INFO][4091] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.985 [INFO][4091] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.990 [INFO][4091] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.992 [INFO][4091] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.994 [INFO][4091] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.994 [INFO][4091] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:34.997 [INFO][4091] ipam.go 1682: Creating new handle: k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26 Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:35.000 [INFO][4091] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:35.005 [INFO][4091] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:35.006 [INFO][4091] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" host="localhost" Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:35.006 [INFO][4091] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:35.026244 env[1099]: 2024-04-12 18:41:35.006 [INFO][4091] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" HandleID="k8s-pod-network.7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.008 [INFO][4077] k8s.go 385: Populated endpoint ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--xf8s9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-xf8s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali801d0b4fe4b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.008 [INFO][4077] k8s.go 386: Calico CNI using IPs: [192.168.88.132/32] ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.008 [INFO][4077] dataplane_linux.go 68: Setting the host side veth name to cali801d0b4fe4b ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.012 [INFO][4077] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.013 [INFO][4077] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--xf8s9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c", ResourceVersion:"979", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26", Pod:"coredns-76f75df574-xf8s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali801d0b4fe4b", MAC:"8a:97:e0:8a:bb:ae", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:35.026993 env[1099]: 2024-04-12 18:41:35.023 [INFO][4077] k8s.go 498: Wrote updated endpoint to datastore ContainerID="7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26" Namespace="kube-system" Pod="coredns-76f75df574-xf8s9" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:35.030000 audit[4110]: NETFILTER_CFG table=filter:118 family=2 entries=40 op=nft_register_chain pid=4110 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:41:35.030000 audit[4110]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21056 a0=3 a1=ffffc1c30d20 a2=0 a3=ffff9d91ffa8 items=0 ppid=3382 pid=4110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.030000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:41:35.040376 env[1099]: time="2024-04-12T18:41:35.040316277Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:41:35.040376 env[1099]: time="2024-04-12T18:41:35.040356519Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:41:35.040530 env[1099]: time="2024-04-12T18:41:35.040497125Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:41:35.040726 env[1099]: time="2024-04-12T18:41:35.040686772Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26 pid=4124 runtime=io.containerd.runc.v2 Apr 12 18:41:35.055528 systemd[1]: Started cri-containerd-7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26.scope. Apr 12 18:41:35.066205 systemd-networkd[1006]: calia1d9691659b: Gained IPv6LL Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.099000 audit: BPF prog-id=177 op=LOAD Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4124 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313765363039343932613866343662613137376564356533333365 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4124 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313765363039343932613866343662613137376564356533333365 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.101000 audit: BPF prog-id=178 op=LOAD Apr 12 18:41:35.101000 audit[4133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4124 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.101000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313765363039343932613866343662613137376564356533333365 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.102000 audit: BPF prog-id=179 op=LOAD Apr 12 18:41:35.102000 audit[4133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4124 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.102000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313765363039343932613866343662613137376564356533333365 Apr 12 18:41:35.103000 audit: BPF prog-id=179 op=UNLOAD Apr 12 18:41:35.103000 audit: BPF prog-id=178 op=UNLOAD Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { perfmon } for pid=4133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.105043 env[1099]: time="2024-04-12T18:41:35.104914328Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:35.103000 audit[4133]: AVC avc: denied { bpf } for pid=4133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.103000 audit: BPF prog-id=180 op=LOAD Apr 12 18:41:35.103000 audit[4133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4124 pid=4133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.103000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733313765363039343932613866343662613137376564356533333365 Apr 12 18:41:35.105816 systemd-resolved[1040]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:41:35.106411 env[1099]: time="2024-04-12T18:41:35.106377386Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:35.107943 env[1099]: time="2024-04-12T18:41:35.107911688Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:35.109106 env[1099]: time="2024-04-12T18:41:35.109078814Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c74026de594a0e40b9aa63b33f41fa42fb311e35d65a10dfb642293292368c51,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:35.109524 env[1099]: time="2024-04-12T18:41:35.109497631Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.3\" returns image reference \"sha256:7d4c779f6e10281f74093e9334a770d51a544286816327704e1fcfd64ea509fb\"" Apr 12 18:41:35.112176 env[1099]: time="2024-04-12T18:41:35.112035412Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\"" Apr 12 18:41:35.122990 env[1099]: time="2024-04-12T18:41:35.122955006Z" level=info msg="CreateContainer within sandbox \"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Apr 12 18:41:35.130556 env[1099]: time="2024-04-12T18:41:35.130507147Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-xf8s9,Uid:5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c,Namespace:kube-system,Attempt:1,} returns sandbox id \"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26\"" Apr 12 18:41:35.131159 kubelet[1972]: E0412 18:41:35.131139 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:35.132975 env[1099]: time="2024-04-12T18:41:35.132932163Z" level=info msg="CreateContainer within sandbox \"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Apr 12 18:41:35.137765 env[1099]: time="2024-04-12T18:41:35.137730314Z" level=info msg="CreateContainer within sandbox \"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"e5fc93810006f2f0869689e3b8e0ceefb8548624555c0d9d368c9a376aa62e9a\"" Apr 12 18:41:35.138528 env[1099]: time="2024-04-12T18:41:35.138500585Z" level=info msg="StartContainer for \"e5fc93810006f2f0869689e3b8e0ceefb8548624555c0d9d368c9a376aa62e9a\"" Apr 12 18:41:35.146208 env[1099]: time="2024-04-12T18:41:35.146163210Z" level=info msg="CreateContainer within sandbox \"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"698da30690c5cfb58aea249f2d054f92b876faa41ca821dd9dae3e4ab9e40207\"" Apr 12 18:41:35.146796 env[1099]: time="2024-04-12T18:41:35.146771034Z" level=info msg="StartContainer for \"698da30690c5cfb58aea249f2d054f92b876faa41ca821dd9dae3e4ab9e40207\"" Apr 12 18:41:35.155048 systemd[1]: Started cri-containerd-e5fc93810006f2f0869689e3b8e0ceefb8548624555c0d9d368c9a376aa62e9a.scope. Apr 12 18:41:35.172438 kubelet[1972]: E0412 18:41:35.172398 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:35.176239 systemd[1]: Started cri-containerd-698da30690c5cfb58aea249f2d054f92b876faa41ca821dd9dae3e4ab9e40207.scope. Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit: BPF prog-id=181 op=LOAD Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3894 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666339333831303030366632663038363936383965336238653063 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3894 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666339333831303030366632663038363936383965336238653063 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.195000 audit: BPF prog-id=182 op=LOAD Apr 12 18:41:35.195000 audit[4169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3894 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666339333831303030366632663038363936383965336238653063 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit: BPF prog-id=183 op=LOAD Apr 12 18:41:35.196000 audit[4169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3894 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666339333831303030366632663038363936383965336238653063 Apr 12 18:41:35.196000 audit: BPF prog-id=183 op=UNLOAD Apr 12 18:41:35.196000 audit: BPF prog-id=182 op=UNLOAD Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { perfmon } for pid=4169 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit[4169]: AVC avc: denied { bpf } for pid=4169 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.196000 audit: BPF prog-id=184 op=LOAD Apr 12 18:41:35.196000 audit[4169]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3894 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535666339333831303030366632663038363936383965336238653063 Apr 12 18:41:35.195773 systemd-networkd[1006]: caliad39b181f8d: Gained IPv6LL Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.202000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.203000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.203000 audit: BPF prog-id=185 op=LOAD Apr 12 18:41:35.203000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.203000 audit[4185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4124 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386461333036393063356366623538616561323439663264303534 Apr 12 18:41:35.203000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.203000 audit[4185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4124 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386461333036393063356366623538616561323439663264303534 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit: BPF prog-id=186 op=LOAD Apr 12 18:41:35.204000 audit[4185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4124 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386461333036393063356366623538616561323439663264303534 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.204000 audit: BPF prog-id=187 op=LOAD Apr 12 18:41:35.204000 audit[4185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4124 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.204000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386461333036393063356366623538616561323439663264303534 Apr 12 18:41:35.205000 audit: BPF prog-id=187 op=UNLOAD Apr 12 18:41:35.205000 audit: BPF prog-id=186 op=UNLOAD Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { perfmon } for pid=4185 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit[4185]: AVC avc: denied { bpf } for pid=4185 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:35.205000 audit: BPF prog-id=188 op=LOAD Apr 12 18:41:35.205000 audit[4185]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4124 pid=4185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:35.205000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3639386461333036393063356366623538616561323439663264303534 Apr 12 18:41:35.222940 env[1099]: time="2024-04-12T18:41:35.221906504Z" level=info msg="StartContainer for \"698da30690c5cfb58aea249f2d054f92b876faa41ca821dd9dae3e4ab9e40207\" returns successfully" Apr 