Jul 2 00:53:34.721465 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Jul 2 00:53:34.721483 kernel: Linux version 5.15.161-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Jul 1 23:37:37 -00 2024 Jul 2 00:53:34.721491 kernel: efi: EFI v2.70 by EDK II Jul 2 00:53:34.721497 kernel: efi: SMBIOS 3.0=0xd9260000 ACPI 2.0=0xd9240000 MEMATTR=0xda32b018 RNG=0xd9220018 MEMRESERVE=0xd9521c18 Jul 2 00:53:34.721502 kernel: random: crng init done Jul 2 00:53:34.721507 kernel: ACPI: Early table checksum verification disabled Jul 2 00:53:34.721513 kernel: ACPI: RSDP 0x00000000D9240000 000024 (v02 BOCHS ) Jul 2 00:53:34.721526 kernel: ACPI: XSDT 0x00000000D9230000 000064 (v01 BOCHS BXPC 00000001 01000013) Jul 2 00:53:34.721561 kernel: ACPI: FACP 0x00000000D91E0000 000114 (v06 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721566 kernel: ACPI: DSDT 0x00000000D91F0000 0014A2 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721572 kernel: ACPI: APIC 0x00000000D91D0000 0001A8 (v04 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721577 kernel: ACPI: PPTT 0x00000000D91C0000 00009C (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721582 kernel: ACPI: GTDT 0x00000000D91B0000 000060 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721588 kernel: ACPI: MCFG 0x00000000D91A0000 00003C (v01 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721598 kernel: ACPI: SPCR 0x00000000D9190000 000050 (v02 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721603 kernel: ACPI: DBG2 0x00000000D9180000 000057 (v00 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721609 kernel: ACPI: IORT 0x00000000D9170000 000080 (v03 BOCHS BXPC 00000001 BXPC 00000001) Jul 2 00:53:34.721615 kernel: ACPI: SPCR: console: pl011,mmio,0x9000000,9600 Jul 2 00:53:34.721620 kernel: NUMA: Failed to initialise from firmware Jul 2 00:53:34.721626 kernel: NUMA: Faking a node at [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:53:34.721632 kernel: NUMA: NODE_DATA [mem 0xdcb0b900-0xdcb10fff] Jul 2 00:53:34.721638 kernel: Zone ranges: Jul 2 00:53:34.721644 kernel: DMA [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:53:34.721651 kernel: DMA32 empty Jul 2 00:53:34.721657 kernel: Normal empty Jul 2 00:53:34.721662 kernel: Movable zone start for each node Jul 2 00:53:34.721668 kernel: Early memory node ranges Jul 2 00:53:34.721674 kernel: node 0: [mem 0x0000000040000000-0x00000000d924ffff] Jul 2 00:53:34.721680 kernel: node 0: [mem 0x00000000d9250000-0x00000000d951ffff] Jul 2 00:53:34.721685 kernel: node 0: [mem 0x00000000d9520000-0x00000000dc7fffff] Jul 2 00:53:34.721691 kernel: node 0: [mem 0x00000000dc800000-0x00000000dc88ffff] Jul 2 00:53:34.721696 kernel: node 0: [mem 0x00000000dc890000-0x00000000dc89ffff] Jul 2 00:53:34.721702 kernel: node 0: [mem 0x00000000dc8a0000-0x00000000dc9bffff] Jul 2 00:53:34.721707 kernel: node 0: [mem 0x00000000dc9c0000-0x00000000dcffffff] Jul 2 00:53:34.721713 kernel: Initmem setup node 0 [mem 0x0000000040000000-0x00000000dcffffff] Jul 2 00:53:34.721720 kernel: On node 0, zone DMA: 12288 pages in unavailable ranges Jul 2 00:53:34.721725 kernel: psci: probing for conduit method from ACPI. Jul 2 00:53:34.721731 kernel: psci: PSCIv1.1 detected in firmware. Jul 2 00:53:34.721736 kernel: psci: Using standard PSCI v0.2 function IDs Jul 2 00:53:34.721742 kernel: psci: Trusted OS migration not required Jul 2 00:53:34.721750 kernel: psci: SMC Calling Convention v1.1 Jul 2 00:53:34.721756 kernel: smccc: KVM: hypervisor services detected (0x00000000 0x00000000 0x00000000 0x00000003) Jul 2 00:53:34.721763 kernel: ACPI: SRAT not present Jul 2 00:53:34.721770 kernel: percpu: Embedded 30 pages/cpu s83032 r8192 d31656 u122880 Jul 2 00:53:34.721776 kernel: pcpu-alloc: s83032 r8192 d31656 u122880 alloc=30*4096 Jul 2 00:53:34.721782 kernel: pcpu-alloc: [0] 0 [0] 1 [0] 2 [0] 3 Jul 2 00:53:34.721788 kernel: Detected PIPT I-cache on CPU0 Jul 2 00:53:34.721794 kernel: CPU features: detected: GIC system register CPU interface Jul 2 00:53:34.721800 kernel: CPU features: detected: Hardware dirty bit management Jul 2 00:53:34.721806 kernel: CPU features: detected: Spectre-v4 Jul 2 00:53:34.721811 kernel: CPU features: detected: Spectre-BHB Jul 2 00:53:34.721818 kernel: CPU features: kernel page table isolation forced ON by KASLR Jul 2 00:53:34.721824 kernel: CPU features: detected: Kernel page table isolation (KPTI) Jul 2 00:53:34.721830 kernel: CPU features: detected: ARM erratum 1418040 Jul 2 00:53:34.721836 kernel: Built 1 zonelists, mobility grouping on. Total pages: 633024 Jul 2 00:53:34.721842 kernel: Policy zone: DMA Jul 2 00:53:34.721849 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:53:34.721855 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Jul 2 00:53:34.721861 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Jul 2 00:53:34.721867 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Jul 2 00:53:34.721873 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Jul 2 00:53:34.721882 kernel: Memory: 2457468K/2572288K available (9792K kernel code, 2092K rwdata, 7572K rodata, 36352K init, 777K bss, 114820K reserved, 0K cma-reserved) Jul 2 00:53:34.721890 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=4, Nodes=1 Jul 2 00:53:34.721895 kernel: trace event string verifier disabled Jul 2 00:53:34.721902 kernel: rcu: Preemptible hierarchical RCU implementation. Jul 2 00:53:34.721908 kernel: rcu: RCU event tracing is enabled. Jul 2 00:53:34.721914 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=4. Jul 2 00:53:34.721920 kernel: Trampoline variant of Tasks RCU enabled. Jul 2 00:53:34.721926 kernel: Tracing variant of Tasks RCU enabled. Jul 2 00:53:34.721932 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Jul 2 00:53:34.721938 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=4 Jul 2 00:53:34.721944 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Jul 2 00:53:34.721950 kernel: GICv3: 256 SPIs implemented Jul 2 00:53:34.721957 kernel: GICv3: 0 Extended SPIs implemented Jul 2 00:53:34.721963 kernel: GICv3: Distributor has no Range Selector support Jul 2 00:53:34.721969 kernel: Root IRQ handler: gic_handle_irq Jul 2 00:53:34.721975 kernel: GICv3: 16 PPIs implemented Jul 2 00:53:34.721981 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000080a0000 Jul 2 00:53:34.721986 kernel: ACPI: SRAT not present Jul 2 00:53:34.721992 kernel: ITS [mem 0x08080000-0x0809ffff] Jul 2 00:53:34.721998 kernel: ITS@0x0000000008080000: allocated 8192 Devices @400b0000 (indirect, esz 8, psz 64K, shr 1) Jul 2 00:53:34.722004 kernel: ITS@0x0000000008080000: allocated 8192 Interrupt Collections @400c0000 (flat, esz 8, psz 64K, shr 1) Jul 2 00:53:34.722010 kernel: GICv3: using LPI property table @0x00000000400d0000 Jul 2 00:53:34.722016 kernel: GICv3: CPU0: using allocated LPI pending table @0x00000000400e0000 Jul 2 00:53:34.722022 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:53:34.722029 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Jul 2 00:53:34.722036 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Jul 2 00:53:34.722042 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Jul 2 00:53:34.722047 kernel: arm-pv: using stolen time PV Jul 2 00:53:34.722054 kernel: Console: colour dummy device 80x25 Jul 2 00:53:34.722060 kernel: ACPI: Core revision 20210730 Jul 2 00:53:34.722066 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Jul 2 00:53:34.722072 kernel: pid_max: default: 32768 minimum: 301 Jul 2 00:53:34.722079 kernel: LSM: Security Framework initializing Jul 2 00:53:34.722085 kernel: SELinux: Initializing. Jul 2 00:53:34.722092 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:53:34.722098 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Jul 2 00:53:34.722104 kernel: rcu: Hierarchical SRCU implementation. Jul 2 00:53:34.722110 kernel: Platform MSI: ITS@0x8080000 domain created Jul 2 00:53:34.722116 kernel: PCI/MSI: ITS@0x8080000 domain created Jul 2 00:53:34.722123 kernel: Remapping and enabling EFI services. Jul 2 00:53:34.722129 kernel: smp: Bringing up secondary CPUs ... Jul 2 00:53:34.722135 kernel: Detected PIPT I-cache on CPU1 Jul 2 00:53:34.722141 kernel: GICv3: CPU1: found redistributor 1 region 0:0x00000000080c0000 Jul 2 00:53:34.722148 kernel: GICv3: CPU1: using allocated LPI pending table @0x00000000400f0000 Jul 2 00:53:34.722154 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:53:34.722160 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Jul 2 00:53:34.722166 kernel: Detected PIPT I-cache on CPU2 Jul 2 00:53:34.722173 kernel: GICv3: CPU2: found redistributor 2 region 0:0x00000000080e0000 Jul 2 00:53:34.722179 kernel: GICv3: CPU2: using allocated LPI pending table @0x0000000040100000 Jul 2 00:53:34.722185 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:53:34.722191 kernel: CPU2: Booted secondary processor 0x0000000002 [0x413fd0c1] Jul 2 00:53:34.722197 kernel: Detected PIPT I-cache on CPU3 Jul 2 00:53:34.722203 kernel: GICv3: CPU3: found redistributor 3 region 0:0x0000000008100000 Jul 2 00:53:34.722210 kernel: GICv3: CPU3: using allocated LPI pending table @0x0000000040110000 Jul 2 00:53:34.722216 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Jul 2 00:53:34.722222 kernel: CPU3: Booted secondary processor 0x0000000003 [0x413fd0c1] Jul 2 00:53:34.722228 kernel: smp: Brought up 1 node, 4 CPUs Jul 2 00:53:34.722239 kernel: SMP: Total of 4 processors activated. Jul 2 00:53:34.722246 kernel: CPU features: detected: 32-bit EL0 Support Jul 2 00:53:34.722253 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Jul 2 00:53:34.722259 kernel: CPU features: detected: Common not Private translations Jul 2 00:53:34.722266 kernel: CPU features: detected: CRC32 instructions Jul 2 00:53:34.722272 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Jul 2 00:53:34.722278 kernel: CPU features: detected: LSE atomic instructions Jul 2 00:53:34.722285 kernel: CPU features: detected: Privileged Access Never Jul 2 00:53:34.722293 kernel: CPU features: detected: RAS Extension Support Jul 2 00:53:34.722299 kernel: CPU features: detected: Speculative Store Bypassing Safe (SSBS) Jul 2 00:53:34.722306 kernel: CPU: All CPU(s) started at EL1 Jul 2 00:53:34.722312 kernel: alternatives: patching kernel code Jul 2 00:53:34.722319 kernel: devtmpfs: initialized Jul 2 00:53:34.722326 kernel: KASLR enabled Jul 2 00:53:34.722332 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Jul 2 00:53:34.722339 kernel: futex hash table entries: 1024 (order: 4, 65536 bytes, linear) Jul 2 00:53:34.722345 kernel: pinctrl core: initialized pinctrl subsystem Jul 2 00:53:34.722352 kernel: SMBIOS 3.0.0 present. Jul 2 00:53:34.722358 kernel: DMI: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015 Jul 2 00:53:34.722364 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Jul 2 00:53:34.722371 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Jul 2 00:53:34.722377 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Jul 2 00:53:34.722385 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Jul 2 00:53:34.722391 kernel: audit: initializing netlink subsys (disabled) Jul 2 00:53:34.722398 kernel: audit: type=2000 audit(0.033:1): state=initialized audit_enabled=0 res=1 Jul 2 00:53:34.722404 kernel: thermal_sys: Registered thermal governor 'step_wise' Jul 2 00:53:34.722411 kernel: cpuidle: using governor menu Jul 2 00:53:34.722417 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Jul 2 00:53:34.722424 kernel: ASID allocator initialised with 32768 entries Jul 2 00:53:34.722430 kernel: ACPI: bus type PCI registered Jul 2 00:53:34.722436 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Jul 2 00:53:34.722444 kernel: Serial: AMBA PL011 UART driver Jul 2 00:53:34.722450 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Jul 2 00:53:34.722457 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Jul 2 00:53:34.722463 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Jul 2 00:53:34.722470 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Jul 2 00:53:34.722476 kernel: cryptd: max_cpu_qlen set to 1000 Jul 2 00:53:34.722483 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Jul 2 00:53:34.722489 kernel: ACPI: Added _OSI(Module Device) Jul 2 00:53:34.722496 kernel: ACPI: Added _OSI(Processor Device) Jul 2 00:53:34.722504 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Jul 2 00:53:34.722510 kernel: ACPI: Added _OSI(Processor Aggregator Device) Jul 2 00:53:34.722516 kernel: ACPI: Added _OSI(Linux-Dell-Video) Jul 2 00:53:34.722532 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Jul 2 00:53:34.722539 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Jul 2 00:53:34.722546 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Jul 2 00:53:34.722552 kernel: ACPI: Interpreter enabled Jul 2 00:53:34.722559 kernel: ACPI: Using GIC for interrupt routing Jul 2 00:53:34.722566 kernel: ACPI: MCFG table detected, 1 entries Jul 2 00:53:34.722574 kernel: ARMH0011:00: ttyAMA0 at MMIO 0x9000000 (irq = 12, base_baud = 0) is a SBSA Jul 2 00:53:34.722580 kernel: printk: console [ttyAMA0] enabled Jul 2 00:53:34.722587 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Jul 2 00:53:34.722706 kernel: acpi PNP0A08:00: _OSC: OS supports [ExtendedConfig ASPM ClockPM Segments MSI HPX-Type3] Jul 2 00:53:34.722769 kernel: acpi PNP0A08:00: _OSC: platform does not support [LTR] Jul 2 00:53:34.722827 kernel: acpi PNP0A08:00: _OSC: OS now controls [PCIeHotplug PME AER PCIeCapability] Jul 2 00:53:34.722884 kernel: acpi PNP0A08:00: ECAM area [mem 0x4010000000-0x401fffffff] reserved by PNP0C02:00 Jul 2 00:53:34.722945 kernel: acpi PNP0A08:00: ECAM at [mem 0x4010000000-0x401fffffff] for [bus 00-ff] Jul 2 00:53:34.722954 kernel: ACPI: Remapped I/O 0x000000003eff0000 to [io 0x0000-0xffff window] Jul 2 00:53:34.722961 kernel: PCI host bridge to bus 0000:00 Jul 2 00:53:34.723025 kernel: pci_bus 0000:00: root bus resource [mem 0x10000000-0x3efeffff window] Jul 2 00:53:34.723079 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0xffff window] Jul 2 00:53:34.723150 kernel: pci_bus 0000:00: root bus resource [mem 0x8000000000-0xffffffffff window] Jul 2 00:53:34.723205 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Jul 2 00:53:34.723304 kernel: pci 0000:00:00.0: [1b36:0008] type 00 class 0x060000 Jul 2 00:53:34.723377 kernel: pci 0000:00:01.0: [1af4:1005] type 00 class 0x00ff00 Jul 2 00:53:34.723439 kernel: pci 0000:00:01.0: reg 0x10: [io 0x0000-0x001f] Jul 2 00:53:34.723499 kernel: pci 0000:00:01.0: reg 0x14: [mem 0x10000000-0x10000fff] Jul 2 00:53:34.723584 kernel: pci 0000:00:01.0: reg 0x20: [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:53:34.723644 kernel: pci 0000:00:01.0: BAR 4: assigned [mem 0x8000000000-0x8000003fff 64bit pref] Jul 2 00:53:34.723702 kernel: pci 0000:00:01.0: BAR 1: assigned [mem 0x10000000-0x10000fff] Jul 2 00:53:34.723763 kernel: pci 0000:00:01.0: BAR 0: assigned [io 0x1000-0x101f] Jul 2 00:53:34.723816 kernel: pci_bus 0000:00: resource 4 [mem 0x10000000-0x3efeffff window] Jul 2 00:53:34.723869 kernel: pci_bus 0000:00: resource 5 [io 0x0000-0xffff window] Jul 2 00:53:34.723921 kernel: pci_bus 0000:00: resource 6 [mem 0x8000000000-0xffffffffff window] Jul 2 00:53:34.723930 kernel: ACPI: PCI: Interrupt link GSI0 configured for IRQ 35 Jul 2 00:53:34.723937 kernel: ACPI: PCI: Interrupt link GSI1 configured for IRQ 36 Jul 2 00:53:34.723943 kernel: ACPI: PCI: Interrupt link GSI2 configured for IRQ 37 Jul 2 00:53:34.723952 kernel: ACPI: PCI: Interrupt link GSI3 configured for IRQ 38 Jul 2 00:53:34.723958 kernel: iommu: Default domain type: Translated Jul 2 00:53:34.723965 kernel: iommu: DMA domain TLB invalidation policy: strict mode Jul 2 00:53:34.723971 kernel: vgaarb: loaded Jul 2 00:53:34.723978 kernel: pps_core: LinuxPPS API ver. 1 registered Jul 2 00:53:34.723984 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Jul 2 00:53:34.723991 kernel: PTP clock support registered Jul 2 00:53:34.723997 kernel: Registered efivars operations Jul 2 00:53:34.724004 kernel: clocksource: Switched to clocksource arch_sys_counter Jul 2 00:53:34.724010 kernel: VFS: Disk quotas dquot_6.6.0 Jul 2 00:53:34.724018 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Jul 2 00:53:34.724025 kernel: pnp: PnP ACPI init Jul 2 00:53:34.724094 kernel: system 00:00: [mem 0x4010000000-0x401fffffff window] could not be reserved Jul 2 00:53:34.724104 kernel: pnp: PnP ACPI: found 1 devices Jul 2 00:53:34.724111 kernel: NET: Registered PF_INET protocol family Jul 2 00:53:34.724117 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Jul 2 00:53:34.724124 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Jul 2 00:53:34.724130 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Jul 2 00:53:34.724139 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Jul 2 00:53:34.724146 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Jul 2 00:53:34.724152 kernel: TCP: Hash tables configured (established 32768 bind 32768) Jul 2 00:53:34.724159 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:53:34.724165 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Jul 2 00:53:34.724172 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Jul 2 00:53:34.724178 kernel: PCI: CLS 0 bytes, default 64 Jul 2 00:53:34.724185 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 7 counters available Jul 2 00:53:34.724192 kernel: kvm [1]: HYP mode not available Jul 2 00:53:34.724199 kernel: Initialise system trusted keyrings Jul 2 00:53:34.724205 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Jul 2 00:53:34.724212 kernel: Key type asymmetric registered Jul 2 00:53:34.724218 kernel: Asymmetric key parser 'x509' registered Jul 2 00:53:34.724225 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Jul 2 00:53:34.724231 kernel: io scheduler mq-deadline registered Jul 2 00:53:34.724237 kernel: io scheduler kyber registered Jul 2 00:53:34.724244 kernel: io scheduler bfq registered Jul 2 00:53:34.724250 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXSYBUS:00/PNP0C0C:00/input/input0 Jul 2 00:53:34.724258 kernel: ACPI: button: Power Button [PWRB] Jul 2 00:53:34.724265 kernel: ACPI: \_SB_.PCI0.GSI1: Enabled at IRQ 36 Jul 2 00:53:34.724324 kernel: virtio-pci 0000:00:01.0: enabling device (0005 -> 0007) Jul 2 00:53:34.724333 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Jul 2 00:53:34.724339 kernel: thunder_xcv, ver 1.0 Jul 2 00:53:34.724345 kernel: thunder_bgx, ver 1.0 Jul 2 00:53:34.724352 kernel: nicpf, ver 1.0 Jul 2 00:53:34.724358 kernel: nicvf, ver 1.0 Jul 2 00:53:34.724422 kernel: rtc-efi rtc-efi.0: registered as rtc0 Jul 2 00:53:34.724479 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-07-02T00:53:34 UTC (1719881614) Jul 2 00:53:34.724488 kernel: hid: raw HID events driver (C) Jiri Kosina Jul 2 00:53:34.724494 kernel: NET: Registered PF_INET6 protocol family Jul 2 00:53:34.724501 kernel: Segment Routing with IPv6 Jul 2 00:53:34.724508 kernel: In-situ OAM (IOAM) with IPv6 Jul 2 00:53:34.724514 kernel: NET: Registered PF_PACKET protocol family Jul 2 00:53:34.724526 kernel: Key type dns_resolver registered Jul 2 00:53:34.726331 kernel: registered taskstats version 1 Jul 2 00:53:34.726342 kernel: Loading compiled-in X.509 certificates Jul 2 00:53:34.726348 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.161-flatcar: c418313b450e4055b23e41c11cb6dc415de0265d' Jul 2 00:53:34.726355 kernel: Key type .fscrypt registered Jul 2 00:53:34.726361 kernel: Key type fscrypt-provisioning registered Jul 2 00:53:34.726368 kernel: ima: No TPM chip found, activating TPM-bypass! Jul 2 00:53:34.726374 kernel: ima: Allocated hash algorithm: sha1 Jul 2 00:53:34.726380 kernel: ima: No architecture policies found Jul 2 00:53:34.726387 kernel: clk: Disabling unused clocks Jul 2 00:53:34.726393 kernel: Freeing unused kernel memory: 36352K Jul 2 00:53:34.726401 kernel: Run /init as init process Jul 2 00:53:34.726407 kernel: with arguments: Jul 2 00:53:34.726414 kernel: /init Jul 2 00:53:34.726420 kernel: with environment: Jul 2 00:53:34.726426 kernel: HOME=/ Jul 2 00:53:34.726432 kernel: TERM=linux Jul 2 00:53:34.726439 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Jul 2 00:53:34.726447 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:53:34.726457 systemd[1]: Detected virtualization kvm. Jul 2 00:53:34.726464 systemd[1]: Detected architecture arm64. Jul 2 00:53:34.726471 systemd[1]: Running in initrd. Jul 2 00:53:34.726477 systemd[1]: No hostname configured, using default hostname. Jul 2 00:53:34.726484 systemd[1]: Hostname set to . Jul 2 00:53:34.726491 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:53:34.726498 systemd[1]: Queued start job for default target initrd.target. Jul 2 00:53:34.726505 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:53:34.726513 systemd[1]: Reached target cryptsetup.target. Jul 2 00:53:34.726524 systemd[1]: Reached target paths.target. Jul 2 00:53:34.726557 systemd[1]: Reached target slices.target. Jul 2 00:53:34.726565 systemd[1]: Reached target swap.target. Jul 2 00:53:34.726572 systemd[1]: Reached target timers.target. Jul 2 00:53:34.726579 systemd[1]: Listening on iscsid.socket. Jul 2 00:53:34.726586 systemd[1]: Listening on iscsiuio.socket. Jul 2 00:53:34.726595 systemd[1]: Listening on systemd-journald-audit.socket. Jul 2 00:53:34.726603 systemd[1]: Listening on systemd-journald-dev-log.socket. Jul 2 00:53:34.726609 systemd[1]: Listening on systemd-journald.socket. Jul 2 00:53:34.726616 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:53:34.726623 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:53:34.726630 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:53:34.726637 systemd[1]: Reached target sockets.target. Jul 2 00:53:34.726644 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:53:34.726651 systemd[1]: Finished network-cleanup.service. Jul 2 00:53:34.726659 systemd[1]: Starting systemd-fsck-usr.service... Jul 2 00:53:34.726666 systemd[1]: Starting systemd-journald.service... Jul 2 00:53:34.726673 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:53:34.726680 systemd[1]: Starting systemd-resolved.service... Jul 2 00:53:34.726687 systemd[1]: Starting systemd-vconsole-setup.service... Jul 2 00:53:34.726693 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:53:34.726700 systemd[1]: Finished systemd-fsck-usr.service. Jul 2 00:53:34.726707 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:53:34.726718 systemd[1]: Finished systemd-vconsole-setup.service. Jul 2 00:53:34.726726 systemd[1]: Starting dracut-cmdline-ask.service... Jul 2 00:53:34.726732 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:53:34.726741 kernel: audit: type=1130 audit(1719881614.723:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.726750 systemd-journald[290]: Journal started Jul 2 00:53:34.726800 systemd-journald[290]: Runtime Journal (/run/log/journal/84dfd35dd2c848f782acc81af15a8f5a) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:53:34.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.717316 systemd-modules-load[291]: Inserted module 'overlay' Jul 2 00:53:34.728600 systemd[1]: Started systemd-journald.service. Jul 2 00:53:34.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.731551 kernel: audit: type=1130 audit(1719881614.728:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.736891 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Jul 2 00:53:34.737053 systemd[1]: Finished dracut-cmdline-ask.service. Jul 2 00:53:34.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.739776 systemd-resolved[292]: Positive Trust Anchors: Jul 2 00:53:34.743360 kernel: audit: type=1130 audit(1719881614.737:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.743376 kernel: Bridge firewalling registered Jul 2 00:53:34.739782 systemd-resolved[292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:53:34.739808 systemd-resolved[292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:53:34.752278 kernel: audit: type=1130 audit(1719881614.745:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.740715 systemd[1]: Starting dracut-cmdline.service... Jul 2 00:53:34.753643 kernel: SCSI subsystem initialized Jul 2 00:53:34.741054 systemd-modules-load[291]: Inserted module 'br_netfilter' Jul 2 00:53:34.743861 systemd-resolved[292]: Defaulting to hostname 'linux'. Jul 2 00:53:34.744580 systemd[1]: Started systemd-resolved.service. Jul 2 00:53:34.746664 systemd[1]: Reached target nss-lookup.target. Jul 2 00:53:34.755892 dracut-cmdline[307]: dracut-dracut-053 Jul 2 00:53:34.758047 dracut-cmdline[307]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200 flatcar.first_boot=detected acpi=force verity.usrhash=7b86ecfcd4701bdf4668db795601b20c118ac0b117c34a9b3836e0a5236b73b0 Jul 2 00:53:34.763798 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Jul 2 00:53:34.763829 kernel: device-mapper: uevent: version 1.0.3 Jul 2 00:53:34.763843 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Jul 2 00:53:34.765958 systemd-modules-load[291]: Inserted module 'dm_multipath' Jul 2 00:53:34.766676 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:53:34.766000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.767943 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:53:34.771602 kernel: audit: type=1130 audit(1719881614.766:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.775689 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:53:34.775000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.778602 kernel: audit: type=1130 audit(1719881614.775:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.817575 kernel: Loading iSCSI transport class v2.0-870. Jul 2 00:53:34.831557 kernel: iscsi: registered transport (tcp) Jul 2 00:53:34.845747 kernel: iscsi: registered transport (qla4xxx) Jul 2 00:53:34.845780 kernel: QLogic iSCSI HBA Driver Jul 2 00:53:34.879423 systemd[1]: Finished dracut-cmdline.service. Jul 2 00:53:34.879000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.880813 systemd[1]: Starting dracut-pre-udev.service... Jul 2 00:53:34.883158 kernel: audit: type=1130 audit(1719881614.879:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:34.926547 kernel: raid6: neonx8 gen() 13814 MB/s Jul 2 00:53:34.943542 kernel: raid6: neonx8 xor() 10827 MB/s Jul 2 00:53:34.960548 kernel: raid6: neonx4 gen() 13543 MB/s Jul 2 00:53:34.977546 kernel: raid6: neonx4 xor() 11310 MB/s Jul 2 00:53:34.994550 kernel: raid6: neonx2 gen() 12956 MB/s Jul 2 00:53:35.011559 kernel: raid6: neonx2 xor() 10647 MB/s Jul 2 00:53:35.028556 kernel: raid6: neonx1 gen() 10541 MB/s Jul 2 00:53:35.045543 kernel: raid6: neonx1 xor() 8768 MB/s Jul 2 00:53:35.062549 kernel: raid6: int64x8 gen() 6279 MB/s Jul 2 00:53:35.079553 kernel: raid6: int64x8 xor() 3543 MB/s Jul 2 00:53:35.096552 kernel: raid6: int64x4 gen() 7204 MB/s Jul 2 00:53:35.113545 kernel: raid6: int64x4 xor() 3858 MB/s Jul 2 00:53:35.130558 kernel: raid6: int64x2 gen() 6158 MB/s Jul 2 00:53:35.147554 kernel: raid6: int64x2 xor() 3322 MB/s Jul 2 00:53:35.164552 kernel: raid6: int64x1 gen() 5046 MB/s Jul 2 00:53:35.181741 kernel: raid6: int64x1 xor() 2646 MB/s Jul 2 00:53:35.181752 kernel: raid6: using algorithm neonx8 gen() 13814 MB/s Jul 2 00:53:35.181760 kernel: raid6: .... xor() 10827 MB/s, rmw enabled Jul 2 00:53:35.181768 kernel: raid6: using neon recovery algorithm Jul 2 00:53:35.192635 kernel: xor: measuring software checksum speed Jul 2 00:53:35.192667 kernel: 8regs : 17315 MB/sec Jul 2 00:53:35.193542 kernel: 32regs : 20760 MB/sec Jul 2 00:53:35.194617 kernel: arm64_neon : 27892 MB/sec Jul 2 00:53:35.194639 kernel: xor: using function: arm64_neon (27892 MB/sec) Jul 2 00:53:35.247578 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Jul 2 00:53:35.257753 systemd[1]: Finished dracut-pre-udev.service. Jul 2 00:53:35.257000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:35.259308 systemd[1]: Starting systemd-udevd.service... Jul 2 00:53:35.262372 kernel: audit: type=1130 audit(1719881615.257:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:35.262388 kernel: audit: type=1334 audit(1719881615.258:10): prog-id=7 op=LOAD Jul 2 00:53:35.258000 audit: BPF prog-id=7 op=LOAD Jul 2 00:53:35.258000 audit: BPF prog-id=8 op=LOAD Jul 2 00:53:35.271619 systemd-udevd[492]: Using default interface naming scheme 'v252'. Jul 2 00:53:35.274880 systemd[1]: Started systemd-udevd.service. Jul 2 00:53:35.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:35.276169 systemd[1]: Starting dracut-pre-trigger.service... Jul 2 00:53:35.287570 dracut-pre-trigger[498]: rd.md=0: removing MD RAID activation Jul 2 00:53:35.313487 systemd[1]: Finished dracut-pre-trigger.service. Jul 2 00:53:35.313000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:35.314851 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:53:35.347785 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:53:35.347000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:35.380587 kernel: virtio_blk virtio1: [vda] 19775488 512-byte logical blocks (10.1 GB/9.43 GiB) Jul 2 00:53:35.382984 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Jul 2 00:53:35.383017 kernel: GPT:9289727 != 19775487 Jul 2 00:53:35.383027 kernel: GPT:Alternate GPT header not at the end of the disk. Jul 2 00:53:35.383040 kernel: GPT:9289727 != 19775487 Jul 2 00:53:35.383704 kernel: GPT: Use GNU Parted to correct GPT errors. Jul 2 00:53:35.383720 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:53:35.400034 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Jul 2 00:53:35.403562 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (554) Jul 2 00:53:35.405569 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Jul 2 00:53:35.406311 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Jul 2 00:53:35.412107 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Jul 2 00:53:35.415185 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:53:35.416567 systemd[1]: Starting disk-uuid.service... Jul 2 00:53:35.422275 disk-uuid[563]: Primary Header is updated. Jul 2 00:53:35.422275 disk-uuid[563]: Secondary Entries is updated. Jul 2 00:53:35.422275 disk-uuid[563]: Secondary Header is updated. Jul 2 00:53:35.425568 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:53:36.440441 disk-uuid[564]: The operation has completed successfully. Jul 2 00:53:36.441286 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Jul 2 00:53:36.465859 systemd[1]: disk-uuid.service: Deactivated successfully. Jul 2 00:53:36.466000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.466000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.465950 systemd[1]: Finished disk-uuid.service. Jul 2 00:53:36.469756 systemd[1]: Starting verity-setup.service... Jul 2 00:53:36.485561 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Jul 2 00:53:36.504146 systemd[1]: Found device dev-mapper-usr.device. Jul 2 00:53:36.506006 systemd[1]: Mounting sysusr-usr.mount... Jul 2 00:53:36.507862 systemd[1]: Finished verity-setup.service. Jul 2 00:53:36.507000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.556552 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Jul 2 00:53:36.556670 systemd[1]: Mounted sysusr-usr.mount. Jul 2 00:53:36.557301 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Jul 2 00:53:36.557967 systemd[1]: Starting ignition-setup.service... Jul 2 00:53:36.559644 systemd[1]: Starting parse-ip-for-networkd.service... Jul 2 00:53:36.567947 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:53:36.567987 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:53:36.567998 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:53:36.577020 systemd[1]: mnt-oem.mount: Deactivated successfully. Jul 2 00:53:36.584074 systemd[1]: Finished ignition-setup.service. Jul 2 00:53:36.584000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.586110 systemd[1]: Starting ignition-fetch-offline.service... Jul 2 00:53:36.634946 systemd[1]: Finished parse-ip-for-networkd.service. Jul 2 00:53:36.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.635000 audit: BPF prog-id=9 op=LOAD Jul 2 00:53:36.636903 systemd[1]: Starting systemd-networkd.service... Jul 2 00:53:36.659986 systemd-networkd[739]: lo: Link UP Jul 2 00:53:36.659991 systemd-networkd[739]: lo: Gained carrier Jul 2 00:53:36.662588 systemd-networkd[739]: Enumeration completed Jul 2 00:53:36.662667 systemd[1]: Started systemd-networkd.service. Jul 2 00:53:36.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.663836 systemd[1]: Reached target network.target. Jul 2 00:53:36.665371 systemd[1]: Starting iscsiuio.service... Jul 2 00:53:36.666405 systemd-networkd[739]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:53:36.667972 systemd-networkd[739]: eth0: Link UP Jul 2 00:53:36.667983 systemd-networkd[739]: eth0: Gained carrier Jul 2 00:53:36.671015 ignition[660]: Ignition 2.14.0 Jul 2 00:53:36.671025 ignition[660]: Stage: fetch-offline Jul 2 00:53:36.671071 ignition[660]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:36.671080 ignition[660]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:36.671204 ignition[660]: parsed url from cmdline: "" Jul 2 00:53:36.671207 ignition[660]: no config URL provided Jul 2 00:53:36.671212 ignition[660]: reading system config file "/usr/lib/ignition/user.ign" Jul 2 00:53:36.671218 ignition[660]: no config at "/usr/lib/ignition/user.ign" Jul 2 00:53:36.671235 ignition[660]: op(1): [started] loading QEMU firmware config module Jul 2 00:53:36.671239 ignition[660]: op(1): executing: "modprobe" "qemu_fw_cfg" Jul 2 00:53:36.677117 systemd[1]: Started iscsiuio.service. Jul 2 00:53:36.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.678580 systemd[1]: Starting iscsid.service... Jul 2 00:53:36.681460 ignition[660]: op(1): [finished] loading QEMU firmware config module Jul 2 00:53:36.682403 iscsid[746]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:53:36.682403 iscsid[746]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Jul 2 00:53:36.682403 iscsid[746]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Jul 2 00:53:36.682403 iscsid[746]: If using hardware iscsi like qla4xxx this message can be ignored. Jul 2 00:53:36.682403 iscsid[746]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Jul 2 00:53:36.682403 iscsid[746]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Jul 2 00:53:36.688000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.684732 systemd[1]: Started iscsid.service. Jul 2 00:53:36.689441 systemd[1]: Starting dracut-initqueue.service... Jul 2 00:53:36.691030 systemd-networkd[739]: eth0: DHCPv4 address 10.0.0.92/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:53:36.698907 systemd[1]: Finished dracut-initqueue.service. Jul 2 00:53:36.699695 systemd[1]: Reached target remote-fs-pre.target. Jul 2 00:53:36.700934 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:53:36.702233 systemd[1]: Reached target remote-fs.target. Jul 2 00:53:36.699000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.704060 systemd[1]: Starting dracut-pre-mount.service... Jul 2 00:53:36.711067 systemd[1]: Finished dracut-pre-mount.service. Jul 2 00:53:36.711000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.733439 ignition[660]: parsing config with SHA512: 6c46b3891c535fdef1584623409359094ea9265ab71e05f83807fb965caa3427ac71fde0e38020739935767153fa0887a7a82dc502d0500b6adacaf1064dd9cf Jul 2 00:53:36.740748 unknown[660]: fetched base config from "system" Jul 2 00:53:36.740762 unknown[660]: fetched user config from "qemu" Jul 2 00:53:36.741276 ignition[660]: fetch-offline: fetch-offline passed Jul 2 00:53:36.742104 systemd[1]: Finished ignition-fetch-offline.service. Jul 2 00:53:36.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.741332 ignition[660]: Ignition finished successfully Jul 2 00:53:36.743196 systemd[1]: ignition-fetch.service was skipped because of an unmet condition check (ConditionPathExists=!/run/ignition.json). Jul 2 00:53:36.743853 systemd[1]: Starting ignition-kargs.service... Jul 2 00:53:36.752595 ignition[761]: Ignition 2.14.0 Jul 2 00:53:36.752604 ignition[761]: Stage: kargs Jul 2 00:53:36.752689 ignition[761]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:36.754439 systemd[1]: Finished ignition-kargs.service. Jul 2 00:53:36.