12 18:41:35.222940 env[1099]: time="2024-04-12T18:41:35.222776979Z" level=info msg="StartContainer for \"e5fc93810006f2f0869689e3b8e0ceefb8548624555c0d9d368c9a376aa62e9a\" returns successfully" Apr 12 18:41:36.180708 kubelet[1972]: E0412 18:41:36.180195 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:36.192623 env[1099]: time="2024-04-12T18:41:36.192584483Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:36.197382 env[1099]: time="2024-04-12T18:41:36.197342869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:36.198566 env[1099]: time="2024-04-12T18:41:36.198532876Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:36.200211 env[1099]: time="2024-04-12T18:41:36.200182820Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:e6e9be3e67df7388eae74d419fff785fdb35b0c3456e3d27a0251c7bdb55f0fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:36.200727 env[1099]: time="2024-04-12T18:41:36.200696961Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.3\" returns image reference \"sha256:cb04debcdc824380d7f126f1c68f1232b1df46df89ee213e1e22c917392546db\"" Apr 12 18:41:36.204236 env[1099]: time="2024-04-12T18:41:36.204193417Z" level=info msg="CreateContainer within sandbox \"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Apr 12 18:41:36.208467 kubelet[1972]: I0412 18:41:36.207715 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-79cb8c8f67-j29zs" podStartSLOduration=24.182009039 podStartE2EDuration="26.207672713s" podCreationTimestamp="2024-04-12 18:41:10 +0000 UTC" firstStartedPulling="2024-04-12 18:41:33.08416973 +0000 UTC m=+44.377097436" lastFinishedPulling="2024-04-12 18:41:35.109833404 +0000 UTC m=+46.402761110" observedRunningTime="2024-04-12 18:41:36.187845578 +0000 UTC m=+47.480773284" watchObservedRunningTime="2024-04-12 18:41:36.207672713 +0000 UTC m=+47.500600419" Apr 12 18:41:36.239000 audit[4252]: NETFILTER_CFG table=filter:119 family=2 entries=8 op=nft_register_rule pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:36.239000 audit[4252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffed1fdb70 a2=0 a3=1 items=0 ppid=2139 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.239000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:36.246831 env[1099]: time="2024-04-12T18:41:36.246778243Z" level=info msg="CreateContainer within sandbox \"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"4840452f851dca98b6187afb6cf70a215703123d95039f3d334401491c36d817\"" Apr 12 18:41:36.247479 env[1099]: time="2024-04-12T18:41:36.247420668Z" level=info msg="StartContainer for \"4840452f851dca98b6187afb6cf70a215703123d95039f3d334401491c36d817\"" Apr 12 18:41:36.249000 audit[4252]: NETFILTER_CFG table=nat:120 family=2 entries=56 op=nft_register_chain pid=4252 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:36.249000 audit[4252]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19860 a0=3 a1=ffffed1fdb70 a2=0 a3=1 items=0 ppid=2139 pid=4252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:36.263318 kubelet[1972]: I0412 18:41:36.263151 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-xf8s9" podStartSLOduration=33.26308048 podStartE2EDuration="33.26308048s" podCreationTimestamp="2024-04-12 18:41:03 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-04-12 18:41:36.207559749 +0000 UTC m=+47.500487655" watchObservedRunningTime="2024-04-12 18:41:36.26308048 +0000 UTC m=+47.556008186" Apr 12 18:41:36.273276 systemd[1]: Started cri-containerd-4840452f851dca98b6187afb6cf70a215703123d95039f3d334401491c36d817.scope. Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4009 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343034353266383531646361393862363138376166623663663730 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit: BPF prog-id=189 op=LOAD Apr 12 18:41:36.296000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4009 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343034353266383531646361393862363138376166623663663730 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit: BPF prog-id=190 op=LOAD Apr 12 18:41:36.296000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4009 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343034353266383531646361393862363138376166623663663730 Apr 12 18:41:36.296000 audit: BPF prog-id=190 op=UNLOAD Apr 12 18:41:36.296000 audit: BPF prog-id=189 op=UNLOAD Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { perfmon } for pid=4266 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit[4266]: AVC avc: denied { bpf } for pid=4266 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:36.296000 audit: BPF prog-id=191 op=LOAD Apr 12 18:41:36.296000 audit[4266]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4009 pid=4266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:36.296000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3438343034353266383531646361393862363138376166623663663730 Apr 12 18:41:36.315742 env[1099]: time="2024-04-12T18:41:36.315678737Z" level=info msg="StartContainer for \"4840452f851dca98b6187afb6cf70a215703123d95039f3d334401491c36d817\" returns successfully" Apr 12 18:41:36.318110 env[1099]: time="2024-04-12T18:41:36.318081151Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\"" Apr 12 18:41:36.409320 systemd-networkd[1006]: cali801d0b4fe4b: Gained IPv6LL Apr 12 18:41:37.183884 kubelet[1972]: E0412 18:41:37.183857 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:37.395163 systemd[1]: Started sshd@13-10.0.0.136:22-10.0.0.1:35526.service. Apr 12 18:41:37.394000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:35526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:37.398771 kernel: kauditd_printk_skb: 473 callbacks suppressed Apr 12 18:41:37.398851 kernel: audit: type=1130 audit(1712947297.394:1435): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:35526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:37.437000 audit[4306]: USER_ACCT pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.438414 sshd[4306]: Accepted publickey for core from 10.0.0.1 port 35526 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:37.438000 audit[4306]: CRED_ACQ pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.441791 sshd[4306]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:37.444461 kernel: audit: type=1101 audit(1712947297.437:1436): pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.446527 kernel: audit: type=1103 audit(1712947297.438:1437): pid=4306 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.446569 kernel: audit: type=1006 audit(1712947297.438:1438): pid=4306 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=14 res=1 Apr 12 18:41:37.438000 audit[4306]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0b57150 a2=3 a3=1 items=0 ppid=1 pid=4306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.449812 kernel: audit: type=1300 audit(1712947297.438:1438): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0b57150 a2=3 a3=1 items=0 ppid=1 pid=4306 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.438000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:37.451232 kernel: audit: type=1327 audit(1712947297.438:1438): proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:37.454664 systemd-logind[1083]: New session 14 of user core. Apr 12 18:41:37.454673 systemd[1]: Started session-14.scope. Apr 12 18:41:37.457613 env[1099]: time="2024-04-12T18:41:37.457340448Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:37.458000 audit[4306]: USER_START pid=4306 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.459000 audit[4308]: CRED_ACQ pid=4308 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.466216 kernel: audit: type=1105 audit(1712947297.458:1439): pid=4306 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.466306 kernel: audit: type=1103 audit(1712947297.459:1440): pid=4308 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.466875 env[1099]: time="2024-04-12T18:41:37.466832493Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:37.468397 env[1099]: time="2024-04-12T18:41:37.468368592Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:37.469833 env[1099]: time="2024-04-12T18:41:37.469793407Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:f3c7cf1e4b85038d77b3568a1103d3c5174b07bd4435b22a8891b167ef28a50a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:41:37.470337 env[1099]: time="2024-04-12T18:41:37.470309867Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.3\" returns image reference \"sha256:13500f6d740693374c9b66f167a0c47c5ec1550366636a961a70a22bf3f42146\"" Apr 12 18:41:37.473340 env[1099]: time="2024-04-12T18:41:37.473306982Z" level=info msg="CreateContainer within sandbox \"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Apr 12 18:41:37.486215 env[1099]: time="2024-04-12T18:41:37.486169757Z" level=info msg="CreateContainer within sandbox \"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9019b9a91fce7face651cd4189afe248af0f9375b2bfeffafeb8f2ea539f2f33\"" Apr 12 18:41:37.487577 env[1099]: time="2024-04-12T18:41:37.487546330Z" level=info msg="StartContainer for \"9019b9a91fce7face651cd4189afe248af0f9375b2bfeffafeb8f2ea539f2f33\"" Apr 12 18:41:37.512745 systemd[1]: Started cri-containerd-9019b9a91fce7face651cd4189afe248af0f9375b2bfeffafeb8f2ea539f2f33.scope. Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4009 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.551203 kernel: audit: type=1400 audit(1712947297.544:1441): avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.551265 kernel: audit: type=1300 audit(1712947297.544:1441): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4009 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313962396139316663653766616365363531636434313839616665 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.544000 audit: BPF prog-id=192 op=LOAD Apr 12 18:41:37.544000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4009 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.544000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313962396139316663653766616365363531636434313839616665 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.546000 audit: BPF prog-id=193 op=LOAD Apr 12 18:41:37.546000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4009 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.546000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313962396139316663653766616365363531636434313839616665 Apr 12 18:41:37.550000 audit: BPF prog-id=193 op=UNLOAD Apr 12 18:41:37.550000 audit: BPF prog-id=192 op=UNLOAD Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:41:37.550000 audit: BPF prog-id=194 op=LOAD Apr 12 18:41:37.550000 audit[4316]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4009 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:37.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3930313962396139316663653766616365363531636434313839616665 Apr 12 18:41:37.570236 env[1099]: time="2024-04-12T18:41:37.570187428Z" level=info msg="StartContainer for \"9019b9a91fce7face651cd4189afe248af0f9375b2bfeffafeb8f2ea539f2f33\" returns successfully" Apr 12 18:41:37.592006 sshd[4306]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:37.591000 audit[4306]: USER_END pid=4306 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.591000 audit[4306]: CRED_DISP pid=4306 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:37.594715 systemd[1]: sshd@13-10.0.0.136:22-10.0.0.1:35526.service: Deactivated successfully. Apr 12 18:41:37.593000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.136:22-10.0.0.1:35526 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:37.595147 systemd-logind[1083]: Session 14 logged out. Waiting for processes to exit. Apr 12 18:41:37.595466 systemd[1]: session-14.scope: Deactivated successfully. Apr 12 18:41:37.596046 systemd-logind[1083]: Removed session 14. Apr 12 18:41:37.866671 kubelet[1972]: I0412 18:41:37.866596 1972 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Apr 12 18:41:37.867103 kubelet[1972]: I0412 18:41:37.866808 1972 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Apr 12 18:41:37.966762 systemd[1]: run-containerd-runc-k8s.io-9019b9a91fce7face651cd4189afe248af0f9375b2bfeffafeb8f2ea539f2f33-runc.Xp561w.mount: Deactivated successfully. Apr 12 18:41:38.187083 kubelet[1972]: E0412 18:41:38.186990 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:38.197661 kubelet[1972]: I0412 18:41:38.197625 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-5svdz" podStartSLOduration=25.822424284 podStartE2EDuration="29.197590557s" podCreationTimestamp="2024-04-12 18:41:09 +0000 UTC" firstStartedPulling="2024-04-12 18:41:34.095370962 +0000 UTC m=+45.388298668" lastFinishedPulling="2024-04-12 18:41:37.470537275 +0000 UTC m=+48.763464941" observedRunningTime="2024-04-12 18:41:38.196949693 +0000 UTC m=+49.489877399" watchObservedRunningTime="2024-04-12 18:41:38.197590557 +0000 UTC m=+49.490518263" Apr 12 18:41:42.598674 systemd[1]: Started sshd@14-10.0.0.136:22-10.0.0.1:50872.service. Apr 12 18:41:42.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:42.602679 kernel: kauditd_printk_skb: 44 callbacks suppressed Apr 12 18:41:42.602718 kernel: audit: type=1130 audit(1712947302.597:1450): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:42.635000 audit[4359]: USER_ACCT pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.636712 sshd[4359]: Accepted publickey for core from 10.0.0.1 port 50872 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:42.637898 sshd[4359]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:42.636000 audit[4359]: CRED_ACQ pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.642628 kernel: audit: type=1101 audit(1712947302.635:1451): pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.642666 kernel: audit: type=1103 audit(1712947302.636:1452): pid=4359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.644551 kernel: audit: type=1006 audit(1712947302.636:1453): pid=4359 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Apr 12 18:41:42.636000 audit[4359]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd657ba70 a2=3 a3=1 items=0 ppid=1 pid=4359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:42.647719 kernel: audit: type=1300 audit(1712947302.636:1453): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd657ba70 a2=3 a3=1 items=0 ppid=1 pid=4359 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:42.636000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:42.649130 kernel: audit: type=1327 audit(1712947302.636:1453): proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:42.651191 systemd-logind[1083]: New session 15 of user core. Apr 12 18:41:42.651820 systemd[1]: Started session-15.scope. Apr 12 18:41:42.653000 audit[4359]: USER_START pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.657000 audit[4361]: CRED_ACQ pid=4361 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.661473 kernel: audit: type=1105 audit(1712947302.653:1454): pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.661530 kernel: audit: type=1103 audit(1712947302.657:1455): pid=4361 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.767473 sshd[4359]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:42.767000 audit[4359]: USER_END pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.767000 audit[4359]: CRED_DISP pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.774855 kernel: audit: type=1106 audit(1712947302.767:1456): pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.774928 kernel: audit: type=1104 audit(1712947302.767:1457): pid=4359 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:42.775252 systemd[1]: sshd@14-10.0.0.136:22-10.0.0.1:50872.service: Deactivated successfully. Apr 12 18:41:42.774000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.136:22-10.0.0.1:50872 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:42.776016 systemd[1]: session-15.scope: Deactivated successfully. Apr 12 18:41:42.776551 systemd-logind[1083]: Session 15 logged out. Waiting for processes to exit. Apr 12 18:41:42.777219 systemd-logind[1083]: Removed session 15. Apr 12 18:41:46.024000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=520981 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.024000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.024000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400a632900 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.024000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=4009c35a40 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.024000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.025000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.025000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=74 a1=400a7c4720 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.025000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.025000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009d07ef0 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.025000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.025000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4004bb79e0 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.025000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.035000 audit[1852]: AVC avc: denied { watch } for pid=1852 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=520987 scontext=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.035000 audit[1852]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=4009e00090 a2=fc6 a3=0 items=0 ppid=1675 pid=1852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c710,c876 key=(null) Apr 12 18:41:46.035000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E313336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Apr 12 18:41:46.477000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.477000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=520985 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:41:46.477000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000b925a0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:46.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:46.477000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010e6940 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:41:46.477000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:41:47.772198 systemd[1]: Started sshd@15-10.0.0.136:22-10.0.0.1:50888.service. Apr 12 18:41:47.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:47.773430 kernel: kauditd_printk_skb: 25 callbacks suppressed Apr 12 18:41:47.773468 kernel: audit: type=1130 audit(1712947307.771:1467): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:47.805000 audit[4386]: USER_ACCT pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.807181 sshd[4386]: Accepted publickey for core from 10.0.0.1 port 50888 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:47.808213 sshd[4386]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.806000 audit[4386]: CRED_ACQ pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.811864 systemd-logind[1083]: New session 16 of user core. Apr 12 18:41:47.812584 systemd[1]: Started session-16.scope. Apr 12 18:41:47.812720 kernel: audit: type=1101 audit(1712947307.805:1468): pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.812766 kernel: audit: type=1103 audit(1712947307.806:1469): pid=4386 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.812790 kernel: audit: type=1006 audit(1712947307.806:1470): pid=4386 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Apr 12 18:41:47.806000 audit[4386]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2748d30 a2=3 a3=1 items=0 ppid=1 pid=4386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:47.817440 kernel: audit: type=1300 audit(1712947307.806:1470): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff2748d30 a2=3 a3=1 items=0 ppid=1 pid=4386 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:47.806000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:47.818550 kernel: audit: type=1327 audit(1712947307.806:1470): proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:47.818588 kernel: audit: type=1105 audit(1712947307.815:1471): pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.815000 audit[4386]: USER_START pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.816000 audit[4388]: CRED_ACQ pid=4388 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.824277 kernel: audit: type=1103 audit(1712947307.816:1472): pid=4388 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.927104 sshd[4386]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:47.927000 audit[4386]: USER_END pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.931353 systemd[1]: Started sshd@16-10.0.0.136:22-10.0.0.1:50894.service. Apr 12 18:41:47.927000 audit[4386]: CRED_DISP pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.934424 systemd-logind[1083]: Session 16 logged out. Waiting for processes to exit. Apr 12 18:41:47.934573 systemd[1]: sshd@15-10.0.0.136:22-10.0.0.1:50888.service: Deactivated successfully. Apr 12 18:41:47.935968 kernel: audit: type=1106 audit(1712947307.927:1473): pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.936002 kernel: audit: type=1104 audit(1712947307.927:1474): pid=4386 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:50894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:47.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.136:22-10.0.0.1:50888 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:47.935365 systemd[1]: session-16.scope: Deactivated successfully. Apr 12 18:41:47.936342 systemd-logind[1083]: Removed session 16. Apr 12 18:41:47.966000 audit[4399]: USER_ACCT pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.967362 sshd[4399]: Accepted publickey for core from 10.0.0.1 port 50894 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:47.966000 audit[4399]: CRED_ACQ pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.967000 audit[4399]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc36263a0 a2=3 a3=1 items=0 ppid=1 pid=4399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:47.967000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:47.968422 sshd[4399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:47.972007 systemd-logind[1083]: New session 17 of user core. Apr 12 18:41:47.972462 systemd[1]: Started session-17.scope. Apr 12 18:41:47.974000 audit[4399]: USER_START pid=4399 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:47.975000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.252950 sshd[4399]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:48.253000 audit[4399]: USER_END pid=4399 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.253000 audit[4399]: CRED_DISP pid=4399 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.256639 systemd[1]: Started sshd@17-10.0.0.136:22-10.0.0.1:50910.service. Apr 12 18:41:48.