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.752699 ignition[761]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:36.753466 ignition[761]: kargs: kargs passed Jul 2 00:53:36.756330 systemd[1]: Starting ignition-disks.service... Jul 2 00:53:36.753505 ignition[761]: Ignition finished successfully Jul 2 00:53:36.762089 ignition[767]: Ignition 2.14.0 Jul 2 00:53:36.762098 ignition[767]: Stage: disks Jul 2 00:53:36.762179 ignition[767]: no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:36.762188 ignition[767]: no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:36.762986 ignition[767]: disks: disks passed Jul 2 00:53:36.764000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.764149 systemd[1]: Finished ignition-disks.service. Jul 2 00:53:36.763024 ignition[767]: Ignition finished successfully Jul 2 00:53:36.764932 systemd[1]: Reached target initrd-root-device.target. Jul 2 00:53:36.765784 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:53:36.766804 systemd[1]: Reached target local-fs.target. Jul 2 00:53:36.767720 systemd[1]: Reached target sysinit.target. Jul 2 00:53:36.768680 systemd[1]: Reached target basic.target. Jul 2 00:53:36.770319 systemd[1]: Starting systemd-fsck-root.service... Jul 2 00:53:36.780797 systemd-fsck[775]: ROOT: clean, 614/553520 files, 56019/553472 blocks Jul 2 00:53:36.784446 systemd[1]: Finished systemd-fsck-root.service. Jul 2 00:53:36.785000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.785939 systemd[1]: Mounting sysroot.mount... Jul 2 00:53:36.792234 systemd[1]: Mounted sysroot.mount. Jul 2 00:53:36.793199 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Jul 2 00:53:36.792872 systemd[1]: Reached target initrd-root-fs.target. Jul 2 00:53:36.794623 systemd[1]: Mounting sysroot-usr.mount... Jul 2 00:53:36.795298 systemd[1]: flatcar-metadata-hostname.service was skipped because no trigger condition checks were met. Jul 2 00:53:36.795334 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Jul 2 00:53:36.795358 systemd[1]: Reached target ignition-diskful.target. Jul 2 00:53:36.797191 systemd[1]: Mounted sysroot-usr.mount. Jul 2 00:53:36.799239 systemd[1]: Starting initrd-setup-root.service... Jul 2 00:53:36.803234 initrd-setup-root[785]: cut: /sysroot/etc/passwd: No such file or directory Jul 2 00:53:36.806464 initrd-setup-root[793]: cut: /sysroot/etc/group: No such file or directory Jul 2 00:53:36.810206 initrd-setup-root[801]: cut: /sysroot/etc/shadow: No such file or directory Jul 2 00:53:36.813982 initrd-setup-root[809]: cut: /sysroot/etc/gshadow: No such file or directory Jul 2 00:53:36.839586 systemd[1]: Finished initrd-setup-root.service. Jul 2 00:53:36.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.840917 systemd[1]: Starting ignition-mount.service... Jul 2 00:53:36.842006 systemd[1]: Starting sysroot-boot.service... Jul 2 00:53:36.846833 bash[826]: umount: /sysroot/usr/share/oem: not mounted. Jul 2 00:53:36.855575 ignition[828]: INFO : Ignition 2.14.0 Jul 2 00:53:36.855575 ignition[828]: INFO : Stage: mount Jul 2 00:53:36.856880 ignition[828]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:36.856880 ignition[828]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:36.856880 ignition[828]: INFO : mount: mount passed Jul 2 00:53:36.856880 ignition[828]: INFO : Ignition finished successfully Jul 2 00:53:36.857000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:36.857375 systemd[1]: Finished ignition-mount.service. Jul 2 00:53:36.863863 systemd[1]: Finished sysroot-boot.service. Jul 2 00:53:36.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:37.515211 systemd[1]: Mounting sysroot-usr-share-oem.mount... Jul 2 00:53:37.520547 kernel: BTRFS: device label OEM devid 1 transid 13 /dev/vda6 scanned by mount (836) Jul 2 00:53:37.524717 kernel: BTRFS info (device vda6): using crc32c (crc32c-generic) checksum algorithm Jul 2 00:53:37.524738 kernel: BTRFS info (device vda6): using free space tree Jul 2 00:53:37.524748 kernel: BTRFS info (device vda6): has skinny extents Jul 2 00:53:37.528106 systemd[1]: Mounted sysroot-usr-share-oem.mount. Jul 2 00:53:37.529395 systemd[1]: Starting ignition-files.service... Jul 2 00:53:37.542210 ignition[856]: INFO : Ignition 2.14.0 Jul 2 00:53:37.542210 ignition[856]: INFO : Stage: files Jul 2 00:53:37.543555 ignition[856]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:37.543555 ignition[856]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:37.543555 ignition[856]: DEBUG : files: compiled without relabeling support, skipping Jul 2 00:53:37.550239 ignition[856]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Jul 2 00:53:37.550239 ignition[856]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Jul 2 00:53:37.553413 ignition[856]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Jul 2 00:53:37.554541 ignition[856]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Jul 2 00:53:37.554541 ignition[856]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Jul 2 00:53:37.554470 unknown[856]: wrote ssh authorized keys file for user: core Jul 2 00:53:37.557459 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:53:37.557459 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Jul 2 00:53:37.805930 systemd-networkd[739]: eth0: Gained IPv6LL Jul 2 00:53:37.954706 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:53:38.008583 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:53:38.019775 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-arm64.raw: attempt #1 Jul 2 00:53:38.329705 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): GET result: OK Jul 2 00:53:38.585358 ignition[856]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-arm64.raw" Jul 2 00:53:38.587051 ignition[856]: INFO : files: op(b): [started] processing unit "prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(b): op(c): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(b): op(c): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(b): [finished] processing unit "prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(d): [started] processing unit "coreos-metadata.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(d): op(e): [started] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(d): op(e): [finished] writing unit "coreos-metadata.service" at "/sysroot/etc/systemd/system/coreos-metadata.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(d): [finished] processing unit "coreos-metadata.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(f): [started] setting preset to enabled for "prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(f): [finished] setting preset to enabled for "prepare-helm.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(10): [started] setting preset to disabled for "coreos-metadata.service" Jul 2 00:53:38.588028 ignition[856]: INFO : files: op(10): op(11): [started] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:53:38.622190 ignition[856]: INFO : files: op(10): op(11): [finished] removing enablement symlink(s) for "coreos-metadata.service" Jul 2 00:53:38.624194 ignition[856]: INFO : files: op(10): [finished] setting preset to disabled for "coreos-metadata.service" Jul 2 00:53:38.624194 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [started] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:53:38.624194 ignition[856]: INFO : files: createResultFile: createFiles: op(12): [finished] writing file "/sysroot/etc/.ignition-result.json" Jul 2 00:53:38.624194 ignition[856]: INFO : files: files passed Jul 2 00:53:38.624194 ignition[856]: INFO : Ignition finished successfully Jul 2 00:53:38.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.624218 systemd[1]: Finished ignition-files.service. Jul 2 00:53:38.626796 systemd[1]: Starting initrd-setup-root-after-ignition.service... Jul 2 00:53:38.631987 initrd-setup-root-after-ignition[881]: grep: /sysroot/usr/share/oem/oem-release: No such file or directory Jul 2 00:53:38.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.627682 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Jul 2 00:53:38.633000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.635332 initrd-setup-root-after-ignition[883]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Jul 2 00:53:38.628294 systemd[1]: Starting ignition-quench.service... Jul 2 00:53:38.631168 systemd[1]: ignition-quench.service: Deactivated successfully. Jul 2 00:53:38.631251 systemd[1]: Finished ignition-quench.service. Jul 2 00:53:38.633146 systemd[1]: Finished initrd-setup-root-after-ignition.service. Jul 2 00:53:38.634130 systemd[1]: Reached target ignition-complete.target. Jul 2 00:53:38.636483 systemd[1]: Starting initrd-parse-etc.service... Jul 2 00:53:38.648350 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Jul 2 00:53:38.648441 systemd[1]: Finished initrd-parse-etc.service. Jul 2 00:53:38.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.649000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.649773 systemd[1]: Reached target initrd-fs.target. Jul 2 00:53:38.650653 systemd[1]: Reached target initrd.target. Jul 2 00:53:38.651617 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Jul 2 00:53:38.652288 systemd[1]: Starting dracut-pre-pivot.service... Jul 2 00:53:38.662851 systemd[1]: Finished dracut-pre-pivot.service. Jul 2 00:53:38.662000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.664226 systemd[1]: Starting initrd-cleanup.service... Jul 2 00:53:38.672121 systemd[1]: Stopped target network.target. Jul 2 00:53:38.672859 systemd[1]: Stopped target nss-lookup.target. Jul 2 00:53:38.673796 systemd[1]: Stopped target remote-cryptsetup.target. Jul 2 00:53:38.674842 systemd[1]: Stopped target timers.target. Jul 2 00:53:38.675813 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Jul 2 00:53:38.676000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.675919 systemd[1]: Stopped dracut-pre-pivot.service. Jul 2 00:53:38.676847 systemd[1]: Stopped target initrd.target. Jul 2 00:53:38.677803 systemd[1]: Stopped target basic.target. Jul 2 00:53:38.678794 systemd[1]: Stopped target ignition-complete.target. Jul 2 00:53:38.679915 systemd[1]: Stopped target ignition-diskful.target. Jul 2 00:53:38.681011 systemd[1]: Stopped target initrd-root-device.target. Jul 2 00:53:38.682077 systemd[1]: Stopped target remote-fs.target. Jul 2 00:53:38.683065 systemd[1]: Stopped target remote-fs-pre.target. Jul 2 00:53:38.684111 systemd[1]: Stopped target sysinit.target. Jul 2 00:53:38.685040 systemd[1]: Stopped target local-fs.target. Jul 2 00:53:38.685994 systemd[1]: Stopped target local-fs-pre.target. Jul 2 00:53:38.686943 systemd[1]: Stopped target swap.target. Jul 2 00:53:38.688000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.687917 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Jul 2 00:53:38.688015 systemd[1]: Stopped dracut-pre-mount.service. Jul 2 00:53:38.690000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.688994 systemd[1]: Stopped target cryptsetup.target. Jul 2 00:53:38.691000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.689811 systemd[1]: dracut-initqueue.service: Deactivated successfully. Jul 2 00:53:38.689901 systemd[1]: Stopped dracut-initqueue.service. Jul 2 00:53:38.690969 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Jul 2 00:53:38.691060 systemd[1]: Stopped ignition-fetch-offline.service. Jul 2 00:53:38.691996 systemd[1]: Stopped target paths.target. Jul 2 00:53:38.692826 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Jul 2 00:53:38.696558 systemd[1]: Stopped systemd-ask-password-console.path. Jul 2 00:53:38.697248 systemd[1]: Stopped target slices.target. Jul 2 00:53:38.698231 systemd[1]: Stopped target sockets.target. Jul 2 00:53:38.699113 systemd[1]: iscsid.socket: Deactivated successfully. Jul 2 00:53:38.699181 systemd[1]: Closed iscsid.socket. Jul 2 00:53:38.699997 systemd[1]: iscsiuio.socket: Deactivated successfully. Jul 2 00:53:38.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.700060 systemd[1]: Closed iscsiuio.socket. Jul 2 00:53:38.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.701010 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Jul 2 00:53:38.701106 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Jul 2 00:53:38.702014 systemd[1]: ignition-files.service: Deactivated successfully. Jul 2 00:53:38.702099 systemd[1]: Stopped ignition-files.service. Jul 2 00:53:38.703728 systemd[1]: Stopping ignition-mount.service... Jul 2 00:53:38.705259 systemd[1]: Stopping sysroot-boot.service... Jul 2 00:53:38.706405 systemd[1]: Stopping systemd-networkd.service... Jul 2 00:53:38.708000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.707379 systemd[1]: Stopping systemd-resolved.service... Jul 2 00:53:38.709000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.708174 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Jul 2 00:53:38.712400 ignition[896]: INFO : Ignition 2.14.0 Jul 2 00:53:38.712400 ignition[896]: INFO : Stage: umount Jul 2 00:53:38.712400 ignition[896]: INFO : no configs at "/usr/lib/ignition/base.d" Jul 2 00:53:38.712400 ignition[896]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/qemu" Jul 2 00:53:38.712400 ignition[896]: INFO : umount: umount passed Jul 2 00:53:38.712400 ignition[896]: INFO : Ignition finished successfully Jul 2 00:53:38.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.713000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.715000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.720000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.708300 systemd[1]: Stopped systemd-udev-trigger.service. Jul 2 00:53:38.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.709458 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Jul 2 00:53:38.722000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.709577 systemd[1]: Stopped dracut-pre-trigger.service. Jul 2 00:53:38.712788 systemd[1]: initrd-cleanup.service: Deactivated successfully. Jul 2 00:53:38.712862 systemd[1]: Finished initrd-cleanup.service. Jul 2 00:53:38.728000 audit: BPF prog-id=6 op=UNLOAD Jul 2 00:53:38.714445 systemd[1]: sysroot-boot.mount: Deactivated successfully. Jul 2 00:53:38.714711 systemd-networkd[739]: eth0: DHCPv6 lease lost Jul 2 00:53:38.714840 systemd[1]: ignition-mount.service: Deactivated successfully. Jul 2 00:53:38.730000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.714910 systemd[1]: Stopped ignition-mount.service. Jul 2 00:53:38.731000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.715891 systemd[1]: ignition-disks.service: Deactivated successfully. Jul 2 00:53:38.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.734000 audit: BPF prog-id=9 op=UNLOAD Jul 2 00:53:38.715946 systemd[1]: Stopped ignition-disks.service. Jul 2 00:53:38.717670 systemd[1]: ignition-kargs.service: Deactivated successfully. Jul 2 00:53:38.717708 systemd[1]: Stopped ignition-kargs.service. Jul 2 00:53:38.718922 systemd[1]: ignition-setup.service: Deactivated successfully. Jul 2 00:53:38.718958 systemd[1]: Stopped ignition-setup.service. Jul 2 00:53:38.720791 systemd[1]: systemd-resolved.service: Deactivated successfully. Jul 2 00:53:38.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.720880 systemd[1]: Stopped systemd-resolved.service. Jul 2 00:53:38.722077 systemd[1]: systemd-networkd.service: Deactivated successfully. Jul 2 00:53:38.722168 systemd[1]: Stopped systemd-networkd.service. Jul 2 00:53:38.745000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.723458 systemd[1]: systemd-networkd.socket: Deactivated successfully. Jul 2 00:53:38.746000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.723485 systemd[1]: Closed systemd-networkd.socket. Jul 2 00:53:38.747000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.726657 systemd[1]: Stopping network-cleanup.service... Jul 2 00:53:38.727577 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Jul 2 00:53:38.727630 systemd[1]: Stopped parse-ip-for-networkd.service. Jul 2 00:53:38.750000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.730732 systemd[1]: systemd-sysctl.service: Deactivated successfully. Jul 2 00:53:38.751000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.730779 systemd[1]: Stopped systemd-sysctl.service. Jul 2 00:53:38.753000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.732368 systemd[1]: systemd-modules-load.service: Deactivated successfully. Jul 2 00:53:38.732408 systemd[1]: Stopped systemd-modules-load.service. Jul 2 00:53:38.733607 systemd[1]: Stopping systemd-udevd.service... Jul 2 00:53:38.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.739394 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Jul 2 00:53:38.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.741365 systemd[1]: systemd-udevd.service: Deactivated successfully. Jul 2 00:53:38.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.757000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.741521 systemd[1]: Stopped systemd-udevd.service. Jul 2 00:53:38.742674 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Jul 2 00:53:38.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.742709 systemd[1]: Closed systemd-udevd-control.socket. Jul 2 00:53:38.743796 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Jul 2 00:53:38.743828 systemd[1]: Closed systemd-udevd-kernel.socket. Jul 2 00:53:38.744914 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Jul 2 00:53:38.744957 systemd[1]: Stopped dracut-pre-udev.service. Jul 2 00:53:38.746079 systemd[1]: dracut-cmdline.service: Deactivated successfully. Jul 2 00:53:38.746114 systemd[1]: Stopped dracut-cmdline.service. Jul 2 00:53:38.747131 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Jul 2 00:53:38.747169 systemd[1]: Stopped dracut-cmdline-ask.service. Jul 2 00:53:38.748894 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Jul 2 00:53:38.749890 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Jul 2 00:53:38.749948 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Jul 2 00:53:38.751865 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Jul 2 00:53:38.751906 systemd[1]: Stopped kmod-static-nodes.service. Jul 2 00:53:38.752509 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Jul 2 00:53:38.752567 systemd[1]: Stopped systemd-vconsole-setup.service. Jul 2 00:53:38.754387 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Jul 2 00:53:38.754845 systemd[1]: sysroot-boot.service: Deactivated successfully. Jul 2 00:53:38.754931 systemd[1]: Stopped sysroot-boot.service. Jul 2 00:53:38.756199 systemd[1]: network-cleanup.service: Deactivated successfully. Jul 2 00:53:38.756274 systemd[1]: Stopped network-cleanup.service. Jul 2 00:53:38.757168 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Jul 2 00:53:38.757240 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Jul 2 00:53:38.758594 systemd[1]: Reached target initrd-switch-root.target. Jul 2 00:53:38.759646 systemd[1]: initrd-setup-root.service: Deactivated successfully. Jul 2 00:53:38.759691 systemd[1]: Stopped initrd-setup-root.service. Jul 2 00:53:38.761214 systemd[1]: Starting initrd-switch-root.service... Jul 2 00:53:38.767169 systemd[1]: Switching root. Jul 2 00:53:38.785142 iscsid[746]: iscsid shutting down. Jul 2 00:53:38.785646 systemd-journald[290]: Received SIGTERM from PID 1 (n/a). Jul 2 00:53:38.785685 systemd-journald[290]: Journal stopped Jul 2 00:53:40.734821 kernel: SELinux: Class mctp_socket not defined in policy. Jul 2 00:53:40.734876 kernel: SELinux: Class anon_inode not defined in policy. Jul 2 00:53:40.734889 kernel: SELinux: the above unknown classes and permissions will be allowed Jul 2 00:53:40.734899 kernel: SELinux: policy capability network_peer_controls=1 Jul 2 00:53:40.734913 kernel: SELinux: policy capability open_perms=1 Jul 2 00:53:40.734922 kernel: SELinux: policy capability extended_socket_class=1 Jul 2 00:53:40.734932 kernel: SELinux: policy capability always_check_network=0 Jul 2 00:53:40.734942 kernel: SELinux: policy capability cgroup_seclabel=1 Jul 2 00:53:40.734951 kernel: SELinux: policy capability nnp_nosuid_transition=1 Jul 2 00:53:40.734979 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Jul 2 00:53:40.734990 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Jul 2 00:53:40.735003 systemd[1]: Successfully loaded SELinux policy in 31.598ms. Jul 2 00:53:40.735026 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 6.874ms. Jul 2 00:53:40.735038 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Jul 2 00:53:40.735049 systemd[1]: Detected virtualization kvm. Jul 2 00:53:40.735059 systemd[1]: Detected architecture arm64. Jul 2 00:53:40.735069 systemd[1]: Detected first boot. Jul 2 00:53:40.735079 systemd[1]: Initializing machine ID from VM UUID. Jul 2 00:53:40.735091 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Jul 2 00:53:40.735100 systemd[1]: Populated /etc with preset unit settings. Jul 2 00:53:40.735112 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:53:40.735124 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:53:40.735136 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:53:40.735146 kernel: kauditd_printk_skb: 78 callbacks suppressed Jul 2 00:53:40.735156 kernel: audit: type=1334 audit(1719881620.619:82): prog-id=12 op=LOAD Jul 2 00:53:40.735165 kernel: audit: type=1334 audit(1719881620.619:83): prog-id=3 op=UNLOAD Jul 2 00:53:40.735176 kernel: audit: type=1334 audit(1719881620.620:84): prog-id=13 op=LOAD Jul 2 00:53:40.735185 kernel: audit: type=1334 audit(1719881620.620:85): prog-id=14 op=LOAD Jul 2 00:53:40.735198 kernel: audit: type=1334 audit(1719881620.620:86): prog-id=4 op=UNLOAD Jul 2 00:53:40.735211 kernel: audit: type=1334 audit(1719881620.620:87): prog-id=5 op=UNLOAD Jul 2 00:53:40.735221 kernel: audit: type=1334 audit(1719881620.621:88): prog-id=15 op=LOAD Jul 2 00:53:40.735231 kernel: audit: type=1334 audit(1719881620.621:89): prog-id=12 op=UNLOAD Jul 2 00:53:40.735240 kernel: audit: type=1334 audit(1719881620.621:90): prog-id=16 op=LOAD Jul 2 00:53:40.735250 kernel: audit: type=1334 audit(1719881620.622:91): prog-id=17 op=LOAD Jul 2 00:53:40.735260 systemd[1]: iscsiuio.service: Deactivated successfully. Jul 2 00:53:40.735271 systemd[1]: Stopped iscsiuio.service. Jul 2 00:53:40.735281 systemd[1]: iscsid.service: Deactivated successfully. Jul 2 00:53:40.735292 systemd[1]: Stopped iscsid.service. Jul 2 00:53:40.735303 systemd[1]: initrd-switch-root.service: Deactivated successfully. Jul 2 00:53:40.735315 systemd[1]: Stopped initrd-switch-root.service. Jul 2 00:53:40.735325 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Jul 2 00:53:40.735336 systemd[1]: Created slice system-addon\x2dconfig.slice. Jul 2 00:53:40.735346 systemd[1]: Created slice system-addon\x2drun.slice. Jul 2 00:53:40.735356 systemd[1]: Created slice system-getty.slice. Jul 2 00:53:40.735367 systemd[1]: Created slice system-modprobe.slice. Jul 2 00:53:40.735377 systemd[1]: Created slice system-serial\x2dgetty.slice. Jul 2 00:53:40.735388 systemd[1]: Created slice system-system\x2dcloudinit.slice. Jul 2 00:53:40.735399 systemd[1]: Created slice system-systemd\x2dfsck.slice. Jul 2 00:53:40.735410 systemd[1]: Created slice user.slice. Jul 2 00:53:40.735420 systemd[1]: Started systemd-ask-password-console.path. Jul 2 00:53:40.735431 systemd[1]: Started systemd-ask-password-wall.path. Jul 2 00:53:40.735441 systemd[1]: Set up automount boot.automount. Jul 2 00:53:40.735451 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Jul 2 00:53:40.735461 systemd[1]: Stopped target initrd-switch-root.target. Jul 2 00:53:40.735472 systemd[1]: Stopped target initrd-fs.target. Jul 2 00:53:40.735482 systemd[1]: Stopped target initrd-root-fs.target. Jul 2 00:53:40.735494 systemd[1]: Reached target integritysetup.target. Jul 2 00:53:40.735505 systemd[1]: Reached target remote-cryptsetup.target. Jul 2 00:53:40.735521 systemd[1]: Reached target remote-fs.target. Jul 2 00:53:40.735539 systemd[1]: Reached target slices.target. Jul 2 00:53:40.735551 systemd[1]: Reached target swap.target. Jul 2 00:53:40.735563 systemd[1]: Reached target torcx.target. Jul 2 00:53:40.735573 systemd[1]: Reached target veritysetup.target. Jul 2 00:53:40.735584 systemd[1]: Listening on systemd-coredump.socket. Jul 2 00:53:40.735594 systemd[1]: Listening on systemd-initctl.socket. Jul 2 00:53:40.735605 systemd[1]: Listening on systemd-networkd.socket. Jul 2 00:53:40.735616 systemd[1]: Listening on systemd-udevd-control.socket. Jul 2 00:53:40.735626 systemd[1]: Listening on systemd-udevd-kernel.socket. Jul 2 00:53:40.735636 systemd[1]: Listening on systemd-userdbd.socket. Jul 2 00:53:40.735646 systemd[1]: Mounting dev-hugepages.mount... Jul 2 00:53:40.735657 systemd[1]: Mounting dev-mqueue.mount... Jul 2 00:53:40.735667 systemd[1]: Mounting media.mount... Jul 2 00:53:40.735677 systemd[1]: Mounting sys-kernel-debug.mount... Jul 2 00:53:40.735687 systemd[1]: Mounting sys-kernel-tracing.mount... Jul 2 00:53:40.735698 systemd[1]: Mounting tmp.mount... Jul 2 00:53:40.735709 systemd[1]: Starting flatcar-tmpfiles.service... Jul 2 00:53:40.735720 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:53:40.735730 systemd[1]: Starting kmod-static-nodes.service... Jul 2 00:53:40.735740 systemd[1]: Starting modprobe@configfs.service... Jul 2 00:53:40.735751 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:53:40.735760 systemd[1]: Starting modprobe@drm.service... Jul 2 00:53:40.735771 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:53:40.735782 systemd[1]: Starting modprobe@fuse.service... Jul 2 00:53:40.735792 systemd[1]: Starting modprobe@loop.service... Jul 2 00:53:40.735803 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Jul 2 00:53:40.735814 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Jul 2 00:53:40.735824 systemd[1]: Stopped systemd-fsck-root.service. Jul 2 00:53:40.735835 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Jul 2 00:53:40.735845 systemd[1]: Stopped systemd-fsck-usr.service. Jul 2 00:53:40.735854 systemd[1]: Stopped systemd-journald.service. Jul 2 00:53:40.735865 kernel: fuse: init (API version 7.34) Jul 2 00:53:40.735876 systemd[1]: Starting systemd-journald.service... Jul 2 00:53:40.735888 kernel: loop: module loaded Jul 2 00:53:40.735898 systemd[1]: Starting systemd-modules-load.service... Jul 2 00:53:40.735908 systemd[1]: Starting systemd-network-generator.service... Jul 2 00:53:40.735920 systemd[1]: Starting systemd-remount-fs.service... Jul 2 00:53:40.735931 systemd[1]: Starting systemd-udev-trigger.service... Jul 2 00:53:40.735942 systemd[1]: verity-setup.service: Deactivated successfully. Jul 2 00:53:40.735953 systemd[1]: Stopped verity-setup.service. Jul 2 00:53:40.735963 systemd[1]: Mounted dev-hugepages.mount. Jul 2 00:53:40.735973 systemd[1]: Mounted dev-mqueue.mount. Jul 2 00:53:40.735983 systemd[1]: Mounted media.mount. Jul 2 00:53:40.735994 systemd[1]: Mounted sys-kernel-debug.mount. Jul 2 00:53:40.736005 systemd[1]: Mounted sys-kernel-tracing.mount. Jul 2 00:53:40.736017 systemd[1]: Mounted tmp.mount. Jul 2 00:53:40.736027 systemd[1]: Finished kmod-static-nodes.service. Jul 2 00:53:40.736037 systemd[1]: modprobe@configfs.service: Deactivated successfully. Jul 2 00:53:40.736048 systemd[1]: Finished modprobe@configfs.service. Jul 2 00:53:40.736058 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:53:40.736071 systemd-journald[996]: Journal started Jul 2 00:53:40.736114 systemd-journald[996]: Runtime Journal (/run/log/journal/84dfd35dd2c848f782acc81af15a8f5a) is 6.0M, max 48.7M, 42.6M free. Jul 2 00:53:38.851000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Jul 2 00:53:38.927000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:53:38.927000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Jul 2 00:53:38.928000 audit: BPF prog-id=10 op=LOAD Jul 2 00:53:38.928000 audit: BPF prog-id=10 op=UNLOAD Jul 2 00:53:38.928000 audit: BPF prog-id=11 op=LOAD Jul 2 00:53:38.928000 audit: BPF prog-id=11 op=UNLOAD Jul 2 00:53:38.966000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Jul 2 00:53:38.966000 audit[929]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=40001c58c4 a1=40000c8de0 a2=40000cf0c0 a3=32 items=0 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:38.966000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:53:38.967000 audit[929]: AVC avc: denied { associate } for pid=929 comm="torcx-generator" name="lib" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Jul 2 00:53:38.967000 audit[929]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=40001c59a9 a2=1ed a3=0 items=2 ppid=912 pid=929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:38.967000 audit: CWD cwd="/" Jul 2 00:53:38.967000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:53:38.967000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:53:38.967000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Jul 2 00:53:40.619000 audit: BPF prog-id=12 op=LOAD Jul 2 00:53:40.619000 audit: BPF prog-id=3 op=UNLOAD Jul 2 00:53:40.620000 audit: BPF prog-id=13 op=LOAD Jul 2 00:53:40.620000 audit: BPF prog-id=14 op=LOAD Jul 2 00:53:40.620000 audit: BPF prog-id=4 op=UNLOAD Jul 2 00:53:40.620000 audit: BPF prog-id=5 op=UNLOAD Jul 2 00:53:40.621000 audit: BPF prog-id=15 op=LOAD Jul 2 00:53:40.621000 audit: BPF prog-id=12 op=UNLOAD Jul 2 00:53:40.621000 audit: BPF prog-id=16 op=LOAD Jul 2 00:53:40.622000 audit: BPF prog-id=17 op=LOAD Jul 2 00:53:40.622000 audit: BPF prog-id=13 op=UNLOAD Jul 2 00:53:40.622000 audit: BPF prog-id=14 op=UNLOAD Jul 2 00:53:40.623000 audit: BPF prog-id=18 op=LOAD Jul 2 00:53:40.623000 audit: BPF prog-id=15 op=UNLOAD Jul 2 00:53:40.623000 audit: BPF prog-id=19 op=LOAD Jul 2 00:53:40.624000 audit: BPF prog-id=20 op=LOAD Jul 2 00:53:40.736777 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:53:40.624000 audit: BPF prog-id=16 op=UNLOAD Jul 2 00:53:40.624000 audit: BPF prog-id=17 op=UNLOAD Jul 2 00:53:40.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.627000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.631000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.637000 audit: BPF prog-id=18 op=UNLOAD Jul 2 00:53:40.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.704000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.705000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.705000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.707000 audit: BPF prog-id=21 op=LOAD Jul 2 00:53:40.707000 audit: BPF prog-id=22 op=LOAD Jul 2 00:53:40.707000 audit: BPF prog-id=23 op=LOAD Jul 2 00:53:40.707000 audit: BPF prog-id=19 op=UNLOAD Jul 2 00:53:40.707000 audit: BPF prog-id=20 op=UNLOAD Jul 2 00:53:40.721000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.731000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Jul 2 00:53:40.731000 audit[996]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=5 a1=fffff8c8de20 a2=4000 a3=1 items=0 ppid=1 pid=996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:40.731000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Jul 2 00:53:40.734000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.965177 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:53:40.618236 systemd[1]: Queued start job for default target multi-user.target. Jul 2 00:53:38.965388 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:53:40.736000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.736000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.618249 systemd[1]: Unnecessary job was removed for dev-vda6.device. Jul 2 00:53:38.965406 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:53:40.625345 systemd[1]: systemd-journald.service: Deactivated successfully. Jul 2 00:53:38.965434 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Jul 2 00:53:38.965443 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Jul 2 00:53:38.965468 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Jul 2 00:53:38.965479 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Jul 2 00:53:38.965707 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Jul 2 00:53:38.965743 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Jul 2 00:53:38.965755 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Jul 2 00:53:38.966416 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Jul 2 00:53:38.966451 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Jul 2 00:53:38.966469 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.5: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.5 Jul 2 00:53:38.966483 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Jul 2 00:53:40.738550 systemd[1]: Started systemd-journald.service. Jul 2 00:53:38.966500 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.5: no such file or directory" path=/var/lib/torcx/store/3510.3.5 Jul 2 00:53:40.738000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:38.966521 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Jul 2 00:53:40.374568 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:53:40.374824 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:53:40.374926 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:53:40.375091 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Jul 2 00:53:40.375139 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Jul 2 00:53:40.375193 /usr/lib/systemd/system-generators/torcx-generator[929]: time="2024-07-02T00:53:40Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Jul 2 00:53:40.739174 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:53:40.739823 systemd[1]: Finished modprobe@drm.service. Jul 2 00:53:40.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.739000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.740756 systemd[1]: Finished flatcar-tmpfiles.service. Jul 2 00:53:40.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.741670 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:53:40.741823 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:53:40.741000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.741000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.742698 systemd[1]: modprobe@fuse.service: Deactivated successfully. Jul 2 00:53:40.742846 systemd[1]: Finished modprobe@fuse.service. Jul 2 00:53:40.742000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.743731 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:53:40.743881 systemd[1]: Finished modprobe@loop.service. Jul 2 00:53:40.743000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.743000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.744743 systemd[1]: Finished systemd-modules-load.service. Jul 2 00:53:40.744000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.745795 systemd[1]: Finished systemd-network-generator.service. Jul 2 00:53:40.745000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.746780 systemd[1]: Finished systemd-remount-fs.service. Jul 2 00:53:40.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.748007 systemd[1]: Reached target network-pre.target. Jul 2 00:53:40.749797 systemd[1]: Mounting sys-fs-fuse-connections.mount... Jul 2 00:53:40.751473 systemd[1]: Mounting sys-kernel-config.mount... Jul 2 00:53:40.752121 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Jul 2 00:53:40.753781 systemd[1]: Starting systemd-hwdb-update.service... Jul 2 00:53:40.755481 systemd[1]: Starting systemd-journal-flush.service... Jul 2 00:53:40.756403 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:53:40.757411 systemd[1]: Starting systemd-random-seed.service... Jul 2 00:53:40.758196 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:53:40.759197 systemd[1]: Starting systemd-sysctl.service... Jul 2 00:53:40.761051 systemd[1]: Starting systemd-sysusers.service... Jul 2 00:53:40.766633 systemd-journald[996]: Time spent on flushing to /var/log/journal/84dfd35dd2c848f782acc81af15a8f5a is 20.096ms for 999 entries. Jul 2 00:53:40.766633 systemd-journald[996]: System Journal (/var/log/journal/84dfd35dd2c848f782acc81af15a8f5a) is 8.0M, max 195.6M, 187.6M free. Jul 2 00:53:40.800061 systemd-journald[996]: Received client request to flush runtime journal. Jul 2 00:53:40.769000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.778000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.792000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.765003 systemd[1]: Mounted sys-fs-fuse-connections.mount. Jul 2 00:53:40.765915 systemd[1]: Mounted sys-kernel-config.mount. Jul 2 00:53:40.800690 udevadm[1030]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Jul 2 00:53:40.769665 systemd[1]: Finished systemd-random-seed.service. Jul 2 00:53:40.770403 systemd[1]: Reached target first-boot-complete.target. Jul 2 00:53:40.777376 systemd[1]: Finished systemd-udev-trigger.service. Jul 2 00:53:40.778453 systemd[1]: Finished systemd-sysctl.service. Jul 2 00:53:40.780198 systemd[1]: Starting systemd-udev-settle.service... Jul 2 00:53:40.792092 systemd[1]: Finished systemd-sysusers.service. Jul 2 00:53:40.793854 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Jul 2 00:53:40.801015 systemd[1]: Finished systemd-journal-flush.service. Jul 2 00:53:40.801000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:40.811777 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Jul 2 00:53:40.