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:50910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.257949 systemd[1]: session-17.scope: Deactivated successfully. Apr 12 18:41:48.258553 systemd-logind[1083]: Session 17 logged out. Waiting for processes to exit. Apr 12 18:41:48.258653 systemd[1]: sshd@16-10.0.0.136:22-10.0.0.1:50894.service: Deactivated successfully. Apr 12 18:41:48.257000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.136:22-10.0.0.1:50894 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:48.259638 systemd-logind[1083]: Removed session 17. Apr 12 18:41:48.291000 audit[4410]: USER_ACCT pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.292515 sshd[4410]: Accepted publickey for core from 10.0.0.1 port 50910 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:48.292000 audit[4410]: CRED_ACQ pid=4410 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.292000 audit[4410]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff30f3f10 a2=3 a3=1 items=0 ppid=1 pid=4410 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:48.292000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:48.293948 sshd[4410]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:48.296902 systemd-logind[1083]: New session 18 of user core. Apr 12 18:41:48.297692 systemd[1]: Started session-18.scope. Apr 12 18:41:48.299000 audit[4410]: USER_START pid=4410 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.301000 audit[4413]: CRED_ACQ pid=4413 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:48.808011 env[1099]: time="2024-04-12T18:41:48.807793248Z" level=info msg="StopPodSandbox for \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\"" Apr 12 18:41:48.808011 env[1099]: time="2024-04-12T18:41:48.807912292Z" level=info msg="TearDown network for sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" successfully" Apr 12 18:41:48.808011 env[1099]: time="2024-04-12T18:41:48.807946174Z" level=info msg="StopPodSandbox for \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" returns successfully" Apr 12 18:41:48.809507 env[1099]: time="2024-04-12T18:41:48.808594155Z" level=info msg="RemovePodSandbox for \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\"" Apr 12 18:41:48.809507 env[1099]: time="2024-04-12T18:41:48.808644437Z" level=info msg="Forcibly stopping sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\"" Apr 12 18:41:48.809507 env[1099]: time="2024-04-12T18:41:48.808717519Z" level=info msg="TearDown network for sandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" successfully" Apr 12 18:41:48.834424 env[1099]: time="2024-04-12T18:41:48.834384540Z" level=info msg="RemovePodSandbox \"e224bf67c577568be731c931fce938c8511561c725f60c8fcb8ff339b2c9ddf6\" returns successfully" Apr 12 18:41:48.835068 env[1099]: time="2024-04-12T18:41:48.835038802Z" level=info msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.890 [WARNING][4443] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--9kglg-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0154281d-3fde-47d9-89e8-3cea82f840e1", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685", Pod:"coredns-76f75df574-9kglg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ef467587d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.890 [INFO][4443] k8s.go 585: Cleaning up netns ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.890 [INFO][4443] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" iface="eth0" netns="" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.890 [INFO][4443] k8s.go 592: Releasing IP address(es) ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.890 [INFO][4443] utils.go 188: Calico CNI releasing IP address ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.913 [INFO][4451] ipam_plugin.go 415: Releasing address using handleID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.913 [INFO][4451] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.913 [INFO][4451] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.921 [WARNING][4451] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.921 [INFO][4451] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.923 [INFO][4451] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:48.927625 env[1099]: 2024-04-12 18:41:48.926 [INFO][4443] k8s.go 598: Teardown processing complete. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:48.928159 env[1099]: time="2024-04-12T18:41:48.928104761Z" level=info msg="TearDown network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" successfully" Apr 12 18:41:48.928236 env[1099]: time="2024-04-12T18:41:48.928219644Z" level=info msg="StopPodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" returns successfully" Apr 12 18:41:48.928770 env[1099]: time="2024-04-12T18:41:48.928734902Z" level=info msg="RemovePodSandbox for \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" Apr 12 18:41:48.928834 env[1099]: time="2024-04-12T18:41:48.928773703Z" level=info msg="Forcibly stopping sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\"" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.014 [WARNING][4475] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--9kglg-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"0154281d-3fde-47d9-89e8-3cea82f840e1", ResourceVersion:"963", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"028040a5f992f3cffbb18f0fa0ef5933116c47a9b074fcc1eab7a8dd53f09685", Pod:"coredns-76f75df574-9kglg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali8ef467587d2", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.015 [INFO][4475] k8s.go 585: Cleaning up netns ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.015 [INFO][4475] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" iface="eth0" netns="" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.015 [INFO][4475] k8s.go 592: Releasing IP address(es) ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.015 [INFO][4475] utils.go 188: Calico CNI releasing IP address ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.033 [INFO][4485] ipam_plugin.go 415: Releasing address using handleID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.033 [INFO][4485] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.033 [INFO][4485] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.042 [WARNING][4485] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.042 [INFO][4485] ipam_plugin.go 443: Releasing address using workloadID ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" HandleID="k8s-pod-network.d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Workload="localhost-k8s-coredns--76f75df574--9kglg-eth0" Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.043 [INFO][4485] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.047304 env[1099]: 2024-04-12 18:41:49.045 [INFO][4475] k8s.go 598: Teardown processing complete. ContainerID="d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6" Apr 12 18:41:49.047738 env[1099]: time="2024-04-12T18:41:49.047335663Z" level=info msg="TearDown network for sandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" successfully" Apr 12 18:41:49.052054 env[1099]: time="2024-04-12T18:41:49.052016018Z" level=info msg="RemovePodSandbox \"d74c7161c1587e1ec9baee3731e617f47072a32c1004e663479b88784b3371b6\" returns successfully" Apr 12 18:41:49.052744 env[1099]: time="2024-04-12T18:41:49.052699921Z" level=info msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.087 [WARNING][4507] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--xf8s9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26", Pod:"coredns-76f75df574-xf8s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali801d0b4fe4b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.087 [INFO][4507] k8s.go 585: Cleaning up netns ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.087 [INFO][4507] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" iface="eth0" netns="" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.087 [INFO][4507] k8s.go 592: Releasing IP address(es) ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.087 [INFO][4507] utils.go 188: Calico CNI releasing IP address ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.105 [INFO][4514] ipam_plugin.go 415: Releasing address using handleID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.105 [INFO][4514] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.105 [INFO][4514] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.114 [WARNING][4514] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.114 [INFO][4514] ipam_plugin.go 443: Releasing address using workloadID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.115 [INFO][4514] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.120278 env[1099]: 2024-04-12 18:41:49.117 [INFO][4507] k8s.go 598: Teardown processing complete. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.120278 env[1099]: time="2024-04-12T18:41:49.120249444Z" level=info msg="TearDown network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" successfully" Apr 12 18:41:49.120714 env[1099]: time="2024-04-12T18:41:49.120285526Z" level=info msg="StopPodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" returns successfully" Apr 12 18:41:49.123518 env[1099]: time="2024-04-12T18:41:49.123487512Z" level=info msg="RemovePodSandbox for \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" Apr 12 18:41:49.123655 env[1099]: time="2024-04-12T18:41:49.123607756Z" level=info msg="Forcibly stopping sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\"" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.156 [WARNING][4537] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--xf8s9-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"5258b256-aa24-4f1c-bf5b-e0c3b5eeb64c", ResourceVersion:"1005", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"7317e609492a8f46ba177ed5e333e6074214be205803a097d68f475544c82d26", Pod:"coredns-76f75df574-xf8s9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali801d0b4fe4b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.156 [INFO][4537] k8s.go 585: Cleaning up netns ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.156 [INFO][4537] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" iface="eth0" netns="" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.156 [INFO][4537] k8s.go 592: Releasing IP address(es) ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.156 [INFO][4537] utils.go 188: Calico CNI releasing IP address ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.174 [INFO][4545] ipam_plugin.go 415: Releasing address using handleID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.174 [INFO][4545] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.175 [INFO][4545] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.184 [WARNING][4545] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.184 [INFO][4545] ipam_plugin.go 443: Releasing address using workloadID ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" HandleID="k8s-pod-network.36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Workload="localhost-k8s-coredns--76f75df574--xf8s9-eth0" Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.185 [INFO][4545] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.188783 env[1099]: 2024-04-12 18:41:49.187 [INFO][4537] k8s.go 598: Teardown processing complete. ContainerID="36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968" Apr 12 18:41:49.189255 env[1099]: time="2024-04-12T18:41:49.188812722Z" level=info msg="TearDown network for sandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" successfully" Apr 12 18:41:49.191685 env[1099]: time="2024-04-12T18:41:49.191655016Z" level=info msg="RemovePodSandbox \"36251fdf6f04f0288d8ba21c8e5be9752fbfe7169be62f28e64314bc5aec9968\" returns successfully" Apr 12 18:41:49.192113 env[1099]: time="2024-04-12T18:41:49.192084870Z" level=info msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.225 [WARNING][4568] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5svdz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9eed1024-4e4e-488d-b42b-1302198d0850", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f", Pod:"csi-node-driver-5svdz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad39b181f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.226 [INFO][4568] k8s.go 585: Cleaning up netns ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.226 [INFO][4568] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" iface="eth0" netns="" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.226 [INFO][4568] k8s.go 592: Releasing IP address(es) ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.226 [INFO][4568] utils.go 188: Calico CNI releasing IP address ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.262 [INFO][4575] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.262 [INFO][4575] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.262 [INFO][4575] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.272 [WARNING][4575] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.272 [INFO][4575] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.273 [INFO][4575] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.276281 env[1099]: 2024-04-12 18:41:49.275 [INFO][4568] k8s.go 598: Teardown processing complete. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.276724 env[1099]: time="2024-04-12T18:41:49.276309348Z" level=info msg="TearDown network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" successfully" Apr 12 18:41:49.276724 env[1099]: time="2024-04-12T18:41:49.276340589Z" level=info msg="StopPodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" returns successfully" Apr 12 18:41:49.276958 env[1099]: time="2024-04-12T18:41:49.276929488Z" level=info msg="RemovePodSandbox for \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" Apr 12 18:41:49.277127 env[1099]: time="2024-04-12T18:41:49.277070533Z" level=info msg="Forcibly stopping sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\"" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.315 [WARNING][4597] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--5svdz-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"9eed1024-4e4e-488d-b42b-1302198d0850", ResourceVersion:"1033", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 9, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"64699887c5", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"1fed19353fbe8053e2510fa0d012fc26f13410e79922fcc269c15c79985bec9f", Pod:"csi-node-driver-5svdz", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"caliad39b181f8d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.315 [INFO][4597] k8s.go 585: Cleaning up netns ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.315 [INFO][4597] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" iface="eth0" netns="" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.315 [INFO][4597] k8s.go 592: Releasing IP address(es) ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.315 [INFO][4597] utils.go 188: Calico CNI releasing IP address ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.365 [INFO][4605] ipam_plugin.go 415: Releasing address using handleID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.365 [INFO][4605] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.365 [INFO][4605] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.384 [WARNING][4605] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.384 [INFO][4605] ipam_plugin.go 443: Releasing address using workloadID ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" HandleID="k8s-pod-network.3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Workload="localhost-k8s-csi--node--driver--5svdz-eth0" Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.386 [INFO][4605] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.389917 env[1099]: 2024-04-12 18:41:49.388 [INFO][4597] k8s.go 598: Teardown processing complete. ContainerID="3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05" Apr 12 18:41:49.390442 env[1099]: time="2024-04-12T18:41:49.390395177Z" level=info msg="TearDown network for sandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" successfully" Apr 12 18:41:49.393694 env[1099]: time="2024-04-12T18:41:49.393649005Z" level=info msg="RemovePodSandbox \"3f847f1ca499fe90995d41389a7db19ea06eca3b3bd8fd9fa348b26ab0aa3c05\" returns successfully" Apr 12 18:41:49.394425 env[1099]: time="2024-04-12T18:41:49.394396870Z" level=info msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.446 [WARNING][4627] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0", GenerateName:"calico-kube-controllers-79cb8c8f67-", Namespace:"calico-system", SelfLink:"", UID:"53c95e4d-f2d4-4add-8000-570ea0ed1825", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79cb8c8f67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e", Pod:"calico-kube-controllers-79cb8c8f67-j29zs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia1d9691659b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.446 [INFO][4627] k8s.go 585: Cleaning up netns ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.446 [INFO][4627] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" iface="eth0" netns="" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.446 [INFO][4627] k8s.go 592: Releasing IP address(es) ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.446 [INFO][4627] utils.go 188: Calico CNI releasing IP address ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.466 [INFO][4635] ipam_plugin.go 415: Releasing address using handleID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.466 [INFO][4635] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.466 [INFO][4635] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.476 [WARNING][4635] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.476 [INFO][4635] ipam_plugin.go 443: Releasing address using workloadID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.478 [INFO][4635] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.481466 env[1099]: 2024-04-12 18:41:49.479 [INFO][4627] k8s.go 598: Teardown processing complete. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.482055 env[1099]: time="2024-04-12T18:41:49.482008300Z" level=info msg="TearDown network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" successfully" Apr 12 18:41:49.482156 env[1099]: time="2024-04-12T18:41:49.482113383Z" level=info msg="StopPodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" returns successfully" Apr 12 18:41:49.482724 env[1099]: time="2024-04-12T18:41:49.482695323Z" level=info msg="RemovePodSandbox for \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" Apr 12 18:41:49.482791 env[1099]: time="2024-04-12T18:41:49.482733924Z" level=info msg="Forcibly stopping sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\"" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.536 [WARNING][4659] k8s.go 549: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0", GenerateName:"calico-kube-controllers-79cb8c8f67-", Namespace:"calico-system", SelfLink:"", UID:"53c95e4d-f2d4-4add-8000-570ea0ed1825", ResourceVersion:"1011", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 41, 10, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"79cb8c8f67", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"9a2d539b5ec651588915b4bb0d728ce505335f53d1caddda43aa419c1a7fcf9e", Pod:"calico-kube-controllers-79cb8c8f67-j29zs", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calia1d9691659b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.536 [INFO][4659] k8s.go 585: Cleaning up netns ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.536 [INFO][4659] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" iface="eth0" netns="" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.536 [INFO][4659] k8s.go 592: Releasing IP address(es) ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.536 [INFO][4659] utils.go 188: Calico CNI releasing IP address ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.555 [INFO][4667] ipam_plugin.go 415: Releasing address using handleID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.556 [INFO][4667] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.556 [INFO][4667] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.564 [WARNING][4667] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.564 [INFO][4667] ipam_plugin.go 443: Releasing address using workloadID ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" HandleID="k8s-pod-network.92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Workload="localhost-k8s-calico--kube--controllers--79cb8c8f67--j29zs-eth0" Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.565 [INFO][4667] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:41:49.569564 env[1099]: 2024-04-12 18:41:49.567 [INFO][4659] k8s.go 598: Teardown processing complete. ContainerID="92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08" Apr 12 18:41:49.570009 env[1099]: time="2024-04-12T18:41:49.569592929Z" level=info msg="TearDown network for sandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" successfully" Apr 12 18:41:49.581882 env[1099]: time="2024-04-12T18:41:49.581828855Z" level=info msg="RemovePodSandbox \"92dc3d2aba6f977a6390e2fa6a7b0a516d4c8b09801f3639e505ed0360f4fd08\" returns successfully" Apr 12 18:41:49.582392 env[1099]: time="2024-04-12T18:41:49.582348113Z" level=info msg="StopPodSandbox for \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\"" Apr 12 18:41:49.582480 env[1099]: time="2024-04-12T18:41:49.582437996Z" level=info msg="TearDown network for sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" successfully" Apr 12 18:41:49.582480 env[1099]: time="2024-04-12T18:41:49.582474597Z" level=info msg="StopPodSandbox for \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" returns successfully" Apr 12 18:41:49.582832 env[1099]: time="2024-04-12T18:41:49.582782167Z" level=info msg="RemovePodSandbox for \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\"" Apr 12 18:41:49.582926 env[1099]: time="2024-04-12T18:41:49.582828729Z" level=info msg="Forcibly stopping sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\"" Apr 12 18:41:49.582985 env[1099]: time="2024-04-12T18:41:49.582922412Z" level=info msg="TearDown network for sandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" successfully" Apr 12 18:41:49.585770 env[1099]: time="2024-04-12T18:41:49.585734505Z" level=info msg="RemovePodSandbox \"5733585b0560377d5a4260a109db70bad78a2d37dc448223667c60e308aafe03\" returns successfully" Apr 12 18:41:49.741000 audit[4676]: NETFILTER_CFG table=filter:121 family=2 entries=20 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:49.741000 audit[4676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffc922d920 a2=0 a3=1 items=0 ppid=2139 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:49.741000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:49.742000 audit[4676]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4676 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:49.742000 audit[4676]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffc922d920 a2=0 a3=1 items=0 ppid=2139 pid=4676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:49.742000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:49.762734 sshd[4410]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:49.763000 audit[4410]: USER_END pid=4410 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:49.763000 audit[4410]: CRED_DISP pid=4410 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:49.766399 systemd[1]: Started sshd@18-10.0.0.136:22-10.0.0.1:51810.service. Apr 12 18:41:49.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:51810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:49.766979 systemd[1]: sshd@17-10.0.0.136:22-10.0.0.1:50910.service: Deactivated successfully. Apr 12 18:41:49.766000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.136:22-10.0.0.1:50910 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:49.767818 systemd[1]: session-18.scope: Deactivated successfully. Apr 12 18:41:49.771349 systemd-logind[1083]: Session 18 logged out. Waiting for processes to exit. Apr 12 18:41:49.772816 systemd-logind[1083]: Removed session 18. Apr 12 18:41:49.773000 audit[4681]: NETFILTER_CFG table=filter:123 family=2 entries=32 op=nft_register_rule pid=4681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:49.773000 audit[4681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffff685170 a2=0 a3=1 items=0 ppid=2139 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:49.773000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:49.774000 audit[4681]: NETFILTER_CFG table=nat:124 family=2 entries=20 op=nft_register_rule pid=4681 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:49.774000 audit[4681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5772 a0=3 a1=ffffff685170 a2=0 a3=1 items=0 ppid=2139 pid=4681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:49.