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.148671 systemd[1]: Finished systemd-hwdb-update.service. Jul 2 00:53:41.148000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.149000 audit: BPF prog-id=24 op=LOAD Jul 2 00:53:41.149000 audit: BPF prog-id=25 op=LOAD Jul 2 00:53:41.149000 audit: BPF prog-id=7 op=UNLOAD Jul 2 00:53:41.149000 audit: BPF prog-id=8 op=UNLOAD Jul 2 00:53:41.150933 systemd[1]: Starting systemd-udevd.service... Jul 2 00:53:41.169961 systemd-udevd[1034]: Using default interface naming scheme 'v252'. Jul 2 00:53:41.182435 systemd[1]: Started systemd-udevd.service. Jul 2 00:53:41.182000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.183000 audit: BPF prog-id=26 op=LOAD Jul 2 00:53:41.184738 systemd[1]: Starting systemd-networkd.service... Jul 2 00:53:41.196000 audit: BPF prog-id=27 op=LOAD Jul 2 00:53:41.196000 audit: BPF prog-id=28 op=LOAD Jul 2 00:53:41.196000 audit: BPF prog-id=29 op=LOAD Jul 2 00:53:41.198669 systemd[1]: Starting systemd-userdbd.service... Jul 2 00:53:41.216616 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Jul 2 00:53:41.253166 systemd[1]: Started systemd-userdbd.service. Jul 2 00:53:41.253000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.256031 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Jul 2 00:53:41.273876 systemd[1]: Finished systemd-udev-settle.service. Jul 2 00:53:41.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.275768 systemd[1]: Starting lvm2-activation-early.service... Jul 2 00:53:41.290611 lvm[1066]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:53:41.307783 systemd-networkd[1042]: lo: Link UP Jul 2 00:53:41.307794 systemd-networkd[1042]: lo: Gained carrier Jul 2 00:53:41.308132 systemd-networkd[1042]: Enumeration completed Jul 2 00:53:41.308239 systemd-networkd[1042]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Jul 2 00:53:41.308260 systemd[1]: Started systemd-networkd.service. Jul 2 00:53:41.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.309848 systemd-networkd[1042]: eth0: Link UP Jul 2 00:53:41.309857 systemd-networkd[1042]: eth0: Gained carrier Jul 2 00:53:41.321613 systemd[1]: Finished lvm2-activation-early.service. Jul 2 00:53:41.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.322671 systemd[1]: Reached target cryptsetup.target. Jul 2 00:53:41.324862 systemd[1]: Starting lvm2-activation.service... Jul 2 00:53:41.328290 lvm[1068]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Jul 2 00:53:41.333687 systemd-networkd[1042]: eth0: DHCPv4 address 10.0.0.92/16, gateway 10.0.0.1 acquired from 10.0.0.1 Jul 2 00:53:41.353456 systemd[1]: Finished lvm2-activation.service. Jul 2 00:53:41.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.354282 systemd[1]: Reached target local-fs-pre.target. Jul 2 00:53:41.354950 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Jul 2 00:53:41.354977 systemd[1]: Reached target local-fs.target. Jul 2 00:53:41.355551 systemd[1]: Reached target machines.target. Jul 2 00:53:41.357255 systemd[1]: Starting ldconfig.service... Jul 2 00:53:41.358145 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.358196 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:41.359584 systemd[1]: Starting systemd-boot-update.service... Jul 2 00:53:41.362060 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Jul 2 00:53:41.364264 systemd[1]: Starting systemd-machine-id-commit.service... Jul 2 00:53:41.366653 systemd[1]: Starting systemd-sysext.service... Jul 2 00:53:41.373438 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1070 (bootctl) Jul 2 00:53:41.377429 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Jul 2 00:53:41.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.380906 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Jul 2 00:53:41.389496 systemd[1]: Unmounting usr-share-oem.mount... Jul 2 00:53:41.398495 systemd[1]: usr-share-oem.mount: Deactivated successfully. Jul 2 00:53:41.398712 systemd[1]: Unmounted usr-share-oem.mount. Jul 2 00:53:41.431643 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Jul 2 00:53:41.432223 systemd[1]: Finished systemd-machine-id-commit.service. Jul 2 00:53:41.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.433551 kernel: loop0: detected capacity change from 0 to 194512 Jul 2 00:53:41.444548 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Jul 2 00:53:41.446301 systemd-fsck[1081]: fsck.fat 4.2 (2021-01-31) Jul 2 00:53:41.446301 systemd-fsck[1081]: /dev/vda1: 236 files, 117047/258078 clusters Jul 2 00:53:41.449055 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Jul 2 00:53:41.449000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.452770 systemd[1]: Mounting boot.mount... Jul 2 00:53:41.461582 kernel: loop1: detected capacity change from 0 to 194512 Jul 2 00:53:41.464460 systemd[1]: Mounted boot.mount. Jul 2 00:53:41.466201 (sd-sysext)[1086]: Using extensions 'kubernetes'. Jul 2 00:53:41.466572 (sd-sysext)[1086]: Merged extensions into '/usr'. Jul 2 00:53:41.472931 systemd[1]: Finished systemd-boot-update.service. Jul 2 00:53:41.473000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.486119 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.487855 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:53:41.489843 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:53:41.491752 systemd[1]: Starting modprobe@loop.service... Jul 2 00:53:41.492497 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.492946 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:41.493956 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:53:41.494299 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:53:41.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.495483 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:53:41.495706 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:53:41.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.495000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.496827 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:53:41.496937 systemd[1]: Finished modprobe@loop.service. Jul 2 00:53:41.497000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.498127 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:53:41.498237 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.538707 ldconfig[1069]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Jul 2 00:53:41.544600 systemd[1]: Finished ldconfig.service. Jul 2 00:53:41.544000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.725208 systemd[1]: Mounting usr-share-oem.mount... Jul 2 00:53:41.730086 systemd[1]: Mounted usr-share-oem.mount. Jul 2 00:53:41.731791 systemd[1]: Finished systemd-sysext.service. Jul 2 00:53:41.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.733629 systemd[1]: Starting ensure-sysext.service... Jul 2 00:53:41.735164 systemd[1]: Starting systemd-tmpfiles-setup.service... Jul 2 00:53:41.739581 systemd[1]: Reloading. Jul 2 00:53:41.744639 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Jul 2 00:53:41.745611 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Jul 2 00:53:41.747046 systemd-tmpfiles[1093]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Jul 2 00:53:41.779543 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2024-07-02T00:53:41Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:53:41.779575 /usr/lib/systemd/system-generators/torcx-generator[1113]: time="2024-07-02T00:53:41Z" level=info msg="torcx already run" Jul 2 00:53:41.839213 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:53:41.839230 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:53:41.854484 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:53:41.895000 audit: BPF prog-id=30 op=LOAD Jul 2 00:53:41.895000 audit: BPF prog-id=26 op=UNLOAD Jul 2 00:53:41.896000 audit: BPF prog-id=31 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=21 op=UNLOAD Jul 2 00:53:41.896000 audit: BPF prog-id=32 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=33 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=22 op=UNLOAD Jul 2 00:53:41.896000 audit: BPF prog-id=23 op=UNLOAD Jul 2 00:53:41.896000 audit: BPF prog-id=34 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=27 op=UNLOAD Jul 2 00:53:41.896000 audit: BPF prog-id=35 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=36 op=LOAD Jul 2 00:53:41.896000 audit: BPF prog-id=28 op=UNLOAD Jul 2 00:53:41.897000 audit: BPF prog-id=29 op=UNLOAD Jul 2 00:53:41.897000 audit: BPF prog-id=37 op=LOAD Jul 2 00:53:41.897000 audit: BPF prog-id=38 op=LOAD Jul 2 00:53:41.897000 audit: BPF prog-id=24 op=UNLOAD Jul 2 00:53:41.897000 audit: BPF prog-id=25 op=UNLOAD Jul 2 00:53:41.901089 systemd[1]: Finished systemd-tmpfiles-setup.service. Jul 2 00:53:41.901000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.905855 systemd[1]: Starting audit-rules.service... Jul 2 00:53:41.907519 systemd[1]: Starting clean-ca-certificates.service... Jul 2 00:53:41.909525 systemd[1]: Starting systemd-journal-catalog-update.service... Jul 2 00:53:41.912000 audit: BPF prog-id=39 op=LOAD Jul 2 00:53:41.913486 systemd[1]: Starting systemd-resolved.service... Jul 2 00:53:41.915000 audit: BPF prog-id=40 op=LOAD Jul 2 00:53:41.917235 systemd[1]: Starting systemd-timesyncd.service... Jul 2 00:53:41.919238 systemd[1]: Starting systemd-update-utmp.service... Jul 2 00:53:41.923000 audit[1162]: SYSTEM_BOOT pid=1162 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.925059 systemd[1]: Finished clean-ca-certificates.service. Jul 2 00:53:41.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.927730 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.929044 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:53:41.930906 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:53:41.933223 systemd[1]: Starting modprobe@loop.service... Jul 2 00:53:41.933940 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.934116 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:41.934270 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:53:41.935393 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:53:41.935560 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:53:41.935000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.935000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.936726 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:53:41.936850 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:53:41.937000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.937000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.938054 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:53:41.938167 systemd[1]: Finished modprobe@loop.service. Jul 2 00:53:41.938000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.938000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.940449 systemd[1]: Finished systemd-update-utmp.service. Jul 2 00:53:41.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.942785 systemd[1]: Finished systemd-journal-catalog-update.service. Jul 2 00:53:41.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.943860 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.945153 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:53:41.946934 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:53:41.948772 systemd[1]: Starting modprobe@loop.service... Jul 2 00:53:41.949460 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.949808 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:41.951179 systemd[1]: Starting systemd-update-done.service... Jul 2 00:53:41.951917 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:53:41.953000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Jul 2 00:53:41.953000 audit[1177]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff3b46040 a2=420 a3=0 items=0 ppid=1151 pid=1177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:41.953000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Jul 2 00:53:41.953000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.953000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:41.953130 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:53:41.956984 augenrules[1177]: No rules Jul 2 00:53:41.953282 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:53:41.954384 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:53:41.954493 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:53:41.955627 systemd[1]: Finished audit-rules.service. Jul 2 00:53:41.956474 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:53:41.956726 systemd[1]: Finished modprobe@loop.service. Jul 2 00:53:41.959504 systemd[1]: Finished systemd-update-done.service. Jul 2 00:53:41.960726 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.961932 systemd[1]: Starting modprobe@dm_mod.service... Jul 2 00:53:41.963764 systemd[1]: Starting modprobe@drm.service... Jul 2 00:53:41.965366 systemd[1]: Starting modprobe@efi_pstore.service... Jul 2 00:53:41.967200 systemd[1]: Starting modprobe@loop.service... Jul 2 00:53:41.967905 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.968038 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:41.969274 systemd[1]: Starting systemd-networkd-wait-online.service... Jul 2 00:53:41.970141 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Jul 2 00:53:41.971187 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Jul 2 00:53:41.971315 systemd[1]: Finished modprobe@dm_mod.service. Jul 2 00:53:41.972380 systemd[1]: modprobe@drm.service: Deactivated successfully. Jul 2 00:53:41.972496 systemd[1]: Finished modprobe@drm.service. Jul 2 00:53:41.973519 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Jul 2 00:53:41.977441 systemd[1]: Finished modprobe@efi_pstore.service. Jul 2 00:53:41.978644 systemd[1]: modprobe@loop.service: Deactivated successfully. Jul 2 00:53:41.978768 systemd[1]: Finished modprobe@loop.service. Jul 2 00:53:41.979850 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Jul 2 00:53:41.979936 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Jul 2 00:53:41.982129 systemd[1]: Finished ensure-sysext.service. Jul 2 00:53:41.987242 systemd[1]: Started systemd-timesyncd.service. Jul 2 00:53:41.987947 systemd-timesyncd[1156]: Contacted time server 10.0.0.1:123 (10.0.0.1). Jul 2 00:53:41.988010 systemd-timesyncd[1156]: Initial clock synchronization to Tue 2024-07-02 00:53:41.773305 UTC. Jul 2 00:53:41.988527 systemd[1]: Reached target time-set.target. Jul 2 00:53:41.989257 systemd-resolved[1155]: Positive Trust Anchors: Jul 2 00:53:41.989470 systemd-resolved[1155]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Jul 2 00:53:41.989566 systemd-resolved[1155]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Jul 2 00:53:42.002570 systemd-resolved[1155]: Defaulting to hostname 'linux'. Jul 2 00:53:42.004030 systemd[1]: Started systemd-resolved.service. Jul 2 00:53:42.004680 systemd[1]: Reached target network.target. Jul 2 00:53:42.005200 systemd[1]: Reached target nss-lookup.target. Jul 2 00:53:42.005765 systemd[1]: Reached target sysinit.target. Jul 2 00:53:42.006357 systemd[1]: Started motdgen.path. Jul 2 00:53:42.006886 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Jul 2 00:53:42.007813 systemd[1]: Started logrotate.timer. Jul 2 00:53:42.008423 systemd[1]: Started mdadm.timer. Jul 2 00:53:42.008936 systemd[1]: Started systemd-tmpfiles-clean.timer. Jul 2 00:53:42.009507 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Jul 2 00:53:42.009548 systemd[1]: Reached target paths.target. Jul 2 00:53:42.010044 systemd[1]: Reached target timers.target. Jul 2 00:53:42.010856 systemd[1]: Listening on dbus.socket. Jul 2 00:53:42.012484 systemd[1]: Starting docker.socket... Jul 2 00:53:42.015378 systemd[1]: Listening on sshd.socket. Jul 2 00:53:42.016039 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:42.016473 systemd[1]: Listening on docker.socket. Jul 2 00:53:42.017118 systemd[1]: Reached target sockets.target. Jul 2 00:53:42.017701 systemd[1]: Reached target basic.target. Jul 2 00:53:42.018246 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:53:42.018278 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Jul 2 00:53:42.019249 systemd[1]: Starting containerd.service... Jul 2 00:53:42.020759 systemd[1]: Starting dbus.service... Jul 2 00:53:42.022237 systemd[1]: Starting enable-oem-cloudinit.service... Jul 2 00:53:42.024102 systemd[1]: Starting extend-filesystems.service... Jul 2 00:53:42.024796 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Jul 2 00:53:42.026138 systemd[1]: Starting motdgen.service... Jul 2 00:53:42.030478 systemd[1]: Starting prepare-helm.service... Jul 2 00:53:42.035177 jq[1194]: false Jul 2 00:53:42.032345 systemd[1]: Starting ssh-key-proc-cmdline.service... Jul 2 00:53:42.034178 systemd[1]: Starting sshd-keygen.service... Jul 2 00:53:42.037130 systemd[1]: Starting systemd-logind.service... Jul 2 00:53:42.037840 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Jul 2 00:53:42.037910 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Jul 2 00:53:42.038288 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Jul 2 00:53:42.039687 systemd[1]: Starting update-engine.service... Jul 2 00:53:42.041397 systemd[1]: Starting update-ssh-keys-after-ignition.service... Jul 2 00:53:42.043940 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Jul 2 00:53:42.044141 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Jul 2 00:53:42.045353 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Jul 2 00:53:42.045579 systemd[1]: Finished ssh-key-proc-cmdline.service. Jul 2 00:53:42.046130 jq[1209]: true Jul 2 00:53:42.055641 tar[1211]: linux-arm64/helm Jul 2 00:53:42.065217 systemd[1]: motdgen.service: Deactivated successfully. Jul 2 00:53:42.065388 systemd[1]: Finished motdgen.service. Jul 2 00:53:42.065771 extend-filesystems[1195]: Found loop1 Jul 2 00:53:42.066152 dbus-daemon[1193]: [system] SELinux support is enabled Jul 2 00:53:42.066306 systemd[1]: Started dbus.service. Jul 2 00:53:42.066854 extend-filesystems[1195]: Found vda Jul 2 00:53:42.067421 extend-filesystems[1195]: Found vda1 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda2 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda3 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found usr Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda4 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda6 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda7 Jul 2 00:53:42.068385 extend-filesystems[1195]: Found vda9 Jul 2 00:53:42.068385 extend-filesystems[1195]: Checking size of /dev/vda9 Jul 2 00:53:42.068645 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Jul 2 00:53:42.075120 jq[1213]: true Jul 2 00:53:42.068673 systemd[1]: Reached target system-config.target. Jul 2 00:53:42.069544 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Jul 2 00:53:42.069564 systemd[1]: Reached target user-config.target. Jul 2 00:53:42.084366 extend-filesystems[1195]: Resized partition /dev/vda9 Jul 2 00:53:42.098112 extend-filesystems[1238]: resize2fs 1.46.5 (30-Dec-2021) Jul 2 00:53:42.112379 systemd-logind[1205]: Watching system buttons on /dev/input/event0 (Power Button) Jul 2 00:53:42.112664 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 1864699 blocks Jul 2 00:53:42.113505 systemd-logind[1205]: New seat seat0. Jul 2 00:53:42.116133 systemd[1]: Started systemd-logind.service. Jul 2 00:53:42.127943 update_engine[1208]: I0702 00:53:42.127725 1208 main.cc:92] Flatcar Update Engine starting Jul 2 00:53:42.131128 systemd[1]: Started update-engine.service. Jul 2 00:53:42.131236 update_engine[1208]: I0702 00:53:42.131156 1208 update_check_scheduler.cc:74] Next update check in 3m45s Jul 2 00:53:42.133546 kernel: EXT4-fs (vda9): resized filesystem to 1864699 Jul 2 00:53:42.133661 systemd[1]: Started locksmithd.service. Jul 2 00:53:42.150099 extend-filesystems[1238]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Jul 2 00:53:42.150099 extend-filesystems[1238]: old_desc_blocks = 1, new_desc_blocks = 1 Jul 2 00:53:42.150099 extend-filesystems[1238]: The filesystem on /dev/vda9 is now 1864699 (4k) blocks long. Jul 2 00:53:42.153304 extend-filesystems[1195]: Resized filesystem in /dev/vda9 Jul 2 00:53:42.154008 env[1214]: time="2024-07-02T00:53:42.152109760Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Jul 2 00:53:42.154183 bash[1243]: Updated "/home/core/.ssh/authorized_keys" Jul 2 00:53:42.153980 systemd[1]: extend-filesystems.service: Deactivated successfully. Jul 2 00:53:42.154137 systemd[1]: Finished extend-filesystems.service. Jul 2 00:53:42.155212 systemd[1]: Finished update-ssh-keys-after-ignition.service. Jul 2 00:53:42.178000 env[1214]: time="2024-07-02T00:53:42.177944586Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Jul 2 00:53:42.178139 env[1214]: time="2024-07-02T00:53:42.178111817Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179426 env[1214]: time="2024-07-02T00:53:42.179380843Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.161-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179426 env[1214]: time="2024-07-02T00:53:42.179419381Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179682 env[1214]: time="2024-07-02T00:53:42.179657576Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179682 env[1214]: time="2024-07-02T00:53:42.179680543Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179747 env[1214]: time="2024-07-02T00:53:42.179693506Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Jul 2 00:53:42.179747 env[1214]: time="2024-07-02T00:53:42.179703315Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179784 env[1214]: time="2024-07-02T00:53:42.179776070Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.179991 env[1214]: time="2024-07-02T00:53:42.179967319Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Jul 2 00:53:42.180106 env[1214]: time="2024-07-02T00:53:42.180084451Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Jul 2 00:53:42.180106 env[1214]: time="2024-07-02T00:53:42.180103370Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Jul 2 00:53:42.180164 env[1214]: time="2024-07-02T00:53:42.180154559Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Jul 2 00:53:42.180186 env[1214]: time="2024-07-02T00:53:42.180165809Z" level=info msg="metadata content store policy set" policy=shared Jul 2 00:53:42.185907 env[1214]: time="2024-07-02T00:53:42.185867548Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Jul 2 00:53:42.185907 env[1214]: time="2024-07-02T00:53:42.185907176Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Jul 2 00:53:42.186001 env[1214]: time="2024-07-02T00:53:42.185923214Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Jul 2 00:53:42.186001 env[1214]: time="2024-07-02T00:53:42.185961674Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186001 env[1214]: time="2024-07-02T00:53:42.185976544Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186001 env[1214]: time="2024-07-02T00:53:42.185989390Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186086 env[1214]: time="2024-07-02T00:53:42.186002080Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186380 env[1214]: time="2024-07-02T00:53:42.186354059Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186380 env[1214]: time="2024-07-02T00:53:42.186377455Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186446 env[1214]: time="2024-07-02T00:53:42.186401979Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186446 env[1214]: time="2024-07-02T00:53:42.186415720Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.186446 env[1214]: time="2024-07-02T00:53:42.186429500Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Jul 2 00:53:42.186591 env[1214]: time="2024-07-02T00:53:42.186570533Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Jul 2 00:53:42.186668 env[1214]: time="2024-07-02T00:53:42.186652008Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Jul 2 00:53:42.187873 env[1214]: time="2024-07-02T00:53:42.187832240Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Jul 2 00:53:42.187931 env[1214]: time="2024-07-02T00:53:42.187887634Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.187931 env[1214]: time="2024-07-02T00:53:42.187906591Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Jul 2 00:53:42.188241 env[1214]: time="2024-07-02T00:53:42.188220033Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188277 env[1214]: time="2024-07-02T00:53:42.188245491Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188277 env[1214]: time="2024-07-02T00:53:42.188258843Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188277 env[1214]: time="2024-07-02T00:53:42.188270638Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188363 env[1214]: time="2024-07-02T00:53:42.188288078Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188363 env[1214]: time="2024-07-02T00:53:42.188300612Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188363 env[1214]: time="2024-07-02T00:53:42.188313692Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188363 env[1214]: time="2024-07-02T00:53:42.188325564Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188363 env[1214]: time="2024-07-02T00:53:42.188348687Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Jul 2 00:53:42.188497 env[1214]: time="2024-07-02T00:53:42.188476874Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188536 env[1214]: time="2024-07-02T00:53:42.188498206Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188536 env[1214]: time="2024-07-02T00:53:42.188510974Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188585 env[1214]: time="2024-07-02T00:53:42.188540987Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Jul 2 00:53:42.188585 env[1214]: time="2024-07-02T00:53:42.188556208Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Jul 2 00:53:42.188585 env[1214]: time="2024-07-02T00:53:42.188572518Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Jul 2 00:53:42.188643 env[1214]: time="2024-07-02T00:53:42.188589374Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Jul 2 00:53:42.188643 env[1214]: time="2024-07-02T00:53:42.188622150Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Jul 2 00:53:42.188866 env[1214]: time="2024-07-02T00:53:42.188811103Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Jul 2 00:53:42.188866 env[1214]: time="2024-07-02T00:53:42.188868754Z" level=info msg="Connect containerd service" Jul 2 00:53:42.190718 env[1214]: time="2024-07-02T00:53:42.188897365Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Jul 2 00:53:42.190718 env[1214]: time="2024-07-02T00:53:42.189890319Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:53:42.190718 env[1214]: time="2024-07-02T00:53:42.190210417Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Jul 2 00:53:42.190718 env[1214]: time="2024-07-02T00:53:42.190243973Z" level=info msg=serving... address=/run/containerd/containerd.sock Jul 2 00:53:42.190718 env[1214]: time="2024-07-02T00:53:42.190674157Z" level=info msg="Start subscribing containerd event" Jul 2 00:53:42.190377 systemd[1]: Started containerd.service. Jul 2 00:53:42.190886 env[1214]: time="2024-07-02T00:53:42.190724723Z" level=info msg="Start recovering state" Jul 2 00:53:42.190886 env[1214]: time="2024-07-02T00:53:42.190785605Z" level=info msg="Start event monitor" Jul 2 00:53:42.190886 env[1214]: time="2024-07-02T00:53:42.190801760Z" level=info msg="Start snapshots syncer" Jul 2 00:53:42.190886 env[1214]: time="2024-07-02T00:53:42.190810480Z" level=info msg="Start cni network conf syncer for default" Jul 2 00:53:42.190886 env[1214]: time="2024-07-02T00:53:42.190818070Z" level=info msg="Start streaming server" Jul 2 00:53:42.191291 env[1214]: time="2024-07-02T00:53:42.191263125Z" level=info msg="containerd successfully booted in 0.047076s" Jul 2 00:53:42.210864 locksmithd[1246]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Jul 2 00:53:42.448872 tar[1211]: linux-arm64/LICENSE Jul 2 00:53:42.449059 tar[1211]: linux-arm64/README.md Jul 2 00:53:42.453227 systemd[1]: Finished prepare-helm.service. Jul 2 00:53:42.669683 systemd-networkd[1042]: eth0: Gained IPv6LL Jul 2 00:53:42.671297 systemd[1]: Finished systemd-networkd-wait-online.service. Jul 2 00:53:42.672274 systemd[1]: Reached target network-online.target. Jul 2 00:53:42.674347 systemd[1]: Starting kubelet.service... Jul 2 00:53:43.151938 systemd[1]: Started kubelet.service. Jul 2 00:53:43.623848 kubelet[1262]: E0702 00:53:43.623709 1262 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:53:43.625982 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:53:43.626108 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:53:45.332099 sshd_keygen[1212]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Jul 2 00:53:45.348812 systemd[1]: Finished sshd-keygen.service. Jul 2 00:53:45.350825 systemd[1]: Starting issuegen.service... Jul 2 00:53:45.355095 systemd[1]: issuegen.service: Deactivated successfully. Jul 2 00:53:45.355245 systemd[1]: Finished issuegen.service. Jul 2 00:53:45.357187 systemd[1]: Starting systemd-user-sessions.service... Jul 2 00:53:45.362739 systemd[1]: Finished systemd-user-sessions.service. Jul 2 00:53:45.364730 systemd[1]: Started getty@tty1.service. Jul 2 00:53:45.366488 systemd[1]: Started serial-getty@ttyAMA0.service. Jul 2 00:53:45.367347 systemd[1]: Reached target getty.target. Jul 2 00:53:45.367985 systemd[1]: Reached target multi-user.target. Jul 2 00:53:45.369812 systemd[1]: Starting systemd-update-utmp-runlevel.service... Jul 2 00:53:45.376295 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Jul 2 00:53:45.376442 systemd[1]: Finished systemd-update-utmp-runlevel.service. Jul 2 00:53:45.377248 systemd[1]: Startup finished in 567ms (kernel) + 4.249s (initrd) + 6.562s (userspace) = 11.379s. Jul 2 00:53:47.441332 systemd[1]: Created slice system-sshd.slice. Jul 2 00:53:47.442934 systemd[1]: Started sshd@0-10.0.0.92:22-10.0.0.1:42580.service. Jul 2 00:53:47.488987 sshd[1285]: Accepted publickey for core from 10.0.0.1 port 42580 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:47.490962 sshd[1285]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.501549 systemd-logind[1205]: New session 1 of user core. Jul 2 00:53:47.503689 systemd[1]: Created slice user-500.slice. Jul 2 00:53:47.504795 systemd[1]: Starting user-runtime-dir@500.service... Jul 2 00:53:47.512637 systemd[1]: Finished user-runtime-dir@500.service. Jul 2 00:53:47.513883 systemd[1]: Starting user@500.service... Jul 2 00:53:47.516426 (systemd)[1288]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.577755 systemd[1288]: Queued start job for default target default.target. Jul 2 00:53:47.578233 systemd[1288]: Reached target paths.target. Jul 2 00:53:47.578251 systemd[1288]: Reached target sockets.target. Jul 2 00:53:47.578261 systemd[1288]: Reached target timers.target. Jul 2 00:53:47.578272 systemd[1288]: Reached target basic.target. Jul 2 00:53:47.578320 systemd[1288]: Reached target default.target. Jul 2 00:53:47.578344 systemd[1288]: Startup finished in 54ms. Jul 2 00:53:47.578563 systemd[1]: Started user@500.service. Jul 2 00:53:47.579478 systemd[1]: Started session-1.scope. Jul 2 00:53:47.630576 systemd[1]: Started sshd@1-10.0.0.92:22-10.0.0.1:42586.service. Jul 2 00:53:47.662429 sshd[1297]: Accepted publickey for core from 10.0.0.1 port 42586 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:47.664105 sshd[1297]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.668781 systemd-logind[1205]: New session 2 of user core. Jul 2 00:53:47.669026 systemd[1]: Started session-2.scope. Jul 2 00:53:47.722263 sshd[1297]: pam_unix(sshd:session): session closed for user core Jul 2 00:53:47.725871 systemd[1]: Started sshd@2-10.0.0.92:22-10.0.0.1:42600.service. Jul 2 00:53:47.726358 systemd[1]: sshd@1-10.0.0.92:22-10.0.0.1:42586.service: Deactivated successfully. Jul 2 00:53:47.726994 systemd[1]: session-2.scope: Deactivated successfully. Jul 2 00:53:47.727511 systemd-logind[1205]: Session 2 logged out. Waiting for processes to exit. Jul 2 00:53:47.728557 systemd-logind[1205]: Removed session 2. Jul 2 00:53:47.758485 sshd[1302]: Accepted publickey for core from 10.0.0.1 port 42600 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:47.759672 sshd[1302]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.763008 systemd-logind[1205]: New session 3 of user core. Jul 2 00:53:47.763791 systemd[1]: Started session-3.scope. Jul 2 00:53:47.814171 sshd[1302]: pam_unix(sshd:session): session closed for user core Jul 2 00:53:47.817836 systemd[1]: Started sshd@3-10.0.0.92:22-10.0.0.1:42616.service. Jul 2 00:53:47.818372 systemd[1]: sshd@2-10.0.0.92:22-10.0.0.1:42600.service: Deactivated successfully. Jul 2 00:53:47.819018 systemd[1]: session-3.scope: Deactivated successfully. Jul 2 00:53:47.819567 systemd-logind[1205]: Session 3 logged out. Waiting for processes to exit. Jul 2 00:53:47.820660 systemd-logind[1205]: Removed session 3. Jul 2 00:53:47.851281 sshd[1308]: Accepted publickey for core from 10.0.0.1 port 42616 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:47.852470 sshd[1308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.855955 systemd-logind[1205]: New session 4 of user core. Jul 2 00:53:47.856795 systemd[1]: Started session-4.scope. Jul 2 00:53:47.909459 sshd[1308]: pam_unix(sshd:session): session closed for user core Jul 2 00:53:47.913503 systemd[1]: sshd@3-10.0.0.92:22-10.0.0.1:42616.service: Deactivated successfully. Jul 2 00:53:47.914107 systemd[1]: session-4.scope: Deactivated successfully. Jul 2 00:53:47.914688 systemd-logind[1205]: Session 4 logged out. Waiting for processes to exit. Jul 2 00:53:47.915798 systemd[1]: Started sshd@4-10.0.0.92:22-10.0.0.1:42628.service. Jul 2 00:53:47.916674 systemd-logind[1205]: Removed session 4. Jul 2 00:53:47.947753 sshd[1315]: Accepted publickey for core from 10.0.0.1 port 42628 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:47.948996 sshd[1315]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:47.952301 systemd-logind[1205]: New session 5 of user core. Jul 2 00:53:47.953104 systemd[1]: Started session-5.scope. Jul 2 00:53:48.013460 sudo[1318]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Jul 2 00:53:48.013723 sudo[1318]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:53:48.023729 dbus-daemon[1193]: avc: received setenforce notice (enforcing=1) Jul 2 00:53:48.025434 sudo[1318]: pam_unix(sudo:session): session closed for user root Jul 2 00:53:48.027665 sshd[1315]: pam_unix(sshd:session): session closed for user core Jul 2 00:53:48.030703 systemd[1]: sshd@4-10.0.0.92:22-10.0.0.1:42628.service: Deactivated successfully. Jul 2 00:53:48.031316 systemd[1]: session-5.scope: Deactivated successfully. Jul 2 00:53:48.031849 systemd-logind[1205]: Session 5 logged out. Waiting for processes to exit. Jul 2 00:53:48.033005 systemd[1]: Started sshd@5-10.0.0.92:22-10.0.0.1:42642.service. Jul 2 00:53:48.033655 systemd-logind[1205]: Removed session 5. Jul 2 00:53:48.065499 sshd[1322]: Accepted publickey for core from 10.0.0.1 port 42642 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:48.067181 sshd[1322]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:48.070706 systemd-logind[1205]: New session 6 of user core. Jul 2 00:53:48.071537 systemd[1]: Started session-6.scope. Jul 2 00:53:48.122615 sudo[1326]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Jul 2 00:53:48.122831 sudo[1326]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:53:48.125449 sudo[1326]: pam_unix(sudo:session): session closed for user root Jul 2 00:53:48.129468 sudo[1325]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Jul 2 00:53:48.129698 sudo[1325]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:53:48.137538 systemd[1]: Stopping audit-rules.service... Jul 2 00:53:48.138000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:53:48.138683 auditctl[1329]: No rules Jul 2 00:53:48.138949 systemd[1]: audit-rules.service: Deactivated successfully. Jul 2 00:53:48.139104 systemd[1]: Stopped audit-rules.service. Jul 2 00:53:48.140382 kernel: kauditd_printk_skb: 114 callbacks suppressed Jul 2 00:53:48.140429 kernel: audit: type=1305 audit(1719881628.138:202): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Jul 2 00:53:48.140460 kernel: audit: type=1300 audit(1719881628.138:202): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef2c5fd0 a2=420 a3=0 items=0 ppid=1 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.138000 audit[1329]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffef2c5fd0 a2=420 a3=0 items=0 ppid=1 pid=1329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.140500 systemd[1]: Starting audit-rules.service... Jul 2 00:53:48.138000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:53:48.144034 kernel: audit: type=1327 audit(1719881628.138:202): proctitle=2F7362696E2F617564697463746C002D44 Jul 2 00:53:48.144112 kernel: audit: type=1131 audit(1719881628.138:203): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.138000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.156652 augenrules[1346]: No rules Jul 2 00:53:48.157468 systemd[1]: Finished audit-rules.service. Jul 2 00:53:48.157000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.159159 sudo[1325]: pam_unix(sudo:session): session closed for user root Jul 2 00:53:48.158000 audit[1325]: USER_END pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.161850 kernel: audit: type=1130 audit(1719881628.157:204): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.161909 kernel: audit: type=1106 audit(1719881628.158:205): pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.162011 sshd[1322]: pam_unix(sshd:session): session closed for user core Jul 2 00:53:48.158000 audit[1325]: CRED_DISP pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.163883 systemd[1]: Started sshd@6-10.0.0.92:22-10.0.0.1:42648.service. Jul 2 00:53:48.164038 kernel: audit: type=1104 audit(1719881628.158:206): pid=1325 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.166066 kernel: audit: type=1130 audit(1719881628.162:207): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.164000 audit[1322]: USER_END pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.167816 systemd[1]: sshd@5-10.0.0.92:22-10.0.0.1:42642.service: Deactivated successfully. Jul 2 00:53:48.168386 systemd[1]: session-6.scope: Deactivated successfully. Jul 2 00:53:48.165000 audit[1322]: CRED_DISP pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.172675 kernel: audit: type=1106 audit(1719881628.164:208): pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.172714 kernel: audit: type=1104 audit(1719881628.165:209): pid=1322 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.0.0.92:22-10.0.0.1:42642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.172822 systemd-logind[1205]: Session 6 logged out. Waiting for processes to exit. Jul 2 00:53:48.173449 systemd-logind[1205]: Removed session 6. Jul 2 00:53:48.195000 audit[1351]: USER_ACCT pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.196807 sshd[1351]: Accepted publickey for core from 10.0.0.1 port 42648 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:53:48.196000 audit[1351]: CRED_ACQ pid=1351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.196000 audit[1351]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1015660 a2=3 a3=1 items=0 ppid=1 pid=1351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.196000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:53:48.198218 sshd[1351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:53:48.201460 systemd-logind[1205]: New session 7 of user core. Jul 2 00:53:48.202231 systemd[1]: Started session-7.scope. Jul 2 00:53:48.204000 audit[1351]: USER_START pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.205000 audit[1354]: CRED_ACQ pid=1354 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:53:48.250000 audit[1355]: USER_ACCT pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.252386 sudo[1355]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Jul 2 00:53:48.250000 audit[1355]: CRED_REFR pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.252641 sudo[1355]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Jul 2 00:53:48.252000 audit[1355]: USER_START pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.313298 systemd[1]: Starting docker.service... Jul 2 00:53:48.393608 env[1367]: time="2024-07-02T00:53:48.393565720Z" level=info msg="Starting up" Jul 2 00:53:48.395431 env[1367]: time="2024-07-02T00:53:48.395401117Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:53:48.395431 env[1367]: time="2024-07-02T00:53:48.395423841Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:53:48.395548 env[1367]: time="2024-07-02T00:53:48.395444469Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:53:48.395548 env[1367]: time="2024-07-02T00:53:48.395455337Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:53:48.397535 env[1367]: time="2024-07-02T00:53:48.397493781Z" level=info msg="parsed scheme: \"unix\"" module=grpc Jul 2 00:53:48.397535 env[1367]: time="2024-07-02T00:53:48.397513342Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Jul 2 00:53:48.397688 env[1367]: time="2024-07-02T00:53:48.397548672Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Jul 2 00:53:48.397688 env[1367]: time="2024-07-02T00:53:48.397560330Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Jul 2 00:53:48.516113 env[1367]: time="2024-07-02T00:53:48.516070466Z" level=info msg="Loading containers: start." Jul 2 00:53:48.561000 audit[1401]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1401 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.561000 audit[1401]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff51b8760 a2=0 a3=1 items=0 ppid=1367 pid=1401 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.561000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Jul 2 00:53:48.563000 audit[1403]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1403 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.563000 audit[1403]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffefe11490 a2=0 a3=1 items=0 ppid=1367 pid=1403 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Jul 2 00:53:48.565000 audit[1405]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1405 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.565000 audit[1405]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd9c1e7d0 a2=0 a3=1 items=0 ppid=1367 pid=1405 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.565000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:53:48.567000 audit[1407]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1407 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.567000 audit[1407]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc52923a0 a2=0 a3=1 items=0 ppid=1367 pid=1407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.567000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:53:48.569000 audit[1409]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1409 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.569000 audit[1409]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe6960380 a2=0 a3=1 items=0 ppid=1367 pid=1409 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.569000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Jul 2 00:53:48.591000 audit[1414]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1414 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.591000 audit[1414]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcfb9d8a0 a2=0 a3=1 items=0 ppid=1367 pid=1414 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.591000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Jul 2 00:53:48.597000 audit[1416]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1416 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.597000 audit[1416]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdb279400 a2=0 a3=1 items=0 ppid=1367 pid=1416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.597000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Jul 2 00:53:48.598000 audit[1418]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1418 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.598000 audit[1418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffeb68e6f0 a2=0 a3=1 items=0 ppid=1367 pid=1418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.598000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Jul 2 00:53:48.600000 audit[1420]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1420 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.600000 audit[1420]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffc53afde0 a2=0 a3=1 items=0 ppid=1367 pid=1420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.600000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:53:48.606000 audit[1424]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1424 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.606000 audit[1424]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff56a5ba0 a2=0 a3=1 items=0 ppid=1367 pid=1424 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.606000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:53:48.607000 audit[1425]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1425 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.607000 audit[1425]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc56ebb70 a2=0 a3=1 items=0 ppid=1367 pid=1425 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.607000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:53:48.616560 kernel: Initializing XFRM netlink socket Jul 2 00:53:48.639179 env[1367]: time="2024-07-02T00:53:48.639130526Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Jul 2 00:53:48.655000 audit[1433]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1433 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.655000 audit[1433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc7b4dfd0 a2=0 a3=1 items=0 ppid=1367 pid=1433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Jul 2 00:53:48.668000 audit[1436]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1436 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.668000 audit[1436]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffcb6a6c20 a2=0 a3=1 items=0 ppid=1367 pid=1436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Jul 2 00:53:48.671000 audit[1439]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1439 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.671000 audit[1439]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc2fc6c90 a2=0 a3=1 items=0 ppid=1367 pid=1439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Jul 2 00:53:48.673000 audit[1441]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1441 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.673000 audit[1441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd46a0840 a2=0 a3=1 items=0 ppid=1367 pid=1441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Jul 2 00:53:48.675000 audit[1443]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1443 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.675000 audit[1443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd403cc00 a2=0 a3=1 items=0 ppid=1367 pid=1443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.675000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Jul 2 00:53:48.677000 audit[1445]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1445 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.677000 audit[1445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffddfed150 a2=0 a3=1 items=0 ppid=1367 pid=1445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.677000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Jul 2 00:53:48.678000 audit[1447]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1447 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.678000 audit[1447]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffd2517a10 a2=0 a3=1 items=0 ppid=1367 pid=1447 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Jul 2 00:53:48.685000 audit[1450]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1450 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.685000 audit[1450]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffc961c6c0 a2=0 a3=1 items=0 ppid=1367 pid=1450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.685000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Jul 2 00:53:48.687000 audit[1452]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1452 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.687000 audit[1452]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe37a0ee0 a2=0 a3=1 items=0 ppid=1367 pid=1452 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.687000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Jul 2 00:53:48.689000 audit[1454]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1454 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.689000 audit[1454]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffffab286f0 a2=0 a3=1 items=0 ppid=1367 pid=1454 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.689000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Jul 2 00:53:48.691000 audit[1456]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1456 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.691000 audit[1456]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff0009370 a2=0 a3=1 items=0 ppid=1367 pid=1456 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.691000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Jul 2 00:53:48.692936 systemd-networkd[1042]: docker0: Link UP Jul 2 00:53:48.699000 audit[1460]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1460 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.699000 audit[1460]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe03cfc90 a2=0 a3=1 items=0 ppid=1367 pid=1460 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:53:48.699000 audit[1461]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1461 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:53:48.699000 audit[1461]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffd6dca3c0 a2=0 a3=1 items=0 ppid=1367 pid=1461 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:53:48.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Jul 2 00:53:48.700586 env[1367]: time="2024-07-02T00:53:48.700555891Z" level=info msg="Loading containers: done." Jul 2 00:53:48.719452 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck2630764919-merged.mount: Deactivated successfully. Jul 2 00:53:48.732980 env[1367]: time="2024-07-02T00:53:48.732925190Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Jul 2 00:53:48.733129 env[1367]: time="2024-07-02T00:53:48.733117843Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Jul 2 00:53:48.733253 env[1367]: time="2024-07-02T00:53:48.733218022Z" level=info msg="Daemon has completed initialization" Jul 2 00:53:48.755679 systemd[1]: Started docker.service. Jul 2 00:53:48.754000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:48.762883 env[1367]: time="2024-07-02T00:53:48.762837978Z" level=info msg="API listen on /run/docker.sock" Jul 2 00:53:49.332537 env[1214]: time="2024-07-02T00:53:49.332481588Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\"" Jul 2 00:53:49.976657 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3947458822.mount: Deactivated successfully. Jul 2 00:53:51.365653 env[1214]: time="2024-07-02T00:53:51.365605669Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:51.368022 env[1214]: time="2024-07-02T00:53:51.367994489Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:46bfddf397d499c68edd3a505a02ab6b7a77acc6cbab684122699693c44fdc8a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:51.369753 env[1214]: time="2024-07-02T00:53:51.369727639Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:51.371359 env[1214]: time="2024-07-02T00:53:51.371330449Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:f4d993b3d73cc0d59558be584b5b40785b4a96874bc76873b69d1dd818485e70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:51.372158 env[1214]: time="2024-07-02T00:53:51.372135742Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.6\" returns image reference \"sha256:46bfddf397d499c68edd3a505a02ab6b7a77acc6cbab684122699693c44fdc8a\"" Jul 2 00:53:51.381067 env[1214]: time="2024-07-02T00:53:51.381035750Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\"" Jul 2 00:53:53.090506 env[1214]: time="2024-07-02T00:53:53.090427818Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:53.093391 env[1214]: time="2024-07-02T00:53:53.093351734Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9df0eeeacdd8f3cd9f3c3a08fbdfd665da4283115b53bf8b5d434382c02230a8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:53.095568 env[1214]: time="2024-07-02T00:53:53.095519904Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:53.100108 env[1214]: time="2024-07-02T00:53:53.100052228Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:692fc3f88a60b3afc76492ad347306d34042000f56f230959e9367fd59c48b1e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:53.101040 env[1214]: time="2024-07-02T00:53:53.101012264Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.6\" returns image reference \"sha256:9df0eeeacdd8f3cd9f3c3a08fbdfd665da4283115b53bf8b5d434382c02230a8\"" Jul 2 00:53:53.110816 env[1214]: time="2024-07-02T00:53:53.110787378Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\"" Jul 2 00:53:53.876877 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Jul 2 00:53:53.881703 kernel: kauditd_printk_skb: 84 callbacks suppressed Jul 2 00:53:53.881747 kernel: audit: type=1130 audit(1719881633.876:244): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:53.881768 kernel: audit: type=1131 audit(1719881633.876:245): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:53.876000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:53.876000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:53.877040 systemd[1]: Stopped kubelet.service. Jul 2 00:53:53.878416 systemd[1]: Starting kubelet.service... Jul 2 00:53:53.955000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:53.956815 systemd[1]: Started kubelet.service. Jul 2 00:53:53.959540 kernel: audit: type=1130 audit(1719881633.955:246): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:53:54.000011 kubelet[1524]: E0702 00:53:53.999952 1524 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:53:54.002788 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:53:54.002912 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:53:54.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:53:54.005563 kernel: audit: type=1131 audit(1719881634.002:247): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:53:54.219644 env[1214]: time="2024-07-02T00:53:54.219308350Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:54.221638 env[1214]: time="2024-07-02T00:53:54.221594891Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4d823a436d04c2aac5c8e0dd5a83efa81f1917a3c017feabc4917150cb90fa29,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:54.224103 env[1214]: time="2024-07-02T00:53:54.224071201Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:54.226435 env[1214]: time="2024-07-02T00:53:54.226401981Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:b91a4e45debd0d5336d9f533aefdf47d4b39b24071feb459e521709b9e4ec24f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:54.227223 env[1214]: time="2024-07-02T00:53:54.227199768Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.6\" returns image reference \"sha256:4d823a436d04c2aac5c8e0dd5a83efa81f1917a3c017feabc4917150cb90fa29\"" Jul 2 00:53:54.236231 env[1214]: time="2024-07-02T00:53:54.235986840Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\"" Jul 2 00:53:55.305184 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1177701783.mount: Deactivated successfully. Jul 2 00:53:56.743891 env[1214]: time="2024-07-02T00:53:56.743840715Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:56.745380 env[1214]: time="2024-07-02T00:53:56.745341323Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:56.746972 env[1214]: time="2024-07-02T00:53:56.746944544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:56.748141 env[1214]: time="2024-07-02T00:53:56.748108191Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:88bacb3e1d6c0c37c6da95c6d6b8e30531d0b4d0ab540cc290b0af51fbfebd90,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:56.748638 env[1214]: time="2024-07-02T00:53:56.748610266Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.6\" returns image reference \"sha256:a75156450625cf630b7b9b1e8b7d881969131638181257d0d67db0876a25b32f\"" Jul 2 00:53:56.757721 env[1214]: time="2024-07-02T00:53:56.757686968Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Jul 2 00:53:57.285386 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1215957345.mount: Deactivated successfully. Jul 2 00:53:58.085018 env[1214]: time="2024-07-02T00:53:58.084973314Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.087231 env[1214]: time="2024-07-02T00:53:58.087206819Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.089009 env[1214]: time="2024-07-02T00:53:58.088969938Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.091354 env[1214]: time="2024-07-02T00:53:58.091323262Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.092101 env[1214]: time="2024-07-02T00:53:58.092068455Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:2437cf762177702dec2dfe99a09c37427a15af6d9a57c456b65352667c223d93\"" Jul 2 00:53:58.101805 env[1214]: time="2024-07-02T00:53:58.101776934Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Jul 2 00:53:58.493044 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2885653238.mount: Deactivated successfully. Jul 2 00:53:58.497840 env[1214]: time="2024-07-02T00:53:58.497795685Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.499979 env[1214]: time="2024-07-02T00:53:58.499935767Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.500897 env[1214]: time="2024-07-02T00:53:58.500855246Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.502305 env[1214]: time="2024-07-02T00:53:58.502275335Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:53:58.502912 env[1214]: time="2024-07-02T00:53:58.502887709Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Jul 2 00:53:58.511992 env[1214]: time="2024-07-02T00:53:58.511959929Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Jul 2 00:53:58.930362 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount302530377.mount: Deactivated successfully. Jul 2 00:54:00.890104 env[1214]: time="2024-07-02T00:54:00.890024196Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:00.891468 env[1214]: time="2024-07-02T00:54:00.891429061Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:00.893511 env[1214]: time="2024-07-02T00:54:00.893472136Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:00.895422 env[1214]: time="2024-07-02T00:54:00.895388119Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:00.897149 env[1214]: time="2024-07-02T00:54:00.897110373Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:79f8d13ae8b8839cadfb2f83416935f5184206d386028e2d1263577f0ab3620b\"" Jul 2 00:54:04.253687 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Jul 2 00:54:04.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.253849 systemd[1]: Stopped kubelet.service. Jul 2 00:54:04.255220 systemd[1]: Starting kubelet.service... Jul 2 00:54:04.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.257497 kernel: audit: type=1130 audit(1719881644.252:248): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.257566 kernel: audit: type=1131 audit(1719881644.252:249): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.336193 systemd[1]: Started kubelet.service. Jul 2 00:54:04.338553 kernel: audit: type=1130 audit(1719881644.334:250): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:04.393150 kubelet[1640]: E0702 00:54:04.393101 1640 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Jul 2 00:54:04.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:54:04.395815 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Jul 2 00:54:04.395927 systemd[1]: kubelet.service: Failed with result 'exit-code'. Jul 2 00:54:04.398557 kernel: audit: type=1131 audit(1719881644.394:251): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Jul 2 00:54:05.091000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.093356 systemd[1]: Stopped kubelet.service. Jul 2 00:54:05.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.095322 systemd[1]: Starting kubelet.service... Jul 2 00:54:05.097651 kernel: audit: type=1130 audit(1719881645.091:252): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.097723 kernel: audit: type=1131 audit(1719881645.091:253): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.111005 systemd[1]: Reloading. Jul 2 00:54:05.164791 /usr/lib/systemd/system-generators/torcx-generator[1674]: time="2024-07-02T00:54:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:54:05.164821 /usr/lib/systemd/system-generators/torcx-generator[1674]: time="2024-07-02T00:54:05Z" level=info msg="torcx already run" Jul 2 00:54:05.289222 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:54:05.289494 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:54:05.304619 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:54:05.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.358745 kernel: audit: type=1400 audit(1719881645.354:254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.358806 kernel: audit: type=1400 audit(1719881645.354:255): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.358830 kernel: audit: type=1400 audit(1719881645.354:256): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362388 kernel: audit: type=1400 audit(1719881645.354:257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.354000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.355000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.355000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit: BPF prog-id=46 op=LOAD Jul 2 00:54:05.356000 audit: BPF prog-id=39 op=UNLOAD Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.358000 audit: BPF prog-id=47 op=LOAD Jul 2 00:54:05.358000 audit: BPF prog-id=30 op=UNLOAD Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.360000 audit: BPF prog-id=48 op=LOAD Jul 2 00:54:05.360000 audit: BPF prog-id=44 op=UNLOAD Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit: BPF prog-id=49 op=LOAD Jul 2 00:54:05.362000 audit: BPF prog-id=31 op=UNLOAD Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit: BPF prog-id=50 op=LOAD Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit: BPF prog-id=51 op=LOAD Jul 2 00:54:05.362000 audit: BPF prog-id=32 op=UNLOAD Jul 2 00:54:05.362000 audit: BPF prog-id=33 op=UNLOAD Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.362000 audit: BPF prog-id=52 op=LOAD Jul 2 00:54:05.362000 audit: BPF prog-id=34 op=UNLOAD Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit: BPF prog-id=53 op=LOAD Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit: BPF prog-id=54 op=LOAD Jul 2 00:54:05.363000 audit: BPF prog-id=35 op=UNLOAD Jul 2 00:54:05.363000 audit: BPF prog-id=36 op=UNLOAD Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.363000 audit: BPF prog-id=55 op=LOAD Jul 2 00:54:05.363000 audit: BPF prog-id=40 op=UNLOAD Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit: BPF prog-id=56 op=LOAD Jul 2 00:54:05.364000 audit: BPF prog-id=41 op=UNLOAD Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit: BPF prog-id=57 op=LOAD Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.364000 audit: BPF prog-id=58 op=LOAD Jul 2 00:54:05.364000 audit: BPF prog-id=42 op=UNLOAD Jul 2 00:54:05.364000 audit: BPF prog-id=43 op=UNLOAD Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit: BPF prog-id=59 op=LOAD Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:05.365000 audit: BPF prog-id=60 op=LOAD Jul 2 00:54:05.365000 audit: BPF prog-id=37 op=UNLOAD Jul 2 00:54:05.365000 audit: BPF prog-id=38 op=UNLOAD Jul 2 00:54:05.375790 systemd[1]: Started kubelet.service. Jul 2 00:54:05.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.379099 systemd[1]: Stopping kubelet.service... Jul 2 00:54:05.379740 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:54:05.380042 systemd[1]: Stopped kubelet.service. Jul 2 00:54:05.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.381873 systemd[1]: Starting kubelet.service... Jul 2 00:54:05.464199 systemd[1]: Started kubelet.service. Jul 2 00:54:05.464000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:05.503261 kubelet[1719]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:54:05.503261 kubelet[1719]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:54:05.503261 kubelet[1719]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:54:05.504106 kubelet[1719]: I0702 00:54:05.504050 1719 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:54:06.691589 kubelet[1719]: I0702 00:54:06.691553 1719 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 00:54:06.691589 kubelet[1719]: I0702 00:54:06.691585 1719 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:54:06.691944 kubelet[1719]: I0702 00:54:06.691791 1719 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 00:54:06.729707 kubelet[1719]: I0702 00:54:06.728501 1719 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:54:06.731739 kubelet[1719]: E0702 00:54:06.731711 1719 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.0.0.92:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.737887 kubelet[1719]: I0702 00:54:06.737856 1719 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:54:06.738086 kubelet[1719]: I0702 00:54:06.738060 1719 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:54:06.738247 kubelet[1719]: I0702 00:54:06.738221 1719 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:54:06.738247 kubelet[1719]: I0702 00:54:06.738239 1719 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:54:06.738247 kubelet[1719]: I0702 00:54:06.738248 1719 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:54:06.739971 kubelet[1719]: I0702 00:54:06.739939 1719 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:54:06.742568 kubelet[1719]: I0702 00:54:06.742544 1719 kubelet.go:396] "Attempting to sync node with API server" Jul 2 00:54:06.742613 kubelet[1719]: I0702 00:54:06.742571 1719 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:54:06.742613 kubelet[1719]: I0702 00:54:06.742592 1719 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:54:06.742672 kubelet[1719]: I0702 00:54:06.742616 1719 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:54:06.743163 kubelet[1719]: W0702 00:54:06.743117 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.743286 kubelet[1719]: E0702 00:54:06.743273 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.0.0.92:6443/api/v1/nodes?fieldSelector=metadata.name%3Dlocalhost&limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.743396 kubelet[1719]: W0702 00:54:06.743166 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.743500 kubelet[1719]: I0702 00:54:06.743480 1719 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:54:06.743589 kubelet[1719]: E0702 00:54:06.743575 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.744126 kubelet[1719]: I0702 00:54:06.744112 1719 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:54:06.745116 kubelet[1719]: W0702 00:54:06.745088 1719 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Jul 2 00:54:06.750135 kubelet[1719]: I0702 00:54:06.750116 1719 server.go:1256] "Started kubelet" Jul 2 00:54:06.750333 kubelet[1719]: I0702 00:54:06.750312 1719 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:54:06.750971 kubelet[1719]: I0702 00:54:06.750947 1719 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:54:06.751586 kubelet[1719]: I0702 00:54:06.751566 1719 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:54:06.750000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:06.750000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:06.750000 audit[1719]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000977230 a1=4000a3cb88 a2=4000977200 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:06.750000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:06.750000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:06.750000 audit[1719]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000af4160 a1=4000a3cba0 a2=40009772c0 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.750000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:06.752258 kubelet[1719]: I0702 00:54:06.751960 1719 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:54:06.752258 kubelet[1719]: I0702 00:54:06.752014 1719 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:54:06.752775 kubelet[1719]: I0702 00:54:06.752645 1719 server.go:461] "Adding debug handlers to kubelet server" Jul 2 00:54:06.753000 audit[1731]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1731 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.753000 audit[1731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffddd3d080 a2=0 a3=1 items=0 ppid=1719 pid=1731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:54:06.753000 audit[1732]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.753000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebdbcb50 a2=0 a3=1 items=0 ppid=1719 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.753000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:54:06.760000 audit[1734]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.760000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdec52460 a2=0 a3=1 items=0 ppid=1719 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.760000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.755104 1719 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.760798 1719 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.760878 1719 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.760930 1719 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 00:54:06.762106 kubelet[1719]: E0702 00:54:06.761394 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="200ms" Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.761515 1719 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:54:06.762106 kubelet[1719]: W0702 00:54:06.761521 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.762106 kubelet[1719]: E0702 00:54:06.761584 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.762106 kubelet[1719]: I0702 00:54:06.761592 1719 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:54:06.763081 kubelet[1719]: E0702 00:54:06.763055 1719 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 00:54:06.763256 kubelet[1719]: I0702 00:54:06.763235 1719 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:54:06.761000 audit[1736]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.761000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffc5409a0 a2=0 a3=1 items=0 ppid=1719 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:54:06.763974 kubelet[1719]: E0702 00:54:06.763932 1719 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.92:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.92:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17de3f3ed240b7d4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-07-02 00:54:06.750087124 +0000 UTC m=+1.282576187,LastTimestamp:2024-07-02 00:54:06.750087124 +0000 UTC m=+1.282576187,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Jul 2 00:54:06.774461 kubelet[1719]: I0702 00:54:06.774434 1719 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:54:06.774598 kubelet[1719]: I0702 00:54:06.774584 1719 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:54:06.774672 kubelet[1719]: I0702 00:54:06.774662 1719 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:54:06.773000 audit[1744]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.773000 audit[1744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffdb50ba30 a2=0 a3=1 items=0 ppid=1719 pid=1744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.773000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Jul 2 00:54:06.775474 kubelet[1719]: I0702 00:54:06.775451 1719 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:54:06.774000 audit[1745]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:06.774000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd00f3b80 a2=0 a3=1 items=0 ppid=1719 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.774000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Jul 2 00:54:06.774000 audit[1746]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1746 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.774000 audit[1746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffffea09b80 a2=0 a3=1 items=0 ppid=1719 pid=1746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.774000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:54:06.776660 kubelet[1719]: I0702 00:54:06.776493 1719 policy_none.go:49] "None policy: Start" Jul 2 00:54:06.775000 audit[1747]: NETFILTER_CFG table=nat:33 family=2 entries=1 op=nft_register_chain pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.775000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdd86d0a0 a2=0 a3=1 items=0 ppid=1719 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.775000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:54:06.777570 kubelet[1719]: I0702 00:54:06.777348 1719 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:54:06.777660 kubelet[1719]: I0702 00:54:06.777647 1719 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:54:06.778036 kubelet[1719]: I0702 00:54:06.778016 1719 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:54:06.778096 kubelet[1719]: I0702 00:54:06.778041 1719 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:54:06.778096 kubelet[1719]: I0702 00:54:06.778056 1719 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 00:54:06.778153 kubelet[1719]: E0702 00:54:06.778099 1719 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:54:06.778732 kubelet[1719]: W0702 00:54:06.778678 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.778732 kubelet[1719]: E0702 00:54:06.778732 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:06.777000 audit[1748]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_chain pid=1748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:06.777000 audit[1748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff4122330 a2=0 a3=1 items=0 ppid=1719 pid=1748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.777000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:54:06.778000 