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:49.805217 sshd[4679]: Accepted publickey for core from 10.0.0.1 port 51810 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:49.804000 audit[4679]: USER_ACCT pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:49.806491 sshd[4679]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:49.805000 audit[4679]: CRED_ACQ pid=4679 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:49.805000 audit[4679]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc6ae310 a2=3 a3=1 items=0 ppid=1 pid=4679 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:49.805000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:49.809932 systemd-logind[1083]: New session 19 of user core. Apr 12 18:41:49.810800 systemd[1]: Started session-19.scope. Apr 12 18:41:49.813000 audit[4679]: USER_START pid=4679 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:49.814000 audit[4683]: CRED_ACQ pid=4683 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.018941 sshd[4679]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:50.018000 audit[4679]: USER_END pid=4679 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.018000 audit[4679]: CRED_DISP pid=4679 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.022791 systemd[1]: Started sshd@19-10.0.0.136:22-10.0.0.1:51816.service. Apr 12 18:41:50.023378 systemd[1]: sshd@18-10.0.0.136:22-10.0.0.1:51810.service: Deactivated successfully. Apr 12 18:41:50.024621 systemd[1]: session-19.scope: Deactivated successfully. Apr 12 18:41:50.021000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:51816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:50.022000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.136:22-10.0.0.1:51810 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:50.026231 systemd-logind[1083]: Session 19 logged out. Waiting for processes to exit. Apr 12 18:41:50.027296 systemd-logind[1083]: Removed session 19. Apr 12 18:41:50.055000 audit[4692]: USER_ACCT pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.056773 sshd[4692]: Accepted publickey for core from 10.0.0.1 port 51816 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:50.056000 audit[4692]: CRED_ACQ pid=4692 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.056000 audit[4692]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0ce9b50 a2=3 a3=1 items=0 ppid=1 pid=4692 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:50.056000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:50.058243 sshd[4692]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:50.061755 systemd-logind[1083]: New session 20 of user core. Apr 12 18:41:50.062332 systemd[1]: Started session-20.scope. Apr 12 18:41:50.064000 audit[4692]: USER_START pid=4692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.065000 audit[4695]: CRED_ACQ pid=4695 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.177562 sshd[4692]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:50.177000 audit[4692]: USER_END pid=4692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.177000 audit[4692]: CRED_DISP pid=4692 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:50.181612 systemd[1]: sshd@19-10.0.0.136:22-10.0.0.1:51816.service: Deactivated successfully. Apr 12 18:41:50.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.136:22-10.0.0.1:51816 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:50.182368 systemd[1]: session-20.scope: Deactivated successfully. Apr 12 18:41:50.183075 systemd-logind[1083]: Session 20 logged out. Waiting for processes to exit. Apr 12 18:41:50.183804 systemd-logind[1083]: Removed session 20. Apr 12 18:41:54.615000 audit[4726]: NETFILTER_CFG table=filter:125 family=2 entries=20 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:54.618653 kernel: kauditd_printk_skb: 57 callbacks suppressed Apr 12 18:41:54.618728 kernel: audit: type=1325 audit(1712947314.615:1516): table=filter:125 family=2 entries=20 op=nft_register_rule pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:54.618755 kernel: audit: type=1300 audit(1712947314.615:1516): arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdf3d9d60 a2=0 a3=1 items=0 ppid=2139 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:54.615000 audit[4726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdf3d9d60 a2=0 a3=1 items=0 ppid=2139 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:54.615000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:54.623811 kernel: audit: type=1327 audit(1712947314.615:1516): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:54.616000 audit[4726]: NETFILTER_CFG table=nat:126 family=2 entries=104 op=nft_register_chain pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:54.616000 audit[4726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffdf3d9d60 a2=0 a3=1 items=0 ppid=2139 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:54.638822 kernel: audit: type=1325 audit(1712947314.616:1517): table=nat:126 family=2 entries=104 op=nft_register_chain pid=4726 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:41:54.638893 kernel: audit: type=1300 audit(1712947314.616:1517): arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffdf3d9d60 a2=0 a3=1 items=0 ppid=2139 pid=4726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:54.638914 kernel: audit: type=1327 audit(1712947314.616:1517): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:54.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:41:55.181574 systemd[1]: Started sshd@20-10.0.0.136:22-10.0.0.1:51818.service. Apr 12 18:41:55.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:55.185150 kernel: audit: type=1130 audit(1712947315.180:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:55.213000 audit[4731]: USER_ACCT pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.214259 sshd[4731]: Accepted publickey for core from 10.0.0.1 port 51818 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:41:55.215390 sshd[4731]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:41:55.213000 audit[4731]: CRED_ACQ pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.219293 systemd[1]: Started session-21.scope. Apr 12 18:41:55.219864 kernel: audit: type=1101 audit(1712947315.213:1519): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.219897 kernel: audit: type=1103 audit(1712947315.213:1520): pid=4731 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.219912 kernel: audit: type=1006 audit(1712947315.213:1521): pid=4731 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=21 res=1 Apr 12 18:41:55.219434 systemd-logind[1083]: New session 21 of user core. Apr 12 18:41:55.213000 audit[4731]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0d4c140 a2=3 a3=1 items=0 ppid=1 pid=4731 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:41:55.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:41:55.223000 audit[4731]: USER_START pid=4731 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.224000 audit[4733]: CRED_ACQ pid=4733 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.325769 sshd[4731]: pam_unix(sshd:session): session closed for user core Apr 12 18:41:55.325000 audit[4731]: USER_END pid=4731 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.325000 audit[4731]: CRED_DISP pid=4731 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:41:55.328430 systemd[1]: sshd@20-10.0.0.136:22-10.0.0.1:51818.service: Deactivated successfully. Apr 12 18:41:55.329266 systemd[1]: session-21.scope: Deactivated successfully. Apr 12 18:41:55.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.0.0.136:22-10.0.0.1:51818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:41:55.329778 systemd-logind[1083]: Session 21 logged out. Waiting for processes to exit. Apr 12 18:41:55.330482 systemd-logind[1083]: Removed session 21. Apr 12 18:41:57.917792 kubelet[1972]: E0412 18:41:57.917763 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:41:58.817794 kubelet[1972]: E0412 18:41:58.817755 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:00.330345 systemd[1]: Started sshd@21-10.0.0.136:22-10.0.0.1:34654.service. Apr 12 18:42:00.329000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:34654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.331159 kernel: kauditd_printk_skb: 7 callbacks suppressed Apr 12 18:42:00.331214 kernel: audit: type=1130 audit(1712947320.329:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:34654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:00.361000 audit[4772]: USER_ACCT pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.363099 sshd[4772]: Accepted publickey for core from 10.0.0.1 port 34654 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:42:00.364150 sshd[4772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:00.362000 audit[4772]: CRED_ACQ pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.369449 kernel: audit: type=1101 audit(1712947320.361:1528): pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.369501 kernel: audit: type=1103 audit(1712947320.362:1529): pid=4772 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.369517 kernel: audit: type=1006 audit(1712947320.362:1530): pid=4772 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Apr 12 18:42:00.370174 systemd-logind[1083]: New session 22 of user core. Apr 12 18:42:00.370571 systemd[1]: Started session-22.scope. Apr 12 18:42:00.362000 audit[4772]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffceb77a80 a2=3 a3=1 items=0 ppid=1 pid=4772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:00.374247 kernel: audit: type=1300 audit(1712947320.362:1530): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffceb77a80 a2=3 a3=1 items=0 ppid=1 pid=4772 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:00.362000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:00.375444 kernel: audit: type=1327 audit(1712947320.362:1530): proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:00.375541 kernel: audit: type=1105 audit(1712947320.373:1531): pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.373000 audit[4772]: USER_START pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.374000 audit[4774]: CRED_ACQ pid=4774 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.381811 kernel: audit: type=1103 audit(1712947320.374:1532): pid=4774 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.475459 sshd[4772]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:00.475000 audit[4772]: USER_END pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.478143 systemd-logind[1083]: Session 22 logged out. Waiting for processes to exit. Apr 12 18:42:00.478295 systemd[1]: sshd@21-10.0.0.136:22-10.0.0.1:34654.service: Deactivated successfully. Apr 12 18:42:00.479029 systemd[1]: session-22.scope: Deactivated successfully. Apr 12 18:42:00.479700 systemd-logind[1083]: Removed session 22. Apr 12 18:42:00.475000 audit[4772]: CRED_DISP pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.482519 kernel: audit: type=1106 audit(1712947320.475:1533): pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.482565 kernel: audit: type=1104 audit(1712947320.475:1534): pid=4772 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:00.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.0.0.136:22-10.0.0.1:34654 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:02.336000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:02.336000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40023bfba0 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:42:02.336000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:02.337000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:02.337000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40021ecb60 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:42:02.337000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:02.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:02.337000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002166920 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:42:02.