audit[1749]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:06.778000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe82c1f90 a2=0 a3=1 items=0 ppid=1719 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.778000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Jul 2 00:54:06.780000 audit[1750]: NETFILTER_CFG table=nat:36 family=10 entries=2 op=nft_register_chain pid=1750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:06.780000 audit[1750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffe01f22f0 a2=0 a3=1 items=0 ppid=1719 pid=1750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.780000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Jul 2 00:54:06.783109 systemd[1]: Created slice kubepods.slice. Jul 2 00:54:06.781000 audit[1751]: NETFILTER_CFG table=filter:37 family=10 entries=2 op=nft_register_chain pid=1751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:06.781000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffda4dd560 a2=0 a3=1 items=0 ppid=1719 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.781000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Jul 2 00:54:06.786954 systemd[1]: Created slice kubepods-burstable.slice. Jul 2 00:54:06.789315 systemd[1]: Created slice kubepods-besteffort.slice. Jul 2 00:54:06.804000 audit[1719]: AVC avc: denied { mac_admin } for pid=1719 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:06.804000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:06.804000 audit[1719]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ac2ab0 a1=4000b362b8 a2=4000ac2a80 a3=25 items=0 ppid=1 pid=1719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:06.804000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:06.806966 kubelet[1719]: I0702 00:54:06.806158 1719 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:54:06.806966 kubelet[1719]: I0702 00:54:06.806215 1719 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:54:06.806966 kubelet[1719]: I0702 00:54:06.806379 1719 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:54:06.807629 kubelet[1719]: E0702 00:54:06.807596 1719 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"localhost\" not found" Jul 2 00:54:06.862620 kubelet[1719]: I0702 00:54:06.862583 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:54:06.863012 kubelet[1719]: E0702 00:54:06.862989 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" Jul 2 00:54:06.879176 kubelet[1719]: I0702 00:54:06.879149 1719 topology_manager.go:215] "Topology Admit Handler" podUID="eb3f6ecc576deacf341791f9d86e9d24" podNamespace="kube-system" podName="kube-apiserver-localhost" Jul 2 00:54:06.880075 kubelet[1719]: I0702 00:54:06.880048 1719 topology_manager.go:215] "Topology Admit Handler" podUID="42b008e702ec2a5b396aebedf13804b4" podNamespace="kube-system" podName="kube-controller-manager-localhost" Jul 2 00:54:06.880898 kubelet[1719]: I0702 00:54:06.880867 1719 topology_manager.go:215] "Topology Admit Handler" podUID="593d08bacb1d5de22dcb8f5224a99e3c" podNamespace="kube-system" podName="kube-scheduler-localhost" Jul 2 00:54:06.885905 systemd[1]: Created slice kubepods-burstable-podeb3f6ecc576deacf341791f9d86e9d24.slice. Jul 2 00:54:06.897910 systemd[1]: Created slice kubepods-burstable-pod42b008e702ec2a5b396aebedf13804b4.slice. Jul 2 00:54:06.900354 systemd[1]: Created slice kubepods-burstable-pod593d08bacb1d5de22dcb8f5224a99e3c.slice. Jul 2 00:54:06.961894 kubelet[1719]: E0702 00:54:06.961823 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="400ms" Jul 2 00:54:07.062063 kubelet[1719]: I0702 00:54:07.062031 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:07.062136 kubelet[1719]: I0702 00:54:07.062070 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:07.062136 kubelet[1719]: I0702 00:54:07.062091 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:07.062136 kubelet[1719]: I0702 00:54:07.062111 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:07.062202 kubelet[1719]: I0702 00:54:07.062172 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:07.062288 kubelet[1719]: I0702 00:54:07.062265 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:07.062327 kubelet[1719]: I0702 00:54:07.062297 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:07.062351 kubelet[1719]: I0702 00:54:07.062326 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:07.062373 kubelet[1719]: I0702 00:54:07.062358 1719 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/593d08bacb1d5de22dcb8f5224a99e3c-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"593d08bacb1d5de22dcb8f5224a99e3c\") " pod="kube-system/kube-scheduler-localhost" Jul 2 00:54:07.064838 kubelet[1719]: I0702 00:54:07.064800 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:54:07.065130 kubelet[1719]: E0702 00:54:07.065110 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" Jul 2 00:54:07.198749 kubelet[1719]: E0702 00:54:07.198699 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.199410 kubelet[1719]: E0702 00:54:07.199391 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.199549 env[1214]: time="2024-07-02T00:54:07.199480864Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:eb3f6ecc576deacf341791f9d86e9d24,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:07.200137 env[1214]: time="2024-07-02T00:54:07.200086526Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:42b008e702ec2a5b396aebedf13804b4,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:07.202551 kubelet[1719]: E0702 00:54:07.202503 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.203293 env[1214]: time="2024-07-02T00:54:07.203246355Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:593d08bacb1d5de22dcb8f5224a99e3c,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:07.293365 kubelet[1719]: E0702 00:54:07.293274 1719 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.0.0.92:6443/api/v1/namespaces/default/events\": dial tcp 10.0.0.92:6443: connect: connection refused" event="&Event{ObjectMeta:{localhost.17de3f3ed240b7d4 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:localhost,UID:localhost,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:localhost,},FirstTimestamp:2024-07-02 00:54:06.750087124 +0000 UTC m=+1.282576187,LastTimestamp:2024-07-02 00:54:06.750087124 +0000 UTC m=+1.282576187,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:localhost,}" Jul 2 00:54:07.362905 kubelet[1719]: E0702 00:54:07.362865 1719 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.0.0.92:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/localhost?timeout=10s\": dial tcp 10.0.0.92:6443: connect: connection refused" interval="800ms" Jul 2 00:54:07.466346 kubelet[1719]: I0702 00:54:07.466285 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:54:07.466654 kubelet[1719]: E0702 00:54:07.466628 1719 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.0.0.92:6443/api/v1/nodes\": dial tcp 10.0.0.92:6443: connect: connection refused" node="localhost" Jul 2 00:54:07.614825 kubelet[1719]: W0702 00:54:07.614576 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:07.614825 kubelet[1719]: E0702 00:54:07.614616 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.0.0.92:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:07.703433 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3378977514.mount: Deactivated successfully. Jul 2 00:54:07.708114 env[1214]: time="2024-07-02T00:54:07.708076895Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.709780 env[1214]: time="2024-07-02T00:54:07.709742987Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.710664 env[1214]: time="2024-07-02T00:54:07.710637774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.711911 env[1214]: time="2024-07-02T00:54:07.711882987Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.713939 env[1214]: time="2024-07-02T00:54:07.713912493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.714689 env[1214]: time="2024-07-02T00:54:07.714665056Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.717887 env[1214]: time="2024-07-02T00:54:07.717853857Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.718629 env[1214]: time="2024-07-02T00:54:07.718597468Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.721522 env[1214]: time="2024-07-02T00:54:07.721472569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.722793 env[1214]: time="2024-07-02T00:54:07.722762619Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.723405 env[1214]: time="2024-07-02T00:54:07.723373917Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.724036 env[1214]: time="2024-07-02T00:54:07.724014146Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:07.749271 env[1214]: time="2024-07-02T00:54:07.747526779Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:07.749271 env[1214]: time="2024-07-02T00:54:07.747575692Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:07.749271 env[1214]: time="2024-07-02T00:54:07.747586083Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:07.749271 env[1214]: time="2024-07-02T00:54:07.747765871Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/35a1e451c66c9bf3f528351d958b626f73eaf213647d89807628cd4d9142a678 pid=1767 runtime=io.containerd.runc.v2 Jul 2 00:54:07.749738 env[1214]: time="2024-07-02T00:54:07.749631014Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:07.749738 env[1214]: time="2024-07-02T00:54:07.749668658Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:07.749738 env[1214]: time="2024-07-02T00:54:07.749678568Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:07.750189 env[1214]: time="2024-07-02T00:54:07.750135693Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/84de4add77f43a8dc4164d2156f0f97ddcafef43df4c2bb9428245911e88592d pid=1771 runtime=io.containerd.runc.v2 Jul 2 00:54:07.756658 env[1214]: time="2024-07-02T00:54:07.756579312Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:07.756658 env[1214]: time="2024-07-02T00:54:07.756617715Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:07.756658 env[1214]: time="2024-07-02T00:54:07.756628665Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:07.756808 env[1214]: time="2024-07-02T00:54:07.756766893Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5264a8c8ca07e5af1bf3190cdb23b14cf3432d0ed4d4319db6e650b400750fc3 pid=1800 runtime=io.containerd.runc.v2 Jul 2 00:54:07.763226 systemd[1]: Started cri-containerd-35a1e451c66c9bf3f528351d958b626f73eaf213647d89807628cd4d9142a678.scope. Jul 2 00:54:07.764209 systemd[1]: Started cri-containerd-84de4add77f43a8dc4164d2156f0f97ddcafef43df4c2bb9428245911e88592d.scope. Jul 2 00:54:07.784946 systemd[1]: Started cri-containerd-5264a8c8ca07e5af1bf3190cdb23b14cf3432d0ed4d4319db6e650b400750fc3.scope. Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit: BPF prog-id=61 op=LOAD Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335613165343531633636633962663366353238333531643935386236 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335613165343531633636633962663366353238333531643935386236 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit: BPF prog-id=62 op=LOAD Jul 2 00:54:07.794000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335613165343531633636633962663366353238333531643935386236 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.794000 audit: BPF prog-id=63 op=LOAD Jul 2 00:54:07.794000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.794000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335613165343531633636633962663366353238333531643935386236 Jul 2 00:54:07.794000 audit: BPF prog-id=63 op=UNLOAD Jul 2 00:54:07.794000 audit: BPF prog-id=62 op=UNLOAD Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { perfmon } for pid=1797 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit[1797]: AVC avc: denied { bpf } for pid=1797 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.795000 audit: BPF prog-id=64 op=LOAD Jul 2 00:54:07.795000 audit[1797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.795000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3335613165343531633636633962663366353238333531643935386236 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.796000 audit: BPF prog-id=65 op=LOAD Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646534616464373766343361386463343136346432313536663066 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646534616464373766343361386463343136346432313536663066 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit: BPF prog-id=66 op=LOAD Jul 2 00:54:07.797000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646534616464373766343361386463343136346432313536663066 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit: BPF prog-id=67 op=LOAD Jul 2 00:54:07.797000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646534616464373766343361386463343136346432313536663066 Jul 2 00:54:07.797000 audit: BPF prog-id=67 op=UNLOAD Jul 2 00:54:07.797000 audit: BPF prog-id=66 op=UNLOAD Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { perfmon } for pid=1801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit[1801]: AVC avc: denied { bpf } for pid=1801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.797000 audit: BPF prog-id=68 op=LOAD Jul 2 00:54:07.797000 audit[1801]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1771 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.797000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834646534616464373766343361386463343136346432313536663066 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit: BPF prog-id=69 op=LOAD Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363461386338636130376535616631626633313930636462323362 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363461386338636130376535616631626633313930636462323362 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit: BPF prog-id=70 op=LOAD Jul 2 00:54:07.811000 audit[1825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363461386338636130376535616631626633313930636462323362 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit: BPF prog-id=71 op=LOAD Jul 2 00:54:07.811000 audit[1825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363461386338636130376535616631626633313930636462323362 Jul 2 00:54:07.811000 audit: BPF prog-id=71 op=UNLOAD Jul 2 00:54:07.811000 audit: BPF prog-id=70 op=UNLOAD Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { perfmon } for pid=1825 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit[1825]: AVC avc: denied { bpf } for pid=1825 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.811000 audit: BPF prog-id=72 op=LOAD Jul 2 00:54:07.811000 audit[1825]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=1800 pid=1825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.811000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3532363461386338636130376535616631626633313930636462323362 Jul 2 00:54:07.819232 env[1214]: time="2024-07-02T00:54:07.819195199Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-localhost,Uid:42b008e702ec2a5b396aebedf13804b4,Namespace:kube-system,Attempt:0,} returns sandbox id \"84de4add77f43a8dc4164d2156f0f97ddcafef43df4c2bb9428245911e88592d\"" Jul 2 00:54:07.820466 kubelet[1719]: E0702 00:54:07.820308 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.823002 env[1214]: time="2024-07-02T00:54:07.822969523Z" level=info msg="CreateContainer within sandbox \"84de4add77f43a8dc4164d2156f0f97ddcafef43df4c2bb9428245911e88592d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Jul 2 00:54:07.827134 env[1214]: time="2024-07-02T00:54:07.824227923Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-localhost,Uid:eb3f6ecc576deacf341791f9d86e9d24,Namespace:kube-system,Attempt:0,} returns sandbox id \"35a1e451c66c9bf3f528351d958b626f73eaf213647d89807628cd4d9142a678\"" Jul 2 00:54:07.827134 env[1214]: time="2024-07-02T00:54:07.826445330Z" level=info msg="CreateContainer within sandbox \"35a1e451c66c9bf3f528351d958b626f73eaf213647d89807628cd4d9142a678\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Jul 2 00:54:07.827221 kubelet[1719]: E0702 00:54:07.824771 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.843128 env[1214]: time="2024-07-02T00:54:07.843094543Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-localhost,Uid:593d08bacb1d5de22dcb8f5224a99e3c,Namespace:kube-system,Attempt:0,} returns sandbox id \"5264a8c8ca07e5af1bf3190cdb23b14cf3432d0ed4d4319db6e650b400750fc3\"" Jul 2 00:54:07.843817 kubelet[1719]: E0702 00:54:07.843798 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:07.843993 env[1214]: time="2024-07-02T00:54:07.843953165Z" level=info msg="CreateContainer within sandbox \"35a1e451c66c9bf3f528351d958b626f73eaf213647d89807628cd4d9142a678\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"6e707240efe6e17d31aae9f68860fb7e836b0a3aceff1f08443ab1126091a0ea\"" Jul 2 00:54:07.844916 env[1214]: time="2024-07-02T00:54:07.844883718Z" level=info msg="StartContainer for \"6e707240efe6e17d31aae9f68860fb7e836b0a3aceff1f08443ab1126091a0ea\"" Jul 2 00:54:07.845713 env[1214]: time="2024-07-02T00:54:07.845682237Z" level=info msg="CreateContainer within sandbox \"5264a8c8ca07e5af1bf3190cdb23b14cf3432d0ed4d4319db6e650b400750fc3\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Jul 2 00:54:07.846247 env[1214]: time="2024-07-02T00:54:07.846193031Z" level=info msg="CreateContainer within sandbox \"84de4add77f43a8dc4164d2156f0f97ddcafef43df4c2bb9428245911e88592d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"5cc61ca366e5e9c601ec508820d66b557b5e8f8e954943f256e04a4bd021293f\"" Jul 2 00:54:07.849073 env[1214]: time="2024-07-02T00:54:07.849042076Z" level=info msg="StartContainer for \"5cc61ca366e5e9c601ec508820d66b557b5e8f8e954943f256e04a4bd021293f\"" Jul 2 00:54:07.856208 env[1214]: time="2024-07-02T00:54:07.856172760Z" level=info msg="CreateContainer within sandbox \"5264a8c8ca07e5af1bf3190cdb23b14cf3432d0ed4d4319db6e650b400750fc3\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"a3120fa63a588234fcd843d0b964614e3043778ad4bd18822e1c6e13a357634e\"" Jul 2 00:54:07.856829 env[1214]: time="2024-07-02T00:54:07.856804478Z" level=info msg="StartContainer for \"a3120fa63a588234fcd843d0b964614e3043778ad4bd18822e1c6e13a357634e\"" Jul 2 00:54:07.862960 systemd[1]: Started cri-containerd-6e707240efe6e17d31aae9f68860fb7e836b0a3aceff1f08443ab1126091a0ea.scope. Jul 2 00:54:07.864765 kubelet[1719]: W0702 00:54:07.864693 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:07.864765 kubelet[1719]: E0702 00:54:07.864745 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.0.0.92:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:07.868896 systemd[1]: Started cri-containerd-5cc61ca366e5e9c601ec508820d66b557b5e8f8e954943f256e04a4bd021293f.scope. Jul 2 00:54:07.885610 systemd[1]: Started cri-containerd-a3120fa63a588234fcd843d0b964614e3043778ad4bd18822e1c6e13a357634e.scope. Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit: BPF prog-id=73 op=LOAD Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1771 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633631636133363665356539633630316563353038383230643636 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1771 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633631636133363665356539633630316563353038383230643636 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit: BPF prog-id=74 op=LOAD Jul 2 00:54:07.911000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1771 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633631636133363665356539633630316563353038383230643636 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.911000 audit: BPF prog-id=75 op=LOAD Jul 2 00:54:07.911000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1771 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.911000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633631636133363665356539633630316563353038383230643636 Jul 2 00:54:07.912000 audit: BPF prog-id=75 op=UNLOAD Jul 2 00:54:07.912000 audit: BPF prog-id=74 op=UNLOAD Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { perfmon } for pid=1898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1898]: AVC avc: denied { bpf } for pid=1898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit: BPF prog-id=76 op=LOAD Jul 2 00:54:07.912000 audit[1898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1771 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563633631636133363665356539633630316563353038383230643636 Jul 2 00:54:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.912000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit: BPF prog-id=79 op=LOAD Jul 2 00:54:07.913000 audit[1926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400018d670 a2=78 a3=0 items=0 ppid=1800 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230666136336135383832333466636438343364306239363436 Jul 2 00:54:07.913000 audit: BPF prog-id=79 op=UNLOAD Jul 2 00:54:07.913000 audit: BPF prog-id=78 op=UNLOAD Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { perfmon } for pid=1926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit[1926]: AVC avc: denied { bpf } for pid=1926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.913000 audit: BPF prog-id=80 op=LOAD Jul 2 00:54:07.913000 audit[1926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400018db40 a2=78 a3=0 items=0 ppid=1800 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6133313230666136336135383832333466636438343364306239363436 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.916000 audit: BPF prog-id=81 op=LOAD Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=1767 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373037323430656665366531376433316161653966363838363066 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=1767 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373037323430656665366531376433316161653966363838363066 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.917000 audit: BPF prog-id=82 op=LOAD Jul 2 00:54:07.917000 audit[1899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=1767 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373037323430656665366531376433316161653966363838363066 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit: BPF prog-id=83 op=LOAD Jul 2 00:54:07.918000 audit[1899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=1767 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373037323430656665366531376433316161653966363838363066 Jul 2 00:54:07.918000 audit: BPF prog-id=83 op=UNLOAD Jul 2 00:54:07.918000 audit: BPF prog-id=82 op=UNLOAD Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { perfmon } for pid=1899 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit[1899]: AVC avc: denied { bpf } for pid=1899 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:07.918000 audit: BPF prog-id=84 op=LOAD Jul 2 00:54:07.918000 audit[1899]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=1767 pid=1899 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:07.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3665373037323430656665366531376433316161653966363838363066 Jul 2 00:54:07.940573 env[1214]: time="2024-07-02T00:54:07.940523294Z" level=info msg="StartContainer for \"6e707240efe6e17d31aae9f68860fb7e836b0a3aceff1f08443ab1126091a0ea\" returns successfully" Jul 2 00:54:07.943376 env[1214]: time="2024-07-02T00:54:07.943342807Z" level=info msg="StartContainer for \"a3120fa63a588234fcd843d0b964614e3043778ad4bd18822e1c6e13a357634e\" returns successfully" Jul 2 00:54:07.978078 env[1214]: time="2024-07-02T00:54:07.978046335Z" level=info msg="StartContainer for \"5cc61ca366e5e9c601ec508820d66b557b5e8f8e954943f256e04a4bd021293f\" returns successfully" Jul 2 00:54:07.995283 kubelet[1719]: W0702 00:54:07.995234 1719 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:07.995356 kubelet[1719]: E0702 00:54:07.995287 1719 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.0.0.92:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.0.0.92:6443: connect: connection refused Jul 2 00:54:08.268165 kubelet[1719]: I0702 00:54:08.268072 1719 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:54:08.784725 kubelet[1719]: E0702 00:54:08.784700 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:08.786713 kubelet[1719]: E0702 00:54:08.786681 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:08.789238 kubelet[1719]: E0702 00:54:08.789209 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:09.400358 kernel: kauditd_printk_skb: 611 callbacks suppressed Jul 2 00:54:09.400461 kernel: audit: type=1400 audit(1719881649.396:541): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.400483 kernel: audit: type=1400 audit(1719881649.397:542): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.396000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.397000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.397000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40001603a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:09.405653 kernel: audit: type=1300 audit(1719881649.397:542): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=40001603a0 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:09.405694 kernel: audit: type=1327 audit(1719881649.397:542): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:09.397000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:09.396000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b2d950 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:09.411180 kernel: audit: type=1300 audit(1719881649.396:541): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b2d950 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:09.411219 kernel: audit: type=1327 audit(1719881649.396:541): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:09.396000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:09.754000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.754000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.760024 kernel: audit: type=1400 audit(1719881649.754:544): avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.760086 kernel: audit: type=1400 audit(1719881649.754:543): avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.760107 kernel: audit: type=1300 audit(1719881649.754:543): arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4004ab68d0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.754000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=42 a1=4004ab68d0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.765182 kernel: audit: type=1327 audit(1719881649.754:543): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.754000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=4003107ec0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.754000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.765000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.765000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40072e4090 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.766000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.766000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=40072e4180 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.767000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.767000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4003226400 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.767000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:09.767000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4c a1=4006f7ff20 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:54:09.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:54:09.799333 kubelet[1719]: E0702 00:54:09.799298 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:09.849176 kubelet[1719]: E0702 00:54:09.849145 1719 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"localhost\" not found" node="localhost" Jul 2 00:54:09.915061 kubelet[1719]: I0702 00:54:09.915019 1719 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Jul 2 00:54:10.745676 kubelet[1719]: I0702 00:54:10.745641 1719 apiserver.go:52] "Watching apiserver" Jul 2 00:54:10.762001 kubelet[1719]: I0702 00:54:10.761969 1719 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 00:54:10.807632 kubelet[1719]: E0702 00:54:10.807604 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:11.801654 kubelet[1719]: E0702 00:54:11.801621 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:12.471197 kubelet[1719]: E0702 00:54:12.471166 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:12.585107 systemd[1]: Reloading. Jul 2 00:54:12.628117 /usr/lib/systemd/system-generators/torcx-generator[2021]: time="2024-07-02T00:54:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.5 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.5 /var/lib/torcx/store]" Jul 2 00:54:12.628144 /usr/lib/systemd/system-generators/torcx-generator[2021]: time="2024-07-02T00:54:12Z" level=info msg="torcx already run" Jul 2 00:54:12.685439 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Jul 2 00:54:12.685459 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Jul 2 00:54:12.690907 kubelet[1719]: E0702 00:54:12.690885 1719 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:12.703090 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit: BPF prog-id=85 op=LOAD Jul 2 00:54:12.771000 audit: BPF prog-id=46 op=UNLOAD Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.771000 audit: BPF prog-id=86 op=LOAD Jul 2 00:54:12.771000 audit: BPF prog-id=69 op=UNLOAD Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit: BPF prog-id=87 op=LOAD Jul 2 00:54:12.772000 audit: BPF prog-id=47 op=UNLOAD Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit: BPF prog-id=88 op=LOAD Jul 2 00:54:12.773000 audit: BPF prog-id=65 op=UNLOAD Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.773000 audit: BPF prog-id=89 op=LOAD Jul 2 00:54:12.773000 audit: BPF prog-id=81 op=UNLOAD Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.774000 audit: BPF prog-id=90 op=LOAD Jul 2 00:54:12.774000 audit: BPF prog-id=48 op=UNLOAD Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.775000 audit: BPF prog-id=91 op=LOAD Jul 2 00:54:12.775000 audit: BPF prog-id=77 op=UNLOAD Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit: BPF prog-id=92 op=LOAD Jul 2 00:54:12.776000 audit: BPF prog-id=49 op=UNLOAD Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit: BPF prog-id=93 op=LOAD Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit: BPF prog-id=94 op=LOAD Jul 2 00:54:12.776000 audit: BPF prog-id=50 op=UNLOAD Jul 2 00:54:12.776000 audit: BPF prog-id=51 op=UNLOAD Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.776000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit: BPF prog-id=95 op=LOAD Jul 2 00:54:12.777000 audit: BPF prog-id=52 op=UNLOAD Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit: BPF prog-id=96 op=LOAD Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit: BPF prog-id=97 op=LOAD Jul 2 00:54:12.777000 audit: BPF prog-id=53 op=UNLOAD Jul 2 00:54:12.777000 audit: BPF prog-id=54 op=UNLOAD Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.777000 audit: BPF prog-id=98 op=LOAD Jul 2 00:54:12.777000 audit: BPF prog-id=55 op=UNLOAD Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.778000 audit: BPF prog-id=99 op=LOAD Jul 2 00:54:12.778000 audit: BPF prog-id=73 op=UNLOAD Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit: BPF prog-id=100 op=LOAD Jul 2 00:54:12.779000 audit: BPF prog-id=56 op=UNLOAD Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit: BPF prog-id=101 op=LOAD Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit: BPF prog-id=102 op=LOAD Jul 2 00:54:12.779000 audit: BPF prog-id=57 op=UNLOAD Jul 2 00:54:12.779000 audit: BPF prog-id=58 op=UNLOAD Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.779000 audit: BPF prog-id=103 op=LOAD Jul 2 00:54:12.779000 audit: BPF prog-id=61 op=UNLOAD Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit: BPF prog-id=104 op=LOAD Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.781000 audit: BPF prog-id=105 op=LOAD Jul 2 00:54:12.781000 audit: BPF prog-id=59 op=UNLOAD Jul 2 00:54:12.781000 audit: BPF prog-id=60 op=UNLOAD Jul 2 00:54:12.797854 kubelet[1719]: I0702 00:54:12.797793 1719 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:54:12.798034 systemd[1]: Stopping kubelet.service... Jul 2 00:54:12.818919 systemd[1]: kubelet.service: Deactivated successfully. Jul 2 00:54:12.819102 systemd[1]: Stopped kubelet.service. Jul 2 00:54:12.