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:02.337000 audit[1840]: AVC avc: denied { watch } for pid=1840 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Apr 12 18:42:02.337000 audit[1840]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40021ecb80 a2=fc6 a3=0 items=0 ppid=1712 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c768 key=(null) Apr 12 18:42:02.337000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Apr 12 18:42:03.846000 audit[4786]: NETFILTER_CFG table=filter:127 family=2 entries=9 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:03.846000 audit[4786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd52740c0 a2=0 a3=1 items=0 ppid=2139 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:03.846000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:03.848000 audit[4786]: NETFILTER_CFG table=nat:128 family=2 entries=44 op=nft_register_rule pid=4786 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:03.848000 audit[4786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffd52740c0 a2=0 a3=1 items=0 ppid=2139 pid=4786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:03.848000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:03.853657 kubelet[1972]: I0412 18:42:03.853607 1972 topology_manager.go:215] "Topology Admit Handler" podUID="d79601e3-4a3c-4bdb-9f5e-61ff34416d1c" podNamespace="calico-apiserver" podName="calico-apiserver-5bff4c45b9-xsjn5" Apr 12 18:42:03.858609 systemd[1]: Created slice kubepods-besteffort-podd79601e3_4a3c_4bdb_9f5e_61ff34416d1c.slice. Apr 12 18:42:03.867238 kubelet[1972]: I0412 18:42:03.867202 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d79601e3-4a3c-4bdb-9f5e-61ff34416d1c-calico-apiserver-certs\") pod \"calico-apiserver-5bff4c45b9-xsjn5\" (UID: \"d79601e3-4a3c-4bdb-9f5e-61ff34416d1c\") " pod="calico-apiserver/calico-apiserver-5bff4c45b9-xsjn5" Apr 12 18:42:03.867359 kubelet[1972]: I0412 18:42:03.867254 1972 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jpjp8\" (UniqueName: \"kubernetes.io/projected/d79601e3-4a3c-4bdb-9f5e-61ff34416d1c-kube-api-access-jpjp8\") pod \"calico-apiserver-5bff4c45b9-xsjn5\" (UID: \"d79601e3-4a3c-4bdb-9f5e-61ff34416d1c\") " pod="calico-apiserver/calico-apiserver-5bff4c45b9-xsjn5" Apr 12 18:42:03.874000 audit[4788]: NETFILTER_CFG table=filter:129 family=2 entries=10 op=nft_register_rule pid=4788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:03.874000 audit[4788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffdcb2cee0 a2=0 a3=1 items=0 ppid=2139 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:03.874000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:03.875000 audit[4788]: NETFILTER_CFG table=nat:130 family=2 entries=44 op=nft_register_rule pid=4788 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:03.875000 audit[4788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffdcb2cee0 a2=0 a3=1 items=0 ppid=2139 pid=4788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:03.875000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:03.968761 kubelet[1972]: E0412 18:42:03.968721 1972 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Apr 12 18:42:03.970156 kubelet[1972]: E0412 18:42:03.969032 1972 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/d79601e3-4a3c-4bdb-9f5e-61ff34416d1c-calico-apiserver-certs podName:d79601e3-4a3c-4bdb-9f5e-61ff34416d1c nodeName:}" failed. No retries permitted until 2024-04-12 18:42:04.468785853 +0000 UTC m=+75.761713559 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/d79601e3-4a3c-4bdb-9f5e-61ff34416d1c-calico-apiserver-certs") pod "calico-apiserver-5bff4c45b9-xsjn5" (UID: "d79601e3-4a3c-4bdb-9f5e-61ff34416d1c") : secret "calico-apiserver-certs" not found Apr 12 18:42:04.762193 env[1099]: time="2024-04-12T18:42:04.761824634Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bff4c45b9-xsjn5,Uid:d79601e3-4a3c-4bdb-9f5e-61ff34416d1c,Namespace:calico-apiserver,Attempt:0,}" Apr 12 18:42:04.883088 systemd-networkd[1006]: cali25a59e98130: Link UP Apr 12 18:42:04.887527 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Apr 12 18:42:04.887629 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali25a59e98130: link becomes ready Apr 12 18:42:04.887787 systemd-networkd[1006]: cali25a59e98130: Gained carrier Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.814 [INFO][4793] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0 calico-apiserver-5bff4c45b9- calico-apiserver d79601e3-4a3c-4bdb-9f5e-61ff34416d1c 1208 0 2024-04-12 18:42:03 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:5bff4c45b9 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s localhost calico-apiserver-5bff4c45b9-xsjn5 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali25a59e98130 [] []}} ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.814 [INFO][4793] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.842 [INFO][4807] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" HandleID="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Workload="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.854 [INFO][4807] ipam_plugin.go 268: Auto assigning IP ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" HandleID="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Workload="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002ab7e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"localhost", "pod":"calico-apiserver-5bff4c45b9-xsjn5", "timestamp":"2024-04-12 18:42:04.84206485 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.854 [INFO][4807] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.854 [INFO][4807] ipam_plugin.go 371: Acquired host-wide IPAM lock. Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.854 [INFO][4807] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.856 [INFO][4807] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.859 [INFO][4807] ipam.go 372: Looking up existing affinities for host host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.862 [INFO][4807] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.864 [INFO][4807] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.866 [INFO][4807] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.866 [INFO][4807] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.868 [INFO][4807] ipam.go 1682: Creating new handle: k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6 Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.871 [INFO][4807] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.877 [INFO][4807] ipam.go 1216: Successfully claimed IPs: [192.168.88.133/26] block=192.168.88.128/26 handle="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.877 [INFO][4807] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.133/26] handle="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" host="localhost" Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.877 [INFO][4807] ipam_plugin.go 377: Released host-wide IPAM lock. Apr 12 18:42:04.902970 env[1099]: 2024-04-12 18:42:04.877 [INFO][4807] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.88.133/26] IPv6=[] ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" HandleID="k8s-pod-network.fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Workload="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.879 [INFO][4793] k8s.go 385: Populated endpoint ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0", GenerateName:"calico-apiserver-5bff4c45b9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d79601e3-4a3c-4bdb-9f5e-61ff34416d1c", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bff4c45b9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-apiserver-5bff4c45b9-xsjn5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali25a59e98130", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.879 [INFO][4793] k8s.go 386: Calico CNI using IPs: [192.168.88.133/32] ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.879 [INFO][4793] dataplane_linux.go 68: Setting the host side veth name to cali25a59e98130 ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.884 [INFO][4793] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.888 [INFO][4793] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0", GenerateName:"calico-apiserver-5bff4c45b9-", Namespace:"calico-apiserver", SelfLink:"", UID:"d79601e3-4a3c-4bdb-9f5e-61ff34416d1c", ResourceVersion:"1208", Generation:0, CreationTimestamp:time.Date(2024, time.April, 12, 18, 42, 3, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"5bff4c45b9", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6", Pod:"calico-apiserver-5bff4c45b9-xsjn5", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.88.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali25a59e98130", MAC:"c6:77:66:f9:11:f8", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Apr 12 18:42:04.903638 env[1099]: 2024-04-12 18:42:04.894 [INFO][4793] k8s.go 498: Wrote updated endpoint to datastore ContainerID="fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6" Namespace="calico-apiserver" Pod="calico-apiserver-5bff4c45b9-xsjn5" WorkloadEndpoint="localhost-k8s-calico--apiserver--5bff4c45b9--xsjn5-eth0" Apr 12 18:42:04.918000 audit[4838]: NETFILTER_CFG table=filter:131 family=2 entries=51 op=nft_register_chain pid=4838 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Apr 12 18:42:04.918000 audit[4838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=27732 a0=3 a1=fffff39ff7b0 a2=0 a3=ffffbf16cfa8 items=0 ppid=3382 pid=4838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.918000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Apr 12 18:42:04.923887 env[1099]: time="2024-04-12T18:42:04.923823345Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Apr 12 18:42:04.923887 env[1099]: time="2024-04-12T18:42:04.923868025Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Apr 12 18:42:04.923887 env[1099]: time="2024-04-12T18:42:04.923878545Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Apr 12 18:42:04.925394 env[1099]: time="2024-04-12T18:42:04.924162664Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6 pid=4843 runtime=io.containerd.runc.v2 Apr 12 18:42:04.939170 systemd[1]: Started cri-containerd-fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6.scope. Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit: BPF prog-id=195 op=LOAD Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663346437303232306439333965373930333865353036396332346138 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663346437303232306439333965373930333865353036396332346138 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit: BPF prog-id=196 op=LOAD Apr 12 18:42:04.958000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663346437303232306439333965373930333865353036396332346138 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit: BPF prog-id=197 op=LOAD Apr 12 18:42:04.958000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663346437303232306439333965373930333865353036396332346138 Apr 12 18:42:04.958000 audit: BPF prog-id=197 op=UNLOAD Apr 12 18:42:04.958000 audit: BPF prog-id=196 op=UNLOAD Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { perfmon } for pid=4853 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit[4853]: AVC avc: denied { bpf } for pid=4853 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:04.958000 audit: BPF prog-id=198 op=LOAD Apr 12 18:42:04.958000 audit[4853]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4843 pid=4853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:04.958000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663346437303232306439333965373930333865353036396332346138 Apr 12 18:42:04.961074 systemd-resolved[1040]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Apr 12 18:42:04.977890 env[1099]: time="2024-04-12T18:42:04.977850862Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-5bff4c45b9-xsjn5,Uid:d79601e3-4a3c-4bdb-9f5e-61ff34416d1c,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6\"" Apr 12 18:42:04.979680 env[1099]: time="2024-04-12T18:42:04.979646540Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\"" Apr 12 18:42:05.480420 systemd[1]: Started sshd@22-10.0.0.136:22-10.0.0.1:34668.service. Apr 12 18:42:05.