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:12.819163 systemd[1]: kubelet.service: Consumed 1.649s CPU time. Jul 2 00:54:12.820776 systemd[1]: Starting kubelet.service... Jul 2 00:54:12.902864 systemd[1]: Started kubelet.service. Jul 2 00:54:12.902000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:12.957499 kubelet[2063]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:54:12.957499 kubelet[2063]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Jul 2 00:54:12.957499 kubelet[2063]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Jul 2 00:54:12.957852 kubelet[2063]: I0702 00:54:12.957574 2063 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Jul 2 00:54:12.962520 kubelet[2063]: I0702 00:54:12.961725 2063 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Jul 2 00:54:12.962520 kubelet[2063]: I0702 00:54:12.961747 2063 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Jul 2 00:54:12.962520 kubelet[2063]: I0702 00:54:12.961929 2063 server.go:919] "Client rotation is on, will bootstrap in background" Jul 2 00:54:12.963467 kubelet[2063]: I0702 00:54:12.963444 2063 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Jul 2 00:54:12.965551 kubelet[2063]: I0702 00:54:12.965509 2063 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Jul 2 00:54:12.971175 kubelet[2063]: I0702 00:54:12.971151 2063 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Jul 2 00:54:12.971370 kubelet[2063]: I0702 00:54:12.971360 2063 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Jul 2 00:54:12.971546 kubelet[2063]: I0702 00:54:12.971513 2063 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Jul 2 00:54:12.971640 kubelet[2063]: I0702 00:54:12.971556 2063 topology_manager.go:138] "Creating topology manager with none policy" Jul 2 00:54:12.971640 kubelet[2063]: I0702 00:54:12.971566 2063 container_manager_linux.go:301] "Creating device plugin manager" Jul 2 00:54:12.971640 kubelet[2063]: I0702 00:54:12.971594 2063 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:54:12.971752 kubelet[2063]: I0702 00:54:12.971726 2063 kubelet.go:396] "Attempting to sync node with API server" Jul 2 00:54:12.971752 kubelet[2063]: I0702 00:54:12.971754 2063 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Jul 2 00:54:12.972136 kubelet[2063]: I0702 00:54:12.972117 2063 kubelet.go:312] "Adding apiserver pod source" Jul 2 00:54:12.972205 kubelet[2063]: I0702 00:54:12.972141 2063 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Jul 2 00:54:12.982961 kubelet[2063]: I0702 00:54:12.982925 2063 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Jul 2 00:54:12.985878 kubelet[2063]: I0702 00:54:12.983121 2063 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Jul 2 00:54:12.985878 kubelet[2063]: I0702 00:54:12.983509 2063 server.go:1256] "Started kubelet" Jul 2 00:54:12.985878 kubelet[2063]: I0702 00:54:12.985219 2063 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Jul 2 00:54:12.985878 kubelet[2063]: I0702 00:54:12.985374 2063 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Jul 2 00:54:12.985000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.986769 kubelet[2063]: I0702 00:54:12.986747 2063 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Jul 2 00:54:12.985000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:12.985000 audit[2063]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000c801e0 a1=40003369d8 a2=4000c801b0 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:12.985000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:12.987057 kubelet[2063]: I0702 00:54:12.986841 2063 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Jul 2 00:54:12.986000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:12.986000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:12.986000 audit[2063]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ba0dc0 a1=4000ba4510 a2=4000ba7470 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:12.986000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:12.987344 kubelet[2063]: I0702 00:54:12.987329 2063 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Jul 2 00:54:12.987440 kubelet[2063]: I0702 00:54:12.987428 2063 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Jul 2 00:54:12.987519 kubelet[2063]: I0702 00:54:12.987494 2063 server.go:461] "Adding debug handlers to kubelet server" Jul 2 00:54:12.992354 kubelet[2063]: I0702 00:54:12.991679 2063 volume_manager.go:291] "Starting Kubelet Volume Manager" Jul 2 00:54:12.992354 kubelet[2063]: I0702 00:54:12.991906 2063 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Jul 2 00:54:12.992354 kubelet[2063]: I0702 00:54:12.992174 2063 reconciler_new.go:29] "Reconciler: start to sync state" Jul 2 00:54:12.995792 kubelet[2063]: E0702 00:54:12.995760 2063 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Jul 2 00:54:12.999842 kubelet[2063]: I0702 00:54:12.999763 2063 factory.go:221] Registration of the containerd container factory successfully Jul 2 00:54:12.999842 kubelet[2063]: I0702 00:54:12.999787 2063 factory.go:221] Registration of the systemd container factory successfully Jul 2 00:54:13.000105 kubelet[2063]: I0702 00:54:12.999904 2063 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Jul 2 00:54:13.000524 kubelet[2063]: I0702 00:54:13.000498 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Jul 2 00:54:13.001581 kubelet[2063]: I0702 00:54:13.001515 2063 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Jul 2 00:54:13.001581 kubelet[2063]: I0702 00:54:13.001547 2063 status_manager.go:217] "Starting to sync pod status with apiserver" Jul 2 00:54:13.001581 kubelet[2063]: I0702 00:54:13.001565 2063 kubelet.go:2329] "Starting kubelet main sync loop" Jul 2 00:54:13.001703 kubelet[2063]: E0702 00:54:13.001610 2063 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Jul 2 00:54:13.027279 kubelet[2063]: I0702 00:54:13.027194 2063 cpu_manager.go:214] "Starting CPU manager" policy="none" Jul 2 00:54:13.027279 kubelet[2063]: I0702 00:54:13.027216 2063 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Jul 2 00:54:13.027279 kubelet[2063]: I0702 00:54:13.027235 2063 state_mem.go:36] "Initialized new in-memory state store" Jul 2 00:54:13.027442 kubelet[2063]: I0702 00:54:13.027412 2063 state_mem.go:88] "Updated default CPUSet" cpuSet="" Jul 2 00:54:13.027442 kubelet[2063]: I0702 00:54:13.027432 2063 state_mem.go:96] "Updated CPUSet assignments" assignments={} Jul 2 00:54:13.027442 kubelet[2063]: I0702 00:54:13.027438 2063 policy_none.go:49] "None policy: Start" Jul 2 00:54:13.032987 kubelet[2063]: I0702 00:54:13.032961 2063 memory_manager.go:170] "Starting memorymanager" policy="None" Jul 2 00:54:13.033082 kubelet[2063]: I0702 00:54:13.032994 2063 state_mem.go:35] "Initializing new in-memory state store" Jul 2 00:54:13.033222 kubelet[2063]: I0702 00:54:13.033208 2063 state_mem.go:75] "Updated machine memory state" Jul 2 00:54:13.036820 kubelet[2063]: I0702 00:54:13.036789 2063 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Jul 2 00:54:13.036000 audit[2063]: AVC avc: denied { mac_admin } for pid=2063 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:13.036000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Jul 2 00:54:13.036000 audit[2063]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400113b080 a1=4000c33008 a2=400113b050 a3=25 items=0 ppid=1 pid=2063 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:13.036000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Jul 2 00:54:13.037200 kubelet[2063]: I0702 00:54:13.036863 2063 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Jul 2 00:54:13.037665 kubelet[2063]: I0702 00:54:13.037522 2063 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Jul 2 00:54:13.101794 kubelet[2063]: I0702 00:54:13.101742 2063 topology_manager.go:215] "Topology Admit Handler" podUID="593d08bacb1d5de22dcb8f5224a99e3c" podNamespace="kube-system" podName="kube-scheduler-localhost" Jul 2 00:54:13.101919 kubelet[2063]: I0702 00:54:13.101838 2063 topology_manager.go:215] "Topology Admit Handler" podUID="eb3f6ecc576deacf341791f9d86e9d24" podNamespace="kube-system" podName="kube-apiserver-localhost" Jul 2 00:54:13.101919 kubelet[2063]: I0702 00:54:13.101900 2063 topology_manager.go:215] "Topology Admit Handler" podUID="42b008e702ec2a5b396aebedf13804b4" podNamespace="kube-system" podName="kube-controller-manager-localhost" Jul 2 00:54:13.106721 kubelet[2063]: E0702 00:54:13.106694 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-localhost\" already exists" pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.108552 kubelet[2063]: E0702 00:54:13.108510 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-localhost\" already exists" pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:13.109235 kubelet[2063]: E0702 00:54:13.109181 2063 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-scheduler-localhost\" already exists" pod="kube-system/kube-scheduler-localhost" Jul 2 00:54:13.146748 kubelet[2063]: I0702 00:54:13.146717 2063 kubelet_node_status.go:73] "Attempting to register node" node="localhost" Jul 2 00:54:13.153886 kubelet[2063]: I0702 00:54:13.153856 2063 kubelet_node_status.go:112] "Node was previously registered" node="localhost" Jul 2 00:54:13.153954 kubelet[2063]: I0702 00:54:13.153940 2063 kubelet_node_status.go:76] "Successfully registered node" node="localhost" Jul 2 00:54:13.294147 kubelet[2063]: I0702 00:54:13.294055 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-kubeconfig\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.294374 kubelet[2063]: I0702 00:54:13.294359 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-ca-certs\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:13.294831 kubelet[2063]: I0702 00:54:13.294815 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-k8s-certs\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:13.294963 kubelet[2063]: I0702 00:54:13.294950 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-ca-certs\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.295101 kubelet[2063]: I0702 00:54:13.295059 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-flexvolume-dir\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.295145 kubelet[2063]: I0702 00:54:13.295104 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-k8s-certs\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.295145 kubelet[2063]: I0702 00:54:13.295127 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/42b008e702ec2a5b396aebedf13804b4-usr-share-ca-certificates\") pod \"kube-controller-manager-localhost\" (UID: \"42b008e702ec2a5b396aebedf13804b4\") " pod="kube-system/kube-controller-manager-localhost" Jul 2 00:54:13.295206 kubelet[2063]: I0702 00:54:13.295150 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/593d08bacb1d5de22dcb8f5224a99e3c-kubeconfig\") pod \"kube-scheduler-localhost\" (UID: \"593d08bacb1d5de22dcb8f5224a99e3c\") " pod="kube-system/kube-scheduler-localhost" Jul 2 00:54:13.295206 kubelet[2063]: I0702 00:54:13.295172 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/eb3f6ecc576deacf341791f9d86e9d24-usr-share-ca-certificates\") pod \"kube-apiserver-localhost\" (UID: \"eb3f6ecc576deacf341791f9d86e9d24\") " pod="kube-system/kube-apiserver-localhost" Jul 2 00:54:13.408584 kubelet[2063]: E0702 00:54:13.408558 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:13.409099 kubelet[2063]: E0702 00:54:13.409074 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:13.409817 kubelet[2063]: E0702 00:54:13.409792 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:13.916000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=520972 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Jul 2 00:54:13.916000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400061b180 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:13.916000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:13.973806 kubelet[2063]: I0702 00:54:13.973759 2063 apiserver.go:52] "Watching apiserver" Jul 2 00:54:13.992447 kubelet[2063]: I0702 00:54:13.992255 2063 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Jul 2 00:54:14.010194 kubelet[2063]: E0702 00:54:14.010167 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:14.010401 kubelet[2063]: E0702 00:54:14.010361 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:14.010791 kubelet[2063]: E0702 00:54:14.010764 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:14.044174 kubelet[2063]: I0702 00:54:14.044139 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-localhost" podStartSLOduration=2.044096755 podStartE2EDuration="2.044096755s" podCreationTimestamp="2024-07-02 00:54:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:14.043546081 +0000 UTC m=+1.137078788" watchObservedRunningTime="2024-07-02 00:54:14.044096755 +0000 UTC m=+1.137629502" Jul 2 00:54:14.052463 kubelet[2063]: I0702 00:54:14.052430 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-localhost" podStartSLOduration=4.052392172 podStartE2EDuration="4.052392172s" podCreationTimestamp="2024-07-02 00:54:10 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:14.051441607 +0000 UTC m=+1.144974354" watchObservedRunningTime="2024-07-02 00:54:14.052392172 +0000 UTC m=+1.145924919" Jul 2 00:54:14.070186 kubelet[2063]: I0702 00:54:14.070147 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-localhost" podStartSLOduration=2.070113504 podStartE2EDuration="2.070113504s" podCreationTimestamp="2024-07-02 00:54:12 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:14.058283089 +0000 UTC m=+1.151815916" watchObservedRunningTime="2024-07-02 00:54:14.070113504 +0000 UTC m=+1.163646251" Jul 2 00:54:15.011915 kubelet[2063]: E0702 00:54:15.011873 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:15.680000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.684541 kernel: kauditd_printk_skb: 275 callbacks suppressed Jul 2 00:54:15.684617 kernel: audit: type=1400 audit(1719881655.680:799): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.684647 kernel: audit: type=1300 audit(1719881655.680:799): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fc0dc0 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.680000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fc0dc0 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.680000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.689842 kernel: audit: type=1327 audit(1719881655.680:799): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.689904 kernel: audit: type=1400 audit(1719881655.682:800): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.682000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.682000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011c6a40 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.694862 kernel: audit: type=1300 audit(1719881655.682:800): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011c6a40 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.694901 kernel: audit: type=1327 audit(1719881655.682:800): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.682000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.699427 kernel: audit: type=1400 audit(1719881655.682:801): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.699467 kernel: audit: type=1300 audit(1719881655.682:801): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fc0e00 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.682000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000fc0e00 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.704713 kernel: audit: type=1327 audit(1719881655.682:801): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:15.704749 kernel: audit: type=1400 audit(1719881655.683:802): avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.683000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:54:15.683000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000fc0e40 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:54:15.683000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:54:16.548946 kubelet[2063]: E0702 00:54:16.548912 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:17.126716 sudo[1355]: pam_unix(sudo:session): session closed for user root Jul 2 00:54:17.125000 audit[1355]: USER_END pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:54:17.125000 audit[1355]: CRED_DISP pid=1355 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Jul 2 00:54:17.128502 sshd[1351]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:17.130000 audit[1351]: USER_END pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:17.131000 audit[1351]: CRED_DISP pid=1351 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:17.134174 systemd[1]: sshd@6-10.0.0.92:22-10.0.0.1:42648.service: Deactivated successfully. Jul 2 00:54:17.132000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.0.0.92:22-10.0.0.1:42648 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:17.134918 systemd[1]: session-7.scope: Deactivated successfully. Jul 2 00:54:17.135076 systemd[1]: session-7.scope: Consumed 6.201s CPU time. Jul 2 00:54:17.135454 systemd-logind[1205]: Session 7 logged out. Waiting for processes to exit. Jul 2 00:54:17.136188 systemd-logind[1205]: Removed session 7. Jul 2 00:54:19.594694 kubelet[2063]: E0702 00:54:19.594647 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:20.019397 kubelet[2063]: E0702 00:54:20.019359 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:23.206924 kubelet[2063]: E0702 00:54:23.206884 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:24.025632 kubelet[2063]: E0702 00:54:24.025571 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:26.558382 kubelet[2063]: E0702 00:54:26.557885 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:27.006987 update_engine[1208]: I0702 00:54:27.006596 1208 update_attempter.cc:509] Updating boot flags... Jul 2 00:54:27.037905 kubelet[2063]: E0702 00:54:27.037869 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:28.257015 kubelet[2063]: I0702 00:54:28.256977 2063 topology_manager.go:215] "Topology Admit Handler" podUID="e5a247bf-6fa2-49d6-9291-119217de5785" podNamespace="kube-system" podName="kube-proxy-mff6n" Jul 2 00:54:28.261941 systemd[1]: Created slice kubepods-besteffort-pode5a247bf_6fa2_49d6_9291_119217de5785.slice. Jul 2 00:54:28.269626 kubelet[2063]: I0702 00:54:28.269604 2063 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Jul 2 00:54:28.270130 env[1214]: time="2024-07-02T00:54:28.270079255Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Jul 2 00:54:28.270686 kubelet[2063]: I0702 00:54:28.270659 2063 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Jul 2 00:54:28.307398 kubelet[2063]: I0702 00:54:28.307354 2063 topology_manager.go:215] "Topology Admit Handler" podUID="7a7d14d5-0f85-4d27-976a-8f0206c670b9" podNamespace="tigera-operator" podName="tigera-operator-76c4974c85-k7rb7" Jul 2 00:54:28.312040 systemd[1]: Created slice kubepods-besteffort-pod7a7d14d5_0f85_4d27_976a_8f0206c670b9.slice. Jul 2 00:54:28.399035 kubelet[2063]: I0702 00:54:28.398991 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e5a247bf-6fa2-49d6-9291-119217de5785-xtables-lock\") pod \"kube-proxy-mff6n\" (UID: \"e5a247bf-6fa2-49d6-9291-119217de5785\") " pod="kube-system/kube-proxy-mff6n" Jul 2 00:54:28.399151 kubelet[2063]: I0702 00:54:28.399044 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e5a247bf-6fa2-49d6-9291-119217de5785-kube-proxy\") pod \"kube-proxy-mff6n\" (UID: \"e5a247bf-6fa2-49d6-9291-119217de5785\") " pod="kube-system/kube-proxy-mff6n" Jul 2 00:54:28.399151 kubelet[2063]: I0702 00:54:28.399066 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e5a247bf-6fa2-49d6-9291-119217de5785-lib-modules\") pod \"kube-proxy-mff6n\" (UID: \"e5a247bf-6fa2-49d6-9291-119217de5785\") " pod="kube-system/kube-proxy-mff6n" Jul 2 00:54:28.399151 kubelet[2063]: I0702 00:54:28.399087 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rsgmv\" (UniqueName: \"kubernetes.io/projected/e5a247bf-6fa2-49d6-9291-119217de5785-kube-api-access-rsgmv\") pod \"kube-proxy-mff6n\" (UID: \"e5a247bf-6fa2-49d6-9291-119217de5785\") " pod="kube-system/kube-proxy-mff6n" Jul 2 00:54:28.500277 kubelet[2063]: I0702 00:54:28.500238 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-przls\" (UniqueName: \"kubernetes.io/projected/7a7d14d5-0f85-4d27-976a-8f0206c670b9-kube-api-access-przls\") pod \"tigera-operator-76c4974c85-k7rb7\" (UID: \"7a7d14d5-0f85-4d27-976a-8f0206c670b9\") " pod="tigera-operator/tigera-operator-76c4974c85-k7rb7" Jul 2 00:54:28.500404 kubelet[2063]: I0702 00:54:28.500316 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7a7d14d5-0f85-4d27-976a-8f0206c670b9-var-lib-calico\") pod \"tigera-operator-76c4974c85-k7rb7\" (UID: \"7a7d14d5-0f85-4d27-976a-8f0206c670b9\") " pod="tigera-operator/tigera-operator-76c4974c85-k7rb7" Jul 2 00:54:28.569510 kubelet[2063]: E0702 00:54:28.569372 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:28.569967 env[1214]: time="2024-07-02T00:54:28.569927597Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mff6n,Uid:e5a247bf-6fa2-49d6-9291-119217de5785,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:28.583182 env[1214]: time="2024-07-02T00:54:28.583112420Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:28.583182 env[1214]: time="2024-07-02T00:54:28.583157301Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:28.583182 env[1214]: time="2024-07-02T00:54:28.583167541Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:28.583599 env[1214]: time="2024-07-02T00:54:28.583370185Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c pid=2172 runtime=io.containerd.runc.v2 Jul 2 00:54:28.599680 systemd[1]: run-containerd-runc-k8s.io-8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c-runc.nJ9ozp.mount: Deactivated successfully. Jul 2 00:54:28.602574 systemd[1]: Started cri-containerd-8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c.scope. Jul 2 00:54:28.615197 env[1214]: time="2024-07-02T00:54:28.615149339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-k7rb7,Uid:7a7d14d5-0f85-4d27-976a-8f0206c670b9,Namespace:tigera-operator,Attempt:0,}" Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.627963 kernel: kauditd_printk_skb: 7 callbacks suppressed Jul 2 00:54:28.628046 kernel: audit: type=1400 audit(1719881668.624:808): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628075 kernel: audit: type=1400 audit(1719881668.624:809): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.629438 env[1214]: time="2024-07-02T00:54:28.629364023Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:28.629438 env[1214]: time="2024-07-02T00:54:28.629406544Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:28.629438 env[1214]: time="2024-07-02T00:54:28.629416624Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:28.629697 kernel: audit: type=1400 audit(1719881668.624:810): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.629890 env[1214]: time="2024-07-02T00:54:28.629855353Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7041e57660130d19f0e8f338ae122a290eb3e5fca0211d756718d1e259356c10 pid=2205 runtime=io.containerd.runc.v2 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.633229 kernel: audit: type=1400 audit(1719881668.624:811): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.633299 kernel: audit: type=1400 audit(1719881668.624:812): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.637037 kernel: audit: type=1400 audit(1719881668.624:813): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.637182 kernel: audit: type=1400 audit(1719881668.624:814): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.640682 kernel: audit: type=1400 audit(1719881668.624:815): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.642570 kernel: audit: type=1400 audit(1719881668.624:816): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.643836 systemd[1]: Started cri-containerd-7041e57660130d19f0e8f338ae122a290eb3e5fca0211d756718d1e259356c10.scope. Jul 2 00:54:28.644480 kernel: audit: type=1400 audit(1719881668.624:817): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.624000 audit: BPF prog-id=106 op=LOAD Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393464666466326661346138356461336633623134356463396430 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393464666466326661346138356461336633623134356463396430 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.625000 audit: BPF prog-id=107 op=LOAD Jul 2 00:54:28.625000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.625000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393464666466326661346138356461336633623134356463396430 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.626000 audit: BPF prog-id=108 op=LOAD Jul 2 00:54:28.626000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.626000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393464666466326661346138356461336633623134356463396430 Jul 2 00:54:28.628000 audit: BPF prog-id=108 op=UNLOAD Jul 2 00:54:28.628000 audit: BPF prog-id=107 op=UNLOAD Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { perfmon } for pid=2182 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit[2182]: AVC avc: denied { bpf } for pid=2182 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.628000 audit: BPF prog-id=109 op=LOAD Jul 2 00:54:28.628000 audit[2182]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2172 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.628000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3834393464666466326661346138356461336633623134356463396430 Jul 2 00:54:28.652763 env[1214]: time="2024-07-02T00:54:28.652719009Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mff6n,Uid:e5a247bf-6fa2-49d6-9291-119217de5785,Namespace:kube-system,Attempt:0,} returns sandbox id \"8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c\"" Jul 2 00:54:28.653869 kubelet[2063]: E0702 00:54:28.653662 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:28.656984 env[1214]: time="2024-07-02T00:54:28.656948213Z" level=info msg="CreateContainer within sandbox \"8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Jul 2 00:54:28.676889 env[1214]: time="2024-07-02T00:54:28.676253878Z" level=info msg="CreateContainer within sandbox \"8494dfdf2fa4a85da3f3b145dc9d00ddd2ef32b35d31f4bafdf1e8a0549e294c\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"8021030a08832505245f32aabd73df2bf18e07005781d17fdac3be59c7d4ec8c\"" Jul 2 00:54:28.676889 env[1214]: time="2024-07-02T00:54:28.676806649Z" level=info msg="StartContainer for \"8021030a08832505245f32aabd73df2bf18e07005781d17fdac3be59c7d4ec8c\"" Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit: BPF prog-id=110 op=LOAD Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2205 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343165353736363031333064313966306538663333386165313232 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2205 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343165353736363031333064313966306538663333386165313232 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit: BPF prog-id=111 op=LOAD Jul 2 00:54:28.687000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2205 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343165353736363031333064313966306538663333386165313232 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit: BPF prog-id=112 op=LOAD Jul 2 00:54:28.687000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2205 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343165353736363031333064313966306538663333386165313232 Jul 2 00:54:28.687000 audit: BPF prog-id=112 op=UNLOAD Jul 2 00:54:28.687000 audit: BPF prog-id=111 op=UNLOAD Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { perfmon } for pid=2215 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit[2215]: AVC avc: denied { bpf } for pid=2215 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.687000 audit: BPF prog-id=113 op=LOAD Jul 2 00:54:28.687000 audit[2215]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2205 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.687000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730343165353736363031333064313966306538663333386165313232 Jul 2 00:54:28.693366 systemd[1]: Started cri-containerd-8021030a08832505245f32aabd73df2bf18e07005781d17fdac3be59c7d4ec8c.scope. Jul 2 00:54:28.713754 env[1214]: time="2024-07-02T00:54:28.713711226Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4974c85-k7rb7,Uid:7a7d14d5-0f85-4d27-976a-8f0206c670b9,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7041e57660130d19f0e8f338ae122a290eb3e5fca0211d756718d1e259356c10\"" Jul 2 00:54:28.715593 env[1214]: time="2024-07-02T00:54:28.715348578Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\"" Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323130333061303838333235303532343566333261616264373364 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.724000 audit: BPF prog-id=114 op=LOAD Jul 2 00:54:28.724000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323130333061303838333235303532343566333261616264373364 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.725000 audit: BPF prog-id=115 op=LOAD Jul 2 00:54:28.725000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323130333061303838333235303532343566333261616264373364 Jul 2 00:54:28.725000 audit: BPF prog-id=115 op=UNLOAD Jul 2 00:54:28.725000 audit: BPF prog-id=114 op=UNLOAD Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { perfmon } for pid=2245 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit[2245]: AVC avc: denied { bpf } for pid=2245 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:28.726000 audit: BPF prog-id=116 op=LOAD Jul 2 00:54:28.726000 audit[2245]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2172 pid=2245 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3830323130333061303838333235303532343566333261616264373364 Jul 2 00:54:28.742822 env[1214]: time="2024-07-02T00:54:28.742780446Z" level=info msg="StartContainer for \"8021030a08832505245f32aabd73df2bf18e07005781d17fdac3be59c7d4ec8c\" returns successfully" Jul 2 00:54:28.853000 audit[2305]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2305 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:28.853000 audit[2305]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff87e75c0 a2=0 a3=1 items=0 ppid=2257 pid=2305 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.853000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:54:28.854000 audit[2306]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.854000 audit[2306]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff18d10b0 a2=0 a3=1 items=0 ppid=2257 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.854000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Jul 2 00:54:28.855000 audit[2307]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.855000 audit[2307]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcfd37750 a2=0 a3=1 items=0 ppid=2257 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.855000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:54:28.856000 audit[2308]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.856000 audit[2308]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffec2db930 a2=0 a3=1 items=0 ppid=2257 pid=2308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.856000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:54:28.858000 audit[2309]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:28.858000 audit[2309]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea62aaf0 a2=0 a3=1 items=0 ppid=2257 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.858000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Jul 2 00:54:28.860000 audit[2310]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:28.860000 audit[2310]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff5183330 a2=0 a3=1 items=0 ppid=2257 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.860000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Jul 2 00:54:28.955000 audit[2311]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2311 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.955000 audit[2311]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffd138f370 a2=0 a3=1 items=0 ppid=2257 pid=2311 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.955000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:54:28.962000 audit[2313]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2313 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.962000 audit[2313]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc7902d30 a2=0 a3=1 items=0 ppid=2257 pid=2313 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.962000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Jul 2 00:54:28.966000 audit[2316]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2316 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.966000 audit[2316]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffe9f5b650 a2=0 a3=1 items=0 ppid=2257 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.966000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Jul 2 00:54:28.967000 audit[2317]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.967000 audit[2317]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffebca9fc0 a2=0 a3=1 items=0 ppid=2257 pid=2317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:54:28.969000 audit[2319]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.969000 audit[2319]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdb4b60a0 a2=0 a3=1 items=0 ppid=2257 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:54:28.970000 audit[2320]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2320 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.970000 audit[2320]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7661b20 a2=0 a3=1 items=0 ppid=2257 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.970000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:54:28.972000 audit[2322]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2322 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.972000 audit[2322]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc351ab90 a2=0 a3=1 items=0 ppid=2257 pid=2322 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.972000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:54:28.976000 audit[2325]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.976000 audit[2325]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe18cb240 a2=0 a3=1 items=0 ppid=2257 pid=2325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.976000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Jul 2 00:54:28.977000 audit[2326]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.977000 audit[2326]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffedc619e0 a2=0 a3=1 items=0 ppid=2257 pid=2326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.977000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:54:28.979000 audit[2328]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2328 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.979000 audit[2328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffcb54b880 a2=0 a3=1 items=0 ppid=2257 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.979000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:54:28.981000 audit[2329]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2329 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.981000 audit[2329]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcdca47d0 a2=0 a3=1 items=0 ppid=2257 pid=2329 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.981000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:54:28.983000 audit[2331]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2331 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.983000 audit[2331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd4052760 a2=0 a3=1 items=0 ppid=2257 pid=2331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.983000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:54:28.988000 audit[2334]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.988000 audit[2334]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffec7a85f0 a2=0 a3=1 items=0 ppid=2257 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.988000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:54:28.991000 audit[2337]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.991000 audit[2337]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe51b1b80 a2=0 a3=1 items=0 ppid=2257 pid=2337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.991000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:54:28.992000 audit[2338]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2338 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.992000 audit[2338]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdc13e0c0 a2=0 a3=1 items=0 ppid=2257 pid=2338 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.992000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:54:28.994000 audit[2340]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.994000 audit[2340]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffe12e4050 a2=0 a3=1 items=0 ppid=2257 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:54:28.998000 audit[2343]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2343 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.998000 audit[2343]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff1c46490 a2=0 a3=1 items=0 ppid=2257 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.998000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:54:28.999000 audit[2344]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:28.999000 audit[2344]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd71dc8f0 a2=0 a3=1 items=0 ppid=2257 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:28.999000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:54:29.003000 audit[2346]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Jul 2 00:54:29.003000 audit[2346]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=fffffab26f70 a2=0 a3=1 items=0 ppid=2257 pid=2346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.003000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:54:29.022000 audit[2352]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:29.022000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5164 a0=3 a1=fffff6b850d0 a2=0 a3=1 items=0 ppid=2257 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.022000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:29.027000 audit[2352]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2352 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:29.027000 audit[2352]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5508 a0=3 a1=fffff6b850d0 a2=0 a3=1 items=0 ppid=2257 pid=2352 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.027000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:29.029000 audit[2356]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2356 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.029000 audit[2356]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc1858cc0 a2=0 a3=1 items=0 ppid=2257 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.029000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Jul 2 00:54:29.032000 audit[2358]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2358 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.032000 audit[2358]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffee3bfa30 a2=0 a3=1 items=0 ppid=2257 pid=2358 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.032000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Jul 2 00:54:29.035000 audit[2361]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2361 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.035000 audit[2361]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe6e811a0 a2=0 a3=1 items=0 ppid=2257 pid=2361 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.035000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Jul 2 00:54:29.036000 audit[2362]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2362 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.036000 audit[2362]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4d7dbc0 a2=0 a3=1 items=0 ppid=2257 pid=2362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Jul 2 00:54:29.039000 audit[2364]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2364 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.039000 audit[2364]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffdd21b9d0 a2=0 a3=1 items=0 ppid=2257 pid=2364 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.039000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Jul 2 00:54:29.040000 audit[2365]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2365 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.040000 audit[2365]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdb6f6d10 a2=0 a3=1 items=0 ppid=2257 pid=2365 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.040000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Jul 2 00:54:29.043105 kubelet[2063]: E0702 00:54:29.043082 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:29.043000 audit[2367]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2367 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.043000 audit[2367]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffc585e230 a2=0 a3=1 items=0 ppid=2257 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.043000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Jul 2 00:54:29.047000 audit[2370]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2370 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.047000 