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:34668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:05.481630 kernel: kauditd_printk_skb: 85 callbacks suppressed Apr 12 18:42:05.481735 kernel: audit: type=1130 audit(1712947325.479:1563): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:34668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:05.514000 audit[4877]: USER_ACCT pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.517718 sshd[4877]: Accepted publickey for core from 10.0.0.1 port 34668 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:42:05.517861 sshd[4877]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:05.516000 audit[4877]: CRED_ACQ pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.522956 kernel: audit: type=1101 audit(1712947325.514:1564): pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.523019 kernel: audit: type=1103 audit(1712947325.516:1565): pid=4877 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.525323 kernel: audit: type=1006 audit(1712947325.516:1566): pid=4877 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Apr 12 18:42:05.516000 audit[4877]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc29ab5a0 a2=3 a3=1 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:05.528742 kernel: audit: type=1300 audit(1712947325.516:1566): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc29ab5a0 a2=3 a3=1 items=0 ppid=1 pid=4877 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:05.516000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:05.529871 kernel: audit: type=1327 audit(1712947325.516:1566): proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:05.531064 systemd-logind[1083]: New session 23 of user core. Apr 12 18:42:05.531912 systemd[1]: Started session-23.scope. Apr 12 18:42:05.535000 audit[4877]: USER_START pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.542886 kernel: audit: type=1105 audit(1712947325.535:1567): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.542972 kernel: audit: type=1103 audit(1712947325.541:1568): pid=4879 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.541000 audit[4879]: CRED_ACQ pid=4879 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.649542 sshd[4877]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:05.649000 audit[4877]: USER_END pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.652778 systemd[1]: sshd@22-10.0.0.136:22-10.0.0.1:34668.service: Deactivated successfully. Apr 12 18:42:05.653524 systemd[1]: session-23.scope: Deactivated successfully. Apr 12 18:42:05.653865 systemd-logind[1083]: Session 23 logged out. Waiting for processes to exit. Apr 12 18:42:05.650000 audit[4877]: CRED_DISP pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.654474 systemd-logind[1083]: Removed session 23. Apr 12 18:42:05.656882 kernel: audit: type=1106 audit(1712947325.649:1569): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.656944 kernel: audit: type=1104 audit(1712947325.650:1570): pid=4877 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:05.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.0.0.136:22-10.0.0.1:34668 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:05.901856 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3361754644.mount: Deactivated successfully. Apr 12 18:42:06.425584 systemd-networkd[1006]: cali25a59e98130: Gained IPv6LL Apr 12 18:42:07.225282 env[1099]: time="2024-04-12T18:42:07.225233252Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:07.226640 env[1099]: time="2024-04-12T18:42:07.226594054Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:07.228028 env[1099]: time="2024-04-12T18:42:07.228003976Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:07.229393 env[1099]: time="2024-04-12T18:42:07.229357698Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:62b75df90aa008b11fee8f555f22bfc00d3dc6af5053185c293ee3467342f32a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Apr 12 18:42:07.229816 env[1099]: time="2024-04-12T18:42:07.229791939Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.3\" returns image reference \"sha256:3aea99931f98596bbd91a0676e06a4bae9ce7cc2657a7d5603628bfeecf71ff4\"" Apr 12 18:42:07.232089 env[1099]: time="2024-04-12T18:42:07.232047822Z" level=info msg="CreateContainer within sandbox \"fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Apr 12 18:42:07.242186 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2852690838.mount: Deactivated successfully. Apr 12 18:42:07.242737 env[1099]: time="2024-04-12T18:42:07.242698558Z" level=info msg="CreateContainer within sandbox \"fc4d70220d939e79038e5069c24a853f6918fcf08213a61f1289c85bd6ceb6e6\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"7ae0de99740bfe7abf3baabe6691ba13ea572515cb38e502faf7faad629795ad\"" Apr 12 18:42:07.244268 env[1099]: time="2024-04-12T18:42:07.244236840Z" level=info msg="StartContainer for \"7ae0de99740bfe7abf3baabe6691ba13ea572515cb38e502faf7faad629795ad\"" Apr 12 18:42:07.269480 systemd[1]: Started cri-containerd-7ae0de99740bfe7abf3baabe6691ba13ea572515cb38e502faf7faad629795ad.scope. Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.320000 audit: BPF prog-id=199 op=LOAD Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4843 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761653064653939373430626665376162663362616162653636393162 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4843 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761653064653939373430626665376162663362616162653636393162 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit: BPF prog-id=200 op=LOAD Apr 12 18:42:07.321000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4843 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761653064653939373430626665376162663362616162653636393162 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit: BPF prog-id=201 op=LOAD Apr 12 18:42:07.321000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4843 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761653064653939373430626665376162663362616162653636393162 Apr 12 18:42:07.321000 audit: BPF prog-id=201 op=UNLOAD Apr 12 18:42:07.321000 audit: BPF prog-id=200 op=UNLOAD Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { perfmon } for pid=4903 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit[4903]: AVC avc: denied { bpf } for pid=4903 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Apr 12 18:42:07.321000 audit: BPF prog-id=202 op=LOAD Apr 12 18:42:07.321000 audit[4903]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4843 pid=4903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.321000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3761653064653939373430626665376162663362616162653636393162 Apr 12 18:42:07.344321 env[1099]: time="2024-04-12T18:42:07.344192547Z" level=info msg="StartContainer for \"7ae0de99740bfe7abf3baabe6691ba13ea572515cb38e502faf7faad629795ad\" returns successfully" Apr 12 18:42:07.643000 audit[4935]: NETFILTER_CFG table=filter:132 family=2 entries=10 op=nft_register_rule pid=4935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:07.643000 audit[4935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd4038990 a2=0 a3=1 items=0 ppid=2139 pid=4935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.643000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:07.644000 audit[4935]: NETFILTER_CFG table=nat:133 family=2 entries=44 op=nft_register_rule pid=4935 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:07.644000 audit[4935]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffd4038990 a2=0 a3=1 items=0 ppid=2139 pid=4935 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:07.644000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:07.817654 kubelet[1972]: E0412 18:42:07.817626 1972 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Apr 12 18:42:08.132000 audit[4913]: AVC avc: denied { watch } for pid=4913 comm="apiserver" path="/calico-apiserver-certs/..2024_04_12_18_42_04.3449976204/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c189,c528 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c189,c528 tclass=file permissive=0 Apr 12 18:42:08.132000 audit[4913]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000322320 a2=fc6 a3=0 items=0 ppid=4843 pid=4913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c189,c528 key=(null) Apr 12 18:42:08.132000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Apr 12 18:42:08.258781 kubelet[1972]: I0412 18:42:08.258747 1972 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-5bff4c45b9-xsjn5" podStartSLOduration=3.008026715 podStartE2EDuration="5.258707754s" podCreationTimestamp="2024-04-12 18:42:03 +0000 UTC" firstStartedPulling="2024-04-12 18:42:04.97936206 +0000 UTC m=+76.272289766" lastFinishedPulling="2024-04-12 18:42:07.230043099 +0000 UTC m=+78.522970805" observedRunningTime="2024-04-12 18:42:08.258641674 +0000 UTC m=+79.551569380" watchObservedRunningTime="2024-04-12 18:42:08.258707754 +0000 UTC m=+79.551635460" Apr 12 18:42:08.268000 audit[4937]: NETFILTER_CFG table=filter:134 family=2 entries=10 op=nft_register_rule pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:08.268000 audit[4937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffffd26a290 a2=0 a3=1 items=0 ppid=2139 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:08.268000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:08.269000 audit[4937]: NETFILTER_CFG table=nat:135 family=2 entries=44 op=nft_register_rule pid=4937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Apr 12 18:42:08.269000 audit[4937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffffd26a290 a2=0 a3=1 items=0 ppid=2139 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:08.269000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Apr 12 18:42:10.653000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:49600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.654320 systemd[1]: Started sshd@23-10.0.0.136:22-10.0.0.1:49600.service. Apr 12 18:42:10.655265 kernel: kauditd_printk_skb: 73 callbacks suppressed Apr 12 18:42:10.655317 kernel: audit: type=1130 audit(1712947330.653:1595): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:49600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Apr 12 18:42:10.691000 audit[4946]: USER_ACCT pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.692888 sshd[4946]: Accepted publickey for core from 10.0.0.1 port 49600 ssh2: RSA SHA256:QUhY8l8fo09wOQgBdU1SXiqM8N1XKRTa5W0hOYR625c Apr 12 18:42:10.694332 sshd[4946]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Apr 12 18:42:10.692000 audit[4946]: CRED_ACQ pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.698699 kernel: audit: type=1101 audit(1712947330.691:1596): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.698753 kernel: audit: type=1103 audit(1712947330.692:1597): pid=4946 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.699230 systemd[1]: Started session-24.scope. Apr 12 18:42:10.699531 systemd-logind[1083]: New session 24 of user core. Apr 12 18:42:10.700736 kernel: audit: type=1006 audit(1712947330.692:1598): pid=4946 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Apr 12 18:42:10.700799 kernel: audit: type=1300 audit(1712947330.692:1598): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff50907f0 a2=3 a3=1 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:10.692000 audit[4946]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff50907f0 a2=3 a3=1 items=0 ppid=1 pid=4946 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Apr 12 18:42:10.705335 kernel: audit: type=1327 audit(1712947330.692:1598): proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:10.705406 kernel: audit: type=1105 audit(1712947330.702:1599): pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.692000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Apr 12 18:42:10.702000 audit[4946]: USER_START pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.703000 audit[4948]: CRED_ACQ pid=4948 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.711245 kernel: audit: type=1103 audit(1712947330.703:1600): pid=4948 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.811248 sshd[4946]: pam_unix(sshd:session): session closed for user core Apr 12 18:42:10.811000 audit[4946]: USER_END pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.813622 systemd[1]: session-24.scope: Deactivated successfully. Apr 12 18:42:10.814155 systemd-logind[1083]: Session 24 logged out. Waiting for processes to exit. Apr 12 18:42:10.814302 systemd[1]: sshd@23-10.0.0.136:22-10.0.0.1:49600.service: Deactivated successfully. Apr 12 18:42:10.815248 systemd-logind[1083]: Removed session 24. Apr 12 18:42:10.811000 audit[4946]: CRED_DISP pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.818512 kernel: audit: type=1106 audit(1712947330.811:1601): pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.818565 kernel: audit: type=1104 audit(1712947330.811:1602): pid=4946 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Apr 12 18:42:10.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.0.0.136:22-10.0.0.1:49600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success'