audit[2370]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffae116b0 a2=0 a3=1 items=0 ppid=2257 pid=2370 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.047000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Jul 2 00:54:29.048000 audit[2371]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2371 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.048000 audit[2371]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd54f1190 a2=0 a3=1 items=0 ppid=2257 pid=2371 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.048000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Jul 2 00:54:29.051000 audit[2373]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2373 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.051000 audit[2373]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe98b7970 a2=0 a3=1 items=0 ppid=2257 pid=2373 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.051000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Jul 2 00:54:29.053000 audit[2374]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2374 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.053000 audit[2374]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdda216e0 a2=0 a3=1 items=0 ppid=2257 pid=2374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.053000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Jul 2 00:54:29.058000 audit[2376]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2376 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.058000 audit[2376]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe28d5840 a2=0 a3=1 items=0 ppid=2257 pid=2376 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.058000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Jul 2 00:54:29.061000 audit[2379]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2379 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.061000 audit[2379]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffcfb62380 a2=0 a3=1 items=0 ppid=2257 pid=2379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.061000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Jul 2 00:54:29.065000 audit[2382]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2382 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.065000 audit[2382]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd75d0150 a2=0 a3=1 items=0 ppid=2257 pid=2382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.065000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Jul 2 00:54:29.066000 audit[2383]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2383 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.066000 audit[2383]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff7dd8ec0 a2=0 a3=1 items=0 ppid=2257 pid=2383 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.066000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Jul 2 00:54:29.068000 audit[2385]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2385 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.068000 audit[2385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffcd5c5250 a2=0 a3=1 items=0 ppid=2257 pid=2385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.068000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:54:29.071000 audit[2388]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2388 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.071000 audit[2388]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffde2ffb70 a2=0 a3=1 items=0 ppid=2257 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Jul 2 00:54:29.072000 audit[2389]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2389 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.072000 audit[2389]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff14c5b60 a2=0 a3=1 items=0 ppid=2257 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.072000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Jul 2 00:54:29.074000 audit[2391]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2391 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.074000 audit[2391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=fffff8ceecd0 a2=0 a3=1 items=0 ppid=2257 pid=2391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Jul 2 00:54:29.075000 audit[2392]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_chain pid=2392 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.075000 audit[2392]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffecc77200 a2=0 a3=1 items=0 ppid=2257 pid=2392 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.075000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Jul 2 00:54:29.078000 audit[2394]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_rule pid=2394 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.078000 audit[2394]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd34ddfb0 a2=0 a3=1 items=0 ppid=2257 pid=2394 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.078000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:54:29.088000 audit[2397]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2397 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Jul 2 00:54:29.088000 audit[2397]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd2631280 a2=0 a3=1 items=0 ppid=2257 pid=2397 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.088000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Jul 2 00:54:29.091000 audit[2399]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:54:29.091000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2004 a0=3 a1=ffffeda819a0 a2=0 a3=1 items=0 ppid=2257 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.091000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:29.092000 audit[2399]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2399 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Jul 2 00:54:29.092000 audit[2399]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2056 a0=3 a1=ffffeda819a0 a2=0 a3=1 items=0 ppid=2257 pid=2399 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:29.092000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:29.808466 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount928850860.mount: Deactivated successfully. Jul 2 00:54:30.302779 env[1214]: time="2024-07-02T00:54:30.302732273Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:30.305744 env[1214]: time="2024-07-02T00:54:30.305694687Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:30.308667 env[1214]: time="2024-07-02T00:54:30.308626980Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.34.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:30.311728 env[1214]: time="2024-07-02T00:54:30.311688115Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:479ddc7ff9ab095058b96f6710bbf070abada86332e267d6e5dcc1df36ba2cc5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:30.312405 env[1214]: time="2024-07-02T00:54:30.312365048Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.34.0\" returns image reference \"sha256:5886f48e233edcb89c0e8e3cdbdc40101f3c2dfbe67d7717f01d19c27cd78f92\"" Jul 2 00:54:30.315134 env[1214]: time="2024-07-02T00:54:30.315095857Z" level=info msg="CreateContainer within sandbox \"7041e57660130d19f0e8f338ae122a290eb3e5fca0211d756718d1e259356c10\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Jul 2 00:54:30.325896 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3265479334.mount: Deactivated successfully. Jul 2 00:54:30.332951 env[1214]: time="2024-07-02T00:54:30.332889219Z" level=info msg="CreateContainer within sandbox \"7041e57660130d19f0e8f338ae122a290eb3e5fca0211d756718d1e259356c10\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"1093ddb3a09890db7dd88ee8a7689adee14d2dadcbb93d209f78e1af99c52cff\"" Jul 2 00:54:30.333465 env[1214]: time="2024-07-02T00:54:30.333433988Z" level=info msg="StartContainer for \"1093ddb3a09890db7dd88ee8a7689adee14d2dadcbb93d209f78e1af99c52cff\"" Jul 2 00:54:30.347964 systemd[1]: Started cri-containerd-1093ddb3a09890db7dd88ee8a7689adee14d2dadcbb93d209f78e1af99c52cff.scope. Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit: BPF prog-id=117 op=LOAD Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2205 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:30.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393364646233613039383930646237646438386565386137363839 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2205 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:30.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393364646233613039383930646237646438386565386137363839 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit: BPF prog-id=118 op=LOAD Jul 2 00:54:30.368000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2205 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:30.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393364646233613039383930646237646438386565386137363839 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit: BPF prog-id=119 op=LOAD Jul 2 00:54:30.368000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2205 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:30.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393364646233613039383930646237646438386565386137363839 Jul 2 00:54:30.368000 audit: BPF prog-id=119 op=UNLOAD Jul 2 00:54:30.368000 audit: BPF prog-id=118 op=UNLOAD Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { perfmon } for pid=2408 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit[2408]: AVC avc: denied { bpf } for pid=2408 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:30.368000 audit: BPF prog-id=120 op=LOAD Jul 2 00:54:30.368000 audit[2408]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2205 pid=2408 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:30.368000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130393364646233613039383930646237646438386565386137363839 Jul 2 00:54:30.384073 env[1214]: time="2024-07-02T00:54:30.384028823Z" level=info msg="StartContainer for \"1093ddb3a09890db7dd88ee8a7689adee14d2dadcbb93d209f78e1af99c52cff\" returns successfully" Jul 2 00:54:30.513164 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3031733013.mount: Deactivated successfully. Jul 2 00:54:31.054012 kubelet[2063]: I0702 00:54:31.053964 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mff6n" podStartSLOduration=3.053925806 podStartE2EDuration="3.053925806s" podCreationTimestamp="2024-07-02 00:54:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:29.054236248 +0000 UTC m=+16.147769035" watchObservedRunningTime="2024-07-02 00:54:31.053925806 +0000 UTC m=+18.147458553" Jul 2 00:54:33.012804 kubelet[2063]: I0702 00:54:33.012768 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4974c85-k7rb7" podStartSLOduration=3.414953769 podStartE2EDuration="5.012724252s" podCreationTimestamp="2024-07-02 00:54:28 +0000 UTC" firstStartedPulling="2024-07-02 00:54:28.71490805 +0000 UTC m=+15.808440797" lastFinishedPulling="2024-07-02 00:54:30.312678533 +0000 UTC m=+17.406211280" observedRunningTime="2024-07-02 00:54:31.054096849 +0000 UTC m=+18.147629596" watchObservedRunningTime="2024-07-02 00:54:33.012724252 +0000 UTC m=+20.106256999" Jul 2 00:54:33.858423 kernel: kauditd_printk_skb: 357 callbacks suppressed Jul 2 00:54:33.858563 kernel: audit: type=1325 audit(1719881673.854:919): table=filter:89 family=2 entries=15 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.858592 kernel: audit: type=1300 audit(1719881673.854:919): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd1915130 a2=0 a3=1 items=0 ppid=2257 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.854000 audit[2441]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.854000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd1915130 a2=0 a3=1 items=0 ppid=2257 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.860128 kernel: audit: type=1327 audit(1719881673.854:919): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.855000 audit[2441]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.855000 audit[2441]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd1915130 a2=0 a3=1 items=0 ppid=2257 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.866776 kernel: audit: type=1325 audit(1719881673.855:920): table=nat:90 family=2 entries=12 op=nft_register_rule pid=2441 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.866842 kernel: audit: type=1300 audit(1719881673.855:920): arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd1915130 a2=0 a3=1 items=0 ppid=2257 pid=2441 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.866866 kernel: audit: type=1327 audit(1719881673.855:920): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.855000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.865000 audit[2443]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.865000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc727c900 a2=0 a3=1 items=0 ppid=2257 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.873839 kernel: audit: type=1325 audit(1719881673.865:921): table=filter:91 family=2 entries=16 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.873884 kernel: audit: type=1300 audit(1719881673.865:921): arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffc727c900 a2=0 a3=1 items=0 ppid=2257 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.873904 kernel: audit: type=1327 audit(1719881673.865:921): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.865000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.869000 audit[2443]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.869000 audit[2443]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffc727c900 a2=0 a3=1 items=0 ppid=2257 pid=2443 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:33.869000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:33.878546 kernel: audit: type=1325 audit(1719881673.869:922): table=nat:92 family=2 entries=12 op=nft_register_rule pid=2443 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:33.976681 kubelet[2063]: I0702 00:54:33.976635 2063 topology_manager.go:215] "Topology Admit Handler" podUID="ccafcda6-4e80-410b-a9e4-eff192306209" podNamespace="calico-system" podName="calico-typha-fccd5f89b-2swn5" Jul 2 00:54:33.983252 systemd[1]: Created slice kubepods-besteffort-podccafcda6_4e80_410b_a9e4_eff192306209.slice. Jul 2 00:54:34.037605 kubelet[2063]: I0702 00:54:34.034672 2063 topology_manager.go:215] "Topology Admit Handler" podUID="05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb" podNamespace="calico-system" podName="calico-node-68x9p" Jul 2 00:54:34.048452 systemd[1]: Created slice kubepods-besteffort-pod05133f3f_bb95_4bf9_a4b7_f4c9ab80ebdb.slice. Jul 2 00:54:34.143964 kubelet[2063]: I0702 00:54:34.143787 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hh7tx\" (UniqueName: \"kubernetes.io/projected/ccafcda6-4e80-410b-a9e4-eff192306209-kube-api-access-hh7tx\") pod \"calico-typha-fccd5f89b-2swn5\" (UID: \"ccafcda6-4e80-410b-a9e4-eff192306209\") " pod="calico-system/calico-typha-fccd5f89b-2swn5" Jul 2 00:54:34.143964 kubelet[2063]: I0702 00:54:34.143830 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-xtables-lock\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.143964 kubelet[2063]: I0702 00:54:34.143855 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/ccafcda6-4e80-410b-a9e4-eff192306209-typha-certs\") pod \"calico-typha-fccd5f89b-2swn5\" (UID: \"ccafcda6-4e80-410b-a9e4-eff192306209\") " pod="calico-system/calico-typha-fccd5f89b-2swn5" Jul 2 00:54:34.143964 kubelet[2063]: I0702 00:54:34.143875 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-lib-modules\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.143964 kubelet[2063]: I0702 00:54:34.143916 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-node-certs\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144259 kubelet[2063]: I0702 00:54:34.143952 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-cni-bin-dir\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144259 kubelet[2063]: I0702 00:54:34.143972 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-var-run-calico\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144259 kubelet[2063]: I0702 00:54:34.144010 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-tigera-ca-bundle\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144259 kubelet[2063]: I0702 00:54:34.144032 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wngcv\" (UniqueName: \"kubernetes.io/projected/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-kube-api-access-wngcv\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144259 kubelet[2063]: I0702 00:54:34.144054 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-policysync\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144390 kubelet[2063]: I0702 00:54:34.144089 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-var-lib-calico\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144390 kubelet[2063]: I0702 00:54:34.144111 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/ccafcda6-4e80-410b-a9e4-eff192306209-tigera-ca-bundle\") pod \"calico-typha-fccd5f89b-2swn5\" (UID: \"ccafcda6-4e80-410b-a9e4-eff192306209\") " pod="calico-system/calico-typha-fccd5f89b-2swn5" Jul 2 00:54:34.144390 kubelet[2063]: I0702 00:54:34.144130 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-cni-net-dir\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144390 kubelet[2063]: I0702 00:54:34.144152 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-flexvol-driver-host\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.144390 kubelet[2063]: I0702 00:54:34.144217 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb-cni-log-dir\") pod \"calico-node-68x9p\" (UID: \"05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb\") " pod="calico-system/calico-node-68x9p" Jul 2 00:54:34.149270 kubelet[2063]: I0702 00:54:34.148836 2063 topology_manager.go:215] "Topology Admit Handler" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" podNamespace="calico-system" podName="csi-node-driver-rk75r" Jul 2 00:54:34.149270 kubelet[2063]: E0702 00:54:34.149097 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:34.247677 kubelet[2063]: E0702 00:54:34.247644 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.247677 kubelet[2063]: W0702 00:54:34.247668 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.247856 kubelet[2063]: E0702 00:54:34.247694 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.247942 kubelet[2063]: E0702 00:54:34.247912 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.247981 kubelet[2063]: W0702 00:54:34.247942 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.247981 kubelet[2063]: E0702 00:54:34.247963 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.248154 kubelet[2063]: E0702 00:54:34.248141 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.248198 kubelet[2063]: W0702 00:54:34.248153 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.248198 kubelet[2063]: E0702 00:54:34.248179 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.249621 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.250827 kubelet[2063]: W0702 00:54:34.249642 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.249871 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.250827 kubelet[2063]: W0702 00:54:34.249881 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.250029 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.250827 kubelet[2063]: W0702 00:54:34.250037 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.250050 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.250221 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.250827 kubelet[2063]: W0702 00:54:34.250239 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.250250 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.250827 kubelet[2063]: E0702 00:54:34.250384 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251163 kubelet[2063]: W0702 00:54:34.250400 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.250410 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.250583 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251163 kubelet[2063]: W0702 00:54:34.250590 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.250600 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.250831 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.251073 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251163 kubelet[2063]: W0702 00:54:34.251092 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251163 kubelet[2063]: E0702 00:54:34.251104 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251224 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251678 kubelet[2063]: W0702 00:54:34.251230 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251247 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251362 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251678 kubelet[2063]: W0702 00:54:34.251368 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251377 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251578 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.251678 kubelet[2063]: W0702 00:54:34.251586 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251596 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.251678 kubelet[2063]: E0702 00:54:34.251618 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.251754 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.252160 kubelet[2063]: W0702 00:54:34.251762 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.251772 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.251891 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.252160 kubelet[2063]: W0702 00:54:34.251897 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.251906 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.252048 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.252160 kubelet[2063]: W0702 00:54:34.252054 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.252160 kubelet[2063]: E0702 00:54:34.252066 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.253594 kubelet[2063]: E0702 00:54:34.252996 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.253594 kubelet[2063]: W0702 00:54:34.253063 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.253594 kubelet[2063]: E0702 00:54:34.253079 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.258822 kubelet[2063]: E0702 00:54:34.256654 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.258822 kubelet[2063]: W0702 00:54:34.256677 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.258822 kubelet[2063]: E0702 00:54:34.256696 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.268155 kubelet[2063]: E0702 00:54:34.268121 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.268155 kubelet[2063]: W0702 00:54:34.268143 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.268286 kubelet[2063]: E0702 00:54:34.268167 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.269397 kubelet[2063]: E0702 00:54:34.269370 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.269397 kubelet[2063]: W0702 00:54:34.269386 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.269397 kubelet[2063]: E0702 00:54:34.269401 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.285527 kubelet[2063]: E0702 00:54:34.285496 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:34.286024 env[1214]: time="2024-07-02T00:54:34.285985779Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fccd5f89b-2swn5,Uid:ccafcda6-4e80-410b-a9e4-eff192306209,Namespace:calico-system,Attempt:0,}" Jul 2 00:54:34.343131 env[1214]: time="2024-07-02T00:54:34.343062314Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:34.343279 env[1214]: time="2024-07-02T00:54:34.343137875Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:34.343279 env[1214]: time="2024-07-02T00:54:34.343164636Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:34.343458 env[1214]: time="2024-07-02T00:54:34.343411799Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5ec0aec81a045e74647af9b7918f49a861aa84e139a3f8b89750a2c8ff8221f0 pid=2475 runtime=io.containerd.runc.v2 Jul 2 00:54:34.350692 kubelet[2063]: E0702 00:54:34.350661 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:34.351372 env[1214]: time="2024-07-02T00:54:34.351332998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-68x9p,Uid:05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb,Namespace:calico-system,Attempt:0,}" Jul 2 00:54:34.352140 kubelet[2063]: E0702 00:54:34.352119 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.352140 kubelet[2063]: W0702 00:54:34.352137 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.352286 kubelet[2063]: E0702 00:54:34.352157 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.352286 kubelet[2063]: I0702 00:54:34.352187 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/53f96a20-2bb3-4586-9b6d-4a3d96d028e2-registration-dir\") pod \"csi-node-driver-rk75r\" (UID: \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\") " pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:34.352494 kubelet[2063]: E0702 00:54:34.352466 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.352494 kubelet[2063]: W0702 00:54:34.352491 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.352591 kubelet[2063]: E0702 00:54:34.352505 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.352591 kubelet[2063]: I0702 00:54:34.352524 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/53f96a20-2bb3-4586-9b6d-4a3d96d028e2-varrun\") pod \"csi-node-driver-rk75r\" (UID: \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\") " pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:34.352776 kubelet[2063]: E0702 00:54:34.352759 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.352776 kubelet[2063]: W0702 00:54:34.352775 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.352860 kubelet[2063]: E0702 00:54:34.352787 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.352860 kubelet[2063]: I0702 00:54:34.352805 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/53f96a20-2bb3-4586-9b6d-4a3d96d028e2-socket-dir\") pod \"csi-node-driver-rk75r\" (UID: \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\") " pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:34.352999 kubelet[2063]: E0702 00:54:34.352974 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.352999 kubelet[2063]: W0702 00:54:34.352993 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.353065 kubelet[2063]: E0702 00:54:34.353006 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.353065 kubelet[2063]: I0702 00:54:34.353023 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k25rw\" (UniqueName: \"kubernetes.io/projected/53f96a20-2bb3-4586-9b6d-4a3d96d028e2-kube-api-access-k25rw\") pod \"csi-node-driver-rk75r\" (UID: \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\") " pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:34.353276 kubelet[2063]: E0702 00:54:34.353261 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.353276 kubelet[2063]: W0702 00:54:34.353274 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.353351 kubelet[2063]: E0702 00:54:34.353287 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.353351 kubelet[2063]: I0702 00:54:34.353305 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/53f96a20-2bb3-4586-9b6d-4a3d96d028e2-kubelet-dir\") pod \"csi-node-driver-rk75r\" (UID: \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\") " pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:34.353543 kubelet[2063]: E0702 00:54:34.353501 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.353543 kubelet[2063]: W0702 00:54:34.353516 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.353543 kubelet[2063]: E0702 00:54:34.353540 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.353714 kubelet[2063]: E0702 00:54:34.353701 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.353714 kubelet[2063]: W0702 00:54:34.353711 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.353714 kubelet[2063]: E0702 00:54:34.353723 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.354192 kubelet[2063]: E0702 00:54:34.354172 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.354192 kubelet[2063]: W0702 00:54:34.354185 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.354276 kubelet[2063]: E0702 00:54:34.354202 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.354386 kubelet[2063]: E0702 00:54:34.354362 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.354386 kubelet[2063]: W0702 00:54:34.354380 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.354463 kubelet[2063]: E0702 00:54:34.354411 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.354836 kubelet[2063]: E0702 00:54:34.354818 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.354836 kubelet[2063]: W0702 00:54:34.354832 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.354927 kubelet[2063]: E0702 00:54:34.354862 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.355043 kubelet[2063]: E0702 00:54:34.355025 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.355043 kubelet[2063]: W0702 00:54:34.355035 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.355115 kubelet[2063]: E0702 00:54:34.355068 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.355189 kubelet[2063]: E0702 00:54:34.355172 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.355189 kubelet[2063]: W0702 00:54:34.355182 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.355249 kubelet[2063]: E0702 00:54:34.355208 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.355344 kubelet[2063]: E0702 00:54:34.355330 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.355344 kubelet[2063]: W0702 00:54:34.355339 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.355431 kubelet[2063]: E0702 00:54:34.355350 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.355566 kubelet[2063]: E0702 00:54:34.355517 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.355566 kubelet[2063]: W0702 00:54:34.355526 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.355566 kubelet[2063]: E0702 00:54:34.355555 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.356201 kubelet[2063]: E0702 00:54:34.355717 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.356201 kubelet[2063]: W0702 00:54:34.355727 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.356201 kubelet[2063]: E0702 00:54:34.355737 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.357697 systemd[1]: Started cri-containerd-5ec0aec81a045e74647af9b7918f49a861aa84e139a3f8b89750a2c8ff8221f0.scope. Jul 2 00:54:34.379003 env[1214]: time="2024-07-02T00:54:34.378851090Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:34.379003 env[1214]: time="2024-07-02T00:54:34.378954292Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:34.379003 env[1214]: time="2024-07-02T00:54:34.378982132Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:34.379173 env[1214]: time="2024-07-02T00:54:34.379147695Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b pid=2521 runtime=io.containerd.runc.v2 Jul 2 00:54:34.396169 systemd[1]: Started cri-containerd-db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b.scope. Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.399000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.400000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.400000 audit: BPF prog-id=121 op=LOAD Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633061656338316130343565373436343761663962373931386634 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633061656338316130343565373436343761663962373931386634 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit: BPF prog-id=122 op=LOAD Jul 2 00:54:34.401000 audit[2485]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633061656338316130343565373436343761663962373931386634 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit: BPF prog-id=123 op=LOAD Jul 2 00:54:34.401000 audit[2485]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633061656338316130343565373436343761663962373931386634 Jul 2 00:54:34.401000 audit: BPF prog-id=123 op=UNLOAD Jul 2 00:54:34.401000 audit: BPF prog-id=122 op=UNLOAD Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { perfmon } for pid=2485 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit[2485]: AVC avc: denied { bpf } for pid=2485 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.401000 audit: BPF prog-id=124 op=LOAD Jul 2 00:54:34.401000 audit[2485]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2475 pid=2485 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.401000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565633061656338316130343565373436343761663962373931386634 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.423000 audit: BPF prog-id=125 op=LOAD Jul 2 00:54:34.424000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.424000 audit[2534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336631383530333231633530656362356439616664383461323538 Jul 2 00:54:34.424000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.424000 audit[2534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.424000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336631383530333231633530656362356439616664383461323538 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit: BPF prog-id=126 op=LOAD Jul 2 00:54:34.425000 audit[2534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336631383530333231633530656362356439616664383461323538 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.425000 audit: BPF prog-id=127 op=LOAD Jul 2 00:54:34.425000 audit[2534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.425000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336631383530333231633530656362356439616664383461323538 Jul 2 00:54:34.426000 audit: BPF prog-id=127 op=UNLOAD Jul 2 00:54:34.426000 audit: BPF prog-id=126 op=UNLOAD Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { perfmon } for pid=2534 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit[2534]: AVC avc: denied { bpf } for pid=2534 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:34.426000 audit: BPF prog-id=128 op=LOAD Jul 2 00:54:34.426000 audit[2534]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2521 pid=2534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.426000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6462336631383530333231633530656362356439616664383461323538 Jul 2 00:54:34.434374 env[1214]: time="2024-07-02T00:54:34.434331641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-fccd5f89b-2swn5,Uid:ccafcda6-4e80-410b-a9e4-eff192306209,Namespace:calico-system,Attempt:0,} returns sandbox id \"5ec0aec81a045e74647af9b7918f49a861aa84e139a3f8b89750a2c8ff8221f0\"" Jul 2 00:54:34.435067 kubelet[2063]: E0702 00:54:34.435036 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:34.436077 env[1214]: time="2024-07-02T00:54:34.436048027Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\"" Jul 2 00:54:34.440058 env[1214]: time="2024-07-02T00:54:34.440023007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-68x9p,Uid:05133f3f-bb95-4bf9-a4b7-f4c9ab80ebdb,Namespace:calico-system,Attempt:0,} returns sandbox id \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\"" Jul 2 00:54:34.443937 kubelet[2063]: E0702 00:54:34.443912 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:34.454766 kubelet[2063]: E0702 00:54:34.454733 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.454766 kubelet[2063]: W0702 00:54:34.454755 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.454935 kubelet[2063]: E0702 00:54:34.454773 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.454967 kubelet[2063]: E0702 00:54:34.454952 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.454967 kubelet[2063]: W0702 00:54:34.454960 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.455017 kubelet[2063]: E0702 00:54:34.454979 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.455208 kubelet[2063]: E0702 00:54:34.455180 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.455208 kubelet[2063]: W0702 00:54:34.455193 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.455208 kubelet[2063]: E0702 00:54:34.455208 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.455411 kubelet[2063]: E0702 00:54:34.455390 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.455411 kubelet[2063]: W0702 00:54:34.455401 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.455479 kubelet[2063]: E0702 00:54:34.455416 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.455624 kubelet[2063]: E0702 00:54:34.455603 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.455624 kubelet[2063]: W0702 00:54:34.455616 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.455685 kubelet[2063]: E0702 00:54:34.455631 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.455847 kubelet[2063]: E0702 00:54:34.455833 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.455847 kubelet[2063]: W0702 00:54:34.455846 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.455917 kubelet[2063]: E0702 00:54:34.455862 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456013 kubelet[2063]: E0702 00:54:34.456000 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456013 kubelet[2063]: W0702 00:54:34.456011 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456066 kubelet[2063]: E0702 00:54:34.456039 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456186 kubelet[2063]: E0702 00:54:34.456174 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456186 kubelet[2063]: W0702 00:54:34.456184 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456254 kubelet[2063]: E0702 00:54:34.456204 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456320 kubelet[2063]: E0702 00:54:34.456309 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456320 kubelet[2063]: W0702 00:54:34.456319 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456372 kubelet[2063]: E0702 00:54:34.456339 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456451 kubelet[2063]: E0702 00:54:34.456441 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456451 kubelet[2063]: W0702 00:54:34.456451 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456517 kubelet[2063]: E0702 00:54:34.456479 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456621 kubelet[2063]: E0702 00:54:34.456610 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456647 kubelet[2063]: W0702 00:54:34.456622 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456647 kubelet[2063]: E0702 00:54:34.456645 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456816 kubelet[2063]: E0702 00:54:34.456802 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456816 kubelet[2063]: W0702 00:54:34.456814 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.456878 kubelet[2063]: E0702 00:54:34.456829 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.456974 kubelet[2063]: E0702 00:54:34.456963 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.456974 kubelet[2063]: W0702 00:54:34.456973 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.457024 kubelet[2063]: E0702 00:54:34.456987 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.457165 kubelet[2063]: E0702 00:54:34.457151 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.457205 kubelet[2063]: W0702 00:54:34.457165 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.457205 kubelet[2063]: E0702 00:54:34.457187 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.457394 kubelet[2063]: E0702 00:54:34.457368 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.457394 kubelet[2063]: W0702 00:54:34.457380 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.457453 kubelet[2063]: E0702 00:54:34.457403 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.458678 kubelet[2063]: E0702 00:54:34.458656 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.458678 kubelet[2063]: W0702 00:54:34.458671 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.458787 kubelet[2063]: E0702 00:54:34.458751 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.459271 kubelet[2063]: E0702 00:54:34.459222 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.459271 kubelet[2063]: W0702 00:54:34.459235 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.459271 kubelet[2063]: E0702 00:54:34.459263 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.459667 kubelet[2063]: E0702 00:54:34.459644 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.459719 kubelet[2063]: W0702 00:54:34.459677 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.459789 kubelet[2063]: E0702 00:54:34.459773 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.460604 kubelet[2063]: E0702 00:54:34.460067 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.460604 kubelet[2063]: W0702 00:54:34.460081 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.460604 kubelet[2063]: E0702 00:54:34.460145 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.462724 kubelet[2063]: E0702 00:54:34.462696 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.462724 kubelet[2063]: W0702 00:54:34.462713 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.462932 kubelet[2063]: E0702 00:54:34.462849 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.462972 kubelet[2063]: E0702 00:54:34.462944 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.462972 kubelet[2063]: W0702 00:54:34.462954 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.463030 kubelet[2063]: E0702 00:54:34.462981 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.463385 kubelet[2063]: E0702 00:54:34.463104 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.463385 kubelet[2063]: W0702 00:54:34.463114 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.463385 kubelet[2063]: E0702 00:54:34.463164 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.463385 kubelet[2063]: E0702 00:54:34.463307 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.463385 kubelet[2063]: W0702 00:54:34.463322 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.463385 kubelet[2063]: E0702 00:54:34.463377 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.463897 kubelet[2063]: E0702 00:54:34.463690 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.463897 kubelet[2063]: W0702 00:54:34.463708 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.463897 kubelet[2063]: E0702 00:54:34.463726 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.463897 kubelet[2063]: E0702 00:54:34.463898 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.464056 kubelet[2063]: W0702 00:54:34.463906 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.464056 kubelet[2063]: E0702 00:54:34.463918 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.468568 kubelet[2063]: E0702 00:54:34.468263 2063 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Jul 2 00:54:34.468568 kubelet[2063]: W0702 00:54:34.468280 2063 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Jul 2 00:54:34.468568 kubelet[2063]: E0702 00:54:34.468294 2063 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Jul 2 00:54:34.880000 audit[2590]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:34.880000 audit[2590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffd0789920 a2=0 a3=1 items=0 ppid=2257 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.880000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:34.881000 audit[2590]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2590 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:34.881000 audit[2590]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffd0789920 a2=0 a3=1 items=0 ppid=2257 pid=2590 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:34.881000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:35.979807 env[1214]: time="2024-07-02T00:54:35.979760471Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:35.981793 env[1214]: time="2024-07-02T00:54:35.981754580Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:35.983209 env[1214]: time="2024-07-02T00:54:35.983174720Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:35.985079 env[1214]: time="2024-07-02T00:54:35.985053747Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:eff1501af12b7e27e2ef8f4e55d03d837bcb017aa5663e22e519059c452d51ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:35.985578 env[1214]: time="2024-07-02T00:54:35.985524314Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.28.0\" returns image reference \"sha256:2551880d36cd0ce4c6820747ffe4c40cbf344d26df0ecd878808432ad4f78f03\"" Jul 2 00:54:35.986365 env[1214]: time="2024-07-02T00:54:35.986062362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\"" Jul 2 00:54:36.004140 env[1214]: time="2024-07-02T00:54:36.003681252Z" level=info msg="CreateContainer within sandbox \"5ec0aec81a045e74647af9b7918f49a861aa84e139a3f8b89750a2c8ff8221f0\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Jul 2 00:54:36.004264 kubelet[2063]: E0702 00:54:36.004092 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:36.015356 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1737174103.mount: Deactivated successfully. Jul 2 00:54:36.019594 env[1214]: time="2024-07-02T00:54:36.019545630Z" level=info msg="CreateContainer within sandbox \"5ec0aec81a045e74647af9b7918f49a861aa84e139a3f8b89750a2c8ff8221f0\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"ebbd2e3da29bf902ba851603634420ea614b72b2a46b68a056b2f9b8cb1af1e7\"" Jul 2 00:54:36.020208 env[1214]: time="2024-07-02T00:54:36.020169358Z" level=info msg="StartContainer for \"ebbd2e3da29bf902ba851603634420ea614b72b2a46b68a056b2f9b8cb1af1e7\"" Jul 2 00:54:36.035266 systemd[1]: Started cri-containerd-ebbd2e3da29bf902ba851603634420ea614b72b2a46b68a056b2f9b8cb1af1e7.scope. Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.087000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit: BPF prog-id=129 op=LOAD Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2475 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562626432653364613239626639303262613835313630333633343432 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2475 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562626432653364613239626639303262613835313630333633343432 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.088000 audit: BPF prog-id=130 op=LOAD Jul 2 00:54:36.088000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2475 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.088000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562626432653364613239626639303262613835313630333633343432 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit: BPF prog-id=131 op=LOAD Jul 2 00:54:36.089000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2475 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562626432653364613239626639303262613835313630333633343432 Jul 2 00:54:36.089000 audit: BPF prog-id=131 op=UNLOAD Jul 2 00:54:36.089000 audit: BPF prog-id=130 op=UNLOAD Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { perfmon } for pid=2600 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit[2600]: AVC avc: denied { bpf } for pid=2600 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.089000 audit: BPF prog-id=132 op=LOAD Jul 2 00:54:36.089000 audit[2600]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2475 pid=2600 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.089000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6562626432653364613239626639303262613835313630333633343432 Jul 2 00:54:36.116945 env[1214]: time="2024-07-02T00:54:36.116895204Z" level=info msg="StartContainer for \"ebbd2e3da29bf902ba851603634420ea614b72b2a46b68a056b2f9b8cb1af1e7\" returns successfully" Jul 2 00:54:36.877449 env[1214]: time="2024-07-02T00:54:36.877357510Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:36.878933 env[1214]: time="2024-07-02T00:54:36.878897171Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:36.880392 env[1214]: time="2024-07-02T00:54:36.880367791Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:36.881961 env[1214]: time="2024-07-02T00:54:36.881938292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:e57c9db86f1cee1ae6f41257eed1ee2f363783177809217a2045502a09cf7cee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:36.882374 env[1214]: time="2024-07-02T00:54:36.882346298Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.28.0\" returns image reference \"sha256:4b6a6a9b369fa6127e23e376ac423670fa81290e0860917acaacae108e3cc064\"" Jul 2 00:54:36.886939 env[1214]: time="2024-07-02T00:54:36.886900560Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Jul 2 00:54:36.904089 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount220997448.mount: Deactivated successfully. Jul 2 00:54:36.906826 env[1214]: time="2024-07-02T00:54:36.906791993Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be\"" Jul 2 00:54:36.908891 env[1214]: time="2024-07-02T00:54:36.908864301Z" level=info msg="StartContainer for \"36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be\"" Jul 2 00:54:36.935359 systemd[1]: Started cri-containerd-36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be.scope. Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2521 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613063323835383038666363323962623835303332396230366138 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.963000 audit: BPF prog-id=133 op=LOAD Jul 2 00:54:36.963000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2521 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613063323835383038666363323962623835303332396230366138 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.964000 audit: BPF prog-id=134 op=LOAD Jul 2 00:54:36.964000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2521 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.964000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613063323835383038666363323962623835303332396230366138 Jul 2 00:54:36.964000 audit: BPF prog-id=134 op=UNLOAD Jul 2 00:54:36.964000 audit: BPF prog-id=133 op=UNLOAD Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { perfmon } for pid=2638 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit[2638]: AVC avc: denied { bpf } for pid=2638 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:36.965000 audit: BPF prog-id=135 op=LOAD Jul 2 00:54:36.965000 audit[2638]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2521 pid=2638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:36.965000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336613063323835383038666363323962623835303332396230366138 Jul 2 00:54:36.985596 env[1214]: time="2024-07-02T00:54:36.985513632Z" level=info msg="StartContainer for \"36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be\" returns successfully" Jul 2 00:54:37.005797 systemd[1]: cri-containerd-36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be.scope: Deactivated successfully. Jul 2 00:54:37.011000 audit: BPF prog-id=135 op=UNLOAD Jul 2 00:54:37.056867 env[1214]: time="2024-07-02T00:54:37.056809697Z" level=info msg="shim disconnected" id=36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be Jul 2 00:54:37.056867 env[1214]: time="2024-07-02T00:54:37.056854618Z" level=warning msg="cleaning up after shim disconnected" id=36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be namespace=k8s.io Jul 2 00:54:37.056867 env[1214]: time="2024-07-02T00:54:37.056864178Z" level=info msg="cleaning up dead shim" Jul 2 00:54:37.063492 env[1214]: time="2024-07-02T00:54:37.063446944Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:54:37Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2677 runtime=io.containerd.runc.v2\n" Jul 2 00:54:37.096557 kubelet[2063]: E0702 00:54:37.096514 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:37.101723 env[1214]: time="2024-07-02T00:54:37.101685407Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\"" Jul 2 00:54:37.105141 kubelet[2063]: E0702 00:54:37.105119 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:37.125249 kubelet[2063]: I0702 00:54:37.125215 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-fccd5f89b-2swn5" podStartSLOduration=2.57509062 podStartE2EDuration="4.125179395s" podCreationTimestamp="2024-07-02 00:54:33 +0000 UTC" firstStartedPulling="2024-07-02 00:54:34.435758463 +0000 UTC m=+21.529291210" lastFinishedPulling="2024-07-02 00:54:35.985847238 +0000 UTC m=+23.079379985" observedRunningTime="2024-07-02 00:54:37.125058113 +0000 UTC m=+24.218590860" watchObservedRunningTime="2024-07-02 00:54:37.125179395 +0000 UTC m=+24.218712142" Jul 2 00:54:37.250223 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-36a0c285808fcc29bb850329b06a8af7b851f72a925e6f8adc14e301ba02e1be-rootfs.mount: Deactivated successfully. Jul 2 00:54:38.002242 kubelet[2063]: E0702 00:54:38.002196 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:38.105089 kubelet[2063]: I0702 00:54:38.105048 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:54:38.105764 kubelet[2063]: E0702 00:54:38.105740 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:40.002234 kubelet[2063]: E0702 00:54:40.002187 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:41.797749 env[1214]: time="2024-07-02T00:54:41.797706273Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:41.799999 env[1214]: time="2024-07-02T00:54:41.799970738Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:41.801186 env[1214]: time="2024-07-02T00:54:41.801153911Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:41.802606 env[1214]: time="2024-07-02T00:54:41.802579407Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:67fdc0954d3c96f9a7938fca4d5759c835b773dfb5cb513903e89d21462d886e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:41.803077 env[1214]: time="2024-07-02T00:54:41.803050812Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.28.0\" returns image reference \"sha256:adcb19ea66141abcd7dc426e3205f2e6ff26e524a3f7148c97f3d49933f502ee\"" Jul 2 00:54:41.806646 env[1214]: time="2024-07-02T00:54:41.806612852Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Jul 2 00:54:41.816585 env[1214]: time="2024-07-02T00:54:41.816526403Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902\"" Jul 2 00:54:41.817231 env[1214]: time="2024-07-02T00:54:41.817203850Z" level=info msg="StartContainer for \"24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902\"" Jul 2 00:54:41.834757 systemd[1]: run-containerd-runc-k8s.io-24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902-runc.ruZVXu.mount: Deactivated successfully. Jul 2 00:54:41.836279 systemd[1]: Started cri-containerd-24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902.scope. Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879680 kernel: kauditd_printk_skb: 223 callbacks suppressed Jul 2 00:54:41.879743 kernel: audit: type=1400 audit(1719881681.878:986): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2521 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:41.884304 kernel: audit: type=1300 audit(1719881681.878:986): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2521 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:41.884374 kernel: audit: type=1327 audit(1719881681.878:986): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613331643730313263653930386135643530646263656237373161 Jul 2 00:54:41.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613331643730313263653930386135643530646263656237373161 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.888829 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.888900 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.893107 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.895493 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.895577 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.902103 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.904706 kernel: audit: type=1400 audit(1719881681.878:987): avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.878000 audit: BPF prog-id=136 op=LOAD Jul 2 00:54:41.878000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2521 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:41.878000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613331643730313263653930386135643530646263656237373161 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.879000 audit: BPF prog-id=137 op=LOAD Jul 2 00:54:41.879000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2521 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:41.879000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613331643730313263653930386135643530646263656237373161 Jul 2 00:54:41.880000 audit: BPF prog-id=137 op=UNLOAD Jul 2 00:54:41.880000 audit: BPF prog-id=136 op=UNLOAD Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { perfmon } for pid=2705 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit[2705]: AVC avc: denied { bpf } for pid=2705 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:41.880000 audit: BPF prog-id=138 op=LOAD Jul 2 00:54:41.880000 audit[2705]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2521 pid=2705 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:41.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613331643730313263653930386135643530646263656237373161 Jul 2 00:54:41.909311 env[1214]: time="2024-07-02T00:54:41.909255478Z" level=info msg="StartContainer for \"24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902\" returns successfully" Jul 2 00:54:42.002653 kubelet[2063]: E0702 00:54:42.001914 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:42.114575 kubelet[2063]: E0702 00:54:42.114411 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:42.433575 env[1214]: time="2024-07-02T00:54:42.433445028Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Jul 2 00:54:42.435498 systemd[1]: cri-containerd-24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902.scope: Deactivated successfully. Jul 2 00:54:42.439000 audit: BPF prog-id=138 op=UNLOAD Jul 2 00:54:42.455846 kubelet[2063]: I0702 00:54:42.455798 2063 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Jul 2 00:54:42.485027 env[1214]: time="2024-07-02T00:54:42.484929262Z" level=info msg="shim disconnected" id=24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902 Jul 2 00:54:42.485027 env[1214]: time="2024-07-02T00:54:42.485001942Z" level=warning msg="cleaning up after shim disconnected" id=24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902 namespace=k8s.io Jul 2 00:54:42.485027 env[1214]: time="2024-07-02T00:54:42.485012182Z" level=info msg="cleaning up dead shim" Jul 2 00:54:42.496907 env[1214]: time="2024-07-02T00:54:42.496852470Z" level=warning msg="cleanup warnings time=\"2024-07-02T00:54:42Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2747 runtime=io.containerd.runc.v2\n" Jul 2 00:54:42.502330 kubelet[2063]: I0702 00:54:42.502280 2063 topology_manager.go:215] "Topology Admit Handler" podUID="09f2169c-1b4a-4699-9fe1-6a320d31b42d" podNamespace="kube-system" podName="coredns-76f75df574-mwnbm" Jul 2 00:54:42.503140 kubelet[2063]: I0702 00:54:42.503118 2063 topology_manager.go:215] "Topology Admit Handler" podUID="1dafe043-8e09-41e8-8461-235c56ab0198" podNamespace="kube-system" podName="coredns-76f75df574-fxp76" Jul 2 00:54:42.503323 kubelet[2063]: I0702 00:54:42.503290 2063 topology_manager.go:215] "Topology Admit Handler" podUID="eac07240-ede1-43ad-b618-d7921e37ca39" podNamespace="calico-system" podName="calico-kube-controllers-5856d689df-s98tz" Jul 2 00:54:42.508955 systemd[1]: Created slice kubepods-burstable-pod09f2169c_1b4a_4699_9fe1_6a320d31b42d.slice. Jul 2 00:54:42.515856 systemd[1]: Created slice kubepods-burstable-pod1dafe043_8e09_41e8_8461_235c56ab0198.slice. Jul 2 00:54:42.520935 systemd[1]: Created slice kubepods-besteffort-podeac07240_ede1_43ad_b618_d7921e37ca39.slice. Jul 2 00:54:42.523332 kubelet[2063]: I0702 00:54:42.523312 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/eac07240-ede1-43ad-b618-d7921e37ca39-tigera-ca-bundle\") pod \"calico-kube-controllers-5856d689df-s98tz\" (UID: \"eac07240-ede1-43ad-b618-d7921e37ca39\") " pod="calico-system/calico-kube-controllers-5856d689df-s98tz" Jul 2 00:54:42.523421 kubelet[2063]: I0702 00:54:42.523350 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4csr\" (UniqueName: \"kubernetes.io/projected/1dafe043-8e09-41e8-8461-235c56ab0198-kube-api-access-p4csr\") pod \"coredns-76f75df574-fxp76\" (UID: \"1dafe043-8e09-41e8-8461-235c56ab0198\") " pod="kube-system/coredns-76f75df574-fxp76" Jul 2 00:54:42.523421 kubelet[2063]: I0702 00:54:42.523384 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6zn6x\" (UniqueName: \"kubernetes.io/projected/eac07240-ede1-43ad-b618-d7921e37ca39-kube-api-access-6zn6x\") pod \"calico-kube-controllers-5856d689df-s98tz\" (UID: \"eac07240-ede1-43ad-b618-d7921e37ca39\") " pod="calico-system/calico-kube-controllers-5856d689df-s98tz" Jul 2 00:54:42.523479 kubelet[2063]: I0702 00:54:42.523437 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-n6zrp\" (UniqueName: \"kubernetes.io/projected/09f2169c-1b4a-4699-9fe1-6a320d31b42d-kube-api-access-n6zrp\") pod \"coredns-76f75df574-mwnbm\" (UID: \"09f2169c-1b4a-4699-9fe1-6a320d31b42d\") " pod="kube-system/coredns-76f75df574-mwnbm" Jul 2 00:54:42.523521 kubelet[2063]: I0702 00:54:42.523504 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/09f2169c-1b4a-4699-9fe1-6a320d31b42d-config-volume\") pod \"coredns-76f75df574-mwnbm\" (UID: \"09f2169c-1b4a-4699-9fe1-6a320d31b42d\") " pod="kube-system/coredns-76f75df574-mwnbm" Jul 2 00:54:42.523616 kubelet[2063]: I0702 00:54:42.523601 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/1dafe043-8e09-41e8-8461-235c56ab0198-config-volume\") pod \"coredns-76f75df574-fxp76\" (UID: \"1dafe043-8e09-41e8-8461-235c56ab0198\") " pod="kube-system/coredns-76f75df574-fxp76" Jul 2 00:54:42.813066 kubelet[2063]: E0702 00:54:42.813033 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:42.817106 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-24a31d7012ce908a5d50dbceb771aaafe9b12972f398e5e6a1f13fd65c511902-rootfs.mount: Deactivated successfully. Jul 2 00:54:42.818264 env[1214]: time="2024-07-02T00:54:42.818218803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mwnbm,Uid:09f2169c-1b4a-4699-9fe1-6a320d31b42d,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:42.819059 kubelet[2063]: E0702 00:54:42.819032 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:42.819430 env[1214]: time="2024-07-02T00:54:42.819397095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-fxp76,Uid:1dafe043-8e09-41e8-8461-235c56ab0198,Namespace:kube-system,Attempt:0,}" Jul 2 00:54:42.823805 env[1214]: time="2024-07-02T00:54:42.823761822Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5856d689df-s98tz,Uid:eac07240-ede1-43ad-b618-d7921e37ca39,Namespace:calico-system,Attempt:0,}" Jul 2 00:54:43.137746 kubelet[2063]: E0702 00:54:43.136101 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:43.148585 env[1214]: time="2024-07-02T00:54:43.143993728Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\"" Jul 2 00:54:43.185732 env[1214]: time="2024-07-02T00:54:43.185668399Z" level=error msg="Failed to destroy network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.186291 env[1214]: time="2024-07-02T00:54:43.186256725Z" level=error msg="encountered an error cleaning up failed sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.186450 env[1214]: time="2024-07-02T00:54:43.186421447Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-fxp76,Uid:1dafe043-8e09-41e8-8461-235c56ab0198,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.188262 kubelet[2063]: E0702 00:54:43.188218 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.188340 kubelet[2063]: E0702 00:54:43.188300 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-fxp76" Jul 2 00:54:43.188340 kubelet[2063]: E0702 00:54:43.188322 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-fxp76" Jul 2 00:54:43.188424 kubelet[2063]: E0702 00:54:43.188385 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-fxp76_kube-system(1dafe043-8e09-41e8-8461-235c56ab0198)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-fxp76_kube-system(1dafe043-8e09-41e8-8461-235c56ab0198)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-fxp76" podUID="1dafe043-8e09-41e8-8461-235c56ab0198" Jul 2 00:54:43.190117 env[1214]: time="2024-07-02T00:54:43.188729511Z" level=error msg="Failed to destroy network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.190117 env[1214]: time="2024-07-02T00:54:43.189016074Z" level=error msg="encountered an error cleaning up failed sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.190117 env[1214]: time="2024-07-02T00:54:43.189062154Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mwnbm,Uid:09f2169c-1b4a-4699-9fe1-6a320d31b42d,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.190255 kubelet[2063]: E0702 00:54:43.189205 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.190255 kubelet[2063]: E0702 00:54:43.189263 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mwnbm" Jul 2 00:54:43.190255 kubelet[2063]: E0702 00:54:43.189282 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-mwnbm" Jul 2 00:54:43.190334 kubelet[2063]: E0702 00:54:43.189323 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-mwnbm_kube-system(09f2169c-1b4a-4699-9fe1-6a320d31b42d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-mwnbm_kube-system(09f2169c-1b4a-4699-9fe1-6a320d31b42d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mwnbm" podUID="09f2169c-1b4a-4699-9fe1-6a320d31b42d" Jul 2 00:54:43.193200 env[1214]: time="2024-07-02T00:54:43.193114716Z" level=error msg="Failed to destroy network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.193551 env[1214]: time="2024-07-02T00:54:43.193486720Z" level=error msg="encountered an error cleaning up failed sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.193631 env[1214]: time="2024-07-02T00:54:43.193576961Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5856d689df-s98tz,Uid:eac07240-ede1-43ad-b618-d7921e37ca39,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.193752 kubelet[2063]: E0702 00:54:43.193725 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:43.193798 kubelet[2063]: E0702 00:54:43.193770 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5856d689df-s98tz" Jul 2 00:54:43.193798 kubelet[2063]: E0702 00:54:43.193790 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5856d689df-s98tz" Jul 2 00:54:43.193858 kubelet[2063]: E0702 00:54:43.193832 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5856d689df-s98tz_calico-system(eac07240-ede1-43ad-b618-d7921e37ca39)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5856d689df-s98tz_calico-system(eac07240-ede1-43ad-b618-d7921e37ca39)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5856d689df-s98tz" podUID="eac07240-ede1-43ad-b618-d7921e37ca39" Jul 2 00:54:43.513000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.92:22-10.0.0.1:48320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:43.514074 systemd[1]: Started sshd@7-10.0.0.92:22-10.0.0.1:48320.service. Jul 2 00:54:43.550000 audit[2875]: USER_ACCT pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.551024 sshd[2875]: Accepted publickey for core from 10.0.0.1 port 48320 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:43.551000 audit[2875]: CRED_ACQ pid=2875 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.551000 audit[2875]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff210d970 a2=3 a3=1 items=0 ppid=1 pid=2875 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:43.551000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:43.552395 sshd[2875]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:43.555860 systemd-logind[1205]: New session 8 of user core. Jul 2 00:54:43.556713 systemd[1]: Started session-8.scope. Jul 2 00:54:43.559000 audit[2875]: USER_START pid=2875 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.560000 audit[2877]: CRED_ACQ pid=2877 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.678281 sshd[2875]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:43.678000 audit[2875]: USER_END pid=2875 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.678000 audit[2875]: CRED_DISP pid=2875 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:43.680390 systemd[1]: session-8.scope: Deactivated successfully. Jul 2 00:54:43.680940 systemd-logind[1205]: Session 8 logged out. Waiting for processes to exit. Jul 2 00:54:43.680000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.0.0.92:22-10.0.0.1:48320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:43.681075 systemd[1]: sshd@7-10.0.0.92:22-10.0.0.1:48320.service: Deactivated successfully. Jul 2 00:54:43.682038 systemd-logind[1205]: Removed session 8. Jul 2 00:54:43.815038 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc-shm.mount: Deactivated successfully. Jul 2 00:54:43.815138 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a-shm.mount: Deactivated successfully. Jul 2 00:54:43.815192 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42-shm.mount: Deactivated successfully. Jul 2 00:54:44.007289 systemd[1]: Created slice kubepods-besteffort-pod53f96a20_2bb3_4586_9b6d_4a3d96d028e2.slice. Jul 2 00:54:44.011340 env[1214]: time="2024-07-02T00:54:44.011301263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rk75r,Uid:53f96a20-2bb3-4586-9b6d-4a3d96d028e2,Namespace:calico-system,Attempt:0,}" Jul 2 00:54:44.154168 kubelet[2063]: I0702 00:54:44.152399 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:44.154168 kubelet[2063]: I0702 00:54:44.153579 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:44.156991 env[1214]: time="2024-07-02T00:54:44.155552144Z" level=info msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" Jul 2 00:54:44.156991 env[1214]: time="2024-07-02T00:54:44.156039628Z" level=info msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" Jul 2 00:54:44.160854 kubelet[2063]: I0702 00:54:44.160770 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:44.162332 env[1214]: time="2024-07-02T00:54:44.161217280Z" level=info msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" Jul 2 00:54:44.178297 env[1214]: time="2024-07-02T00:54:44.178201570Z" level=error msg="Failed to destroy network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.180043 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3-shm.mount: Deactivated successfully. Jul 2 00:54:44.181857 env[1214]: time="2024-07-02T00:54:44.181601964Z" level=error msg="encountered an error cleaning up failed sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.181857 env[1214]: time="2024-07-02T00:54:44.181667124Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rk75r,Uid:53f96a20-2bb3-4586-9b6d-4a3d96d028e2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.182027 kubelet[2063]: E0702 00:54:44.181901 2063 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.182027 kubelet[2063]: E0702 00:54:44.181964 2063 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:44.182027 kubelet[2063]: E0702 00:54:44.181996 2063 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-rk75r" Jul 2 00:54:44.182157 kubelet[2063]: E0702 00:54:44.182059 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-rk75r_calico-system(53f96a20-2bb3-4586-9b6d-4a3d96d028e2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-rk75r_calico-system(53f96a20-2bb3-4586-9b6d-4a3d96d028e2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:44.218661 env[1214]: time="2024-07-02T00:54:44.216224429Z" level=error msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" failed" error="failed to destroy network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.222588 env[1214]: time="2024-07-02T00:54:44.222102408Z" level=error msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" failed" error="failed to destroy network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.224292 kubelet[2063]: E0702 00:54:44.224256 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:44.224415 kubelet[2063]: E0702 00:54:44.224354 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc"} Jul 2 00:54:44.224415 kubelet[2063]: E0702 00:54:44.224413 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eac07240-ede1-43ad-b618-d7921e37ca39\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:54:44.224500 kubelet[2063]: E0702 00:54:44.224459 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eac07240-ede1-43ad-b618-d7921e37ca39\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5856d689df-s98tz" podUID="eac07240-ede1-43ad-b618-d7921e37ca39" Jul 2 00:54:44.224500 kubelet[2063]: E0702 00:54:44.224264 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:44.224500 kubelet[2063]: E0702 00:54:44.224486 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42"} Jul 2 00:54:44.224631 kubelet[2063]: E0702 00:54:44.224555 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"1dafe043-8e09-41e8-8461-235c56ab0198\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:54:44.224631 kubelet[2063]: E0702 00:54:44.224589 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"1dafe043-8e09-41e8-8461-235c56ab0198\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-fxp76" podUID="1dafe043-8e09-41e8-8461-235c56ab0198" Jul 2 00:54:44.241819 env[1214]: time="2024-07-02T00:54:44.241763244Z" level=error msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" failed" error="failed to destroy network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:44.242104 kubelet[2063]: E0702 00:54:44.241999 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:44.242104 kubelet[2063]: E0702 00:54:44.242045 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a"} Jul 2 00:54:44.242104 kubelet[2063]: E0702 00:54:44.242081 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"09f2169c-1b4a-4699-9fe1-6a320d31b42d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:54:44.242249 kubelet[2063]: E0702 00:54:44.242113 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"09f2169c-1b4a-4699-9fe1-6a320d31b42d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-mwnbm" podUID="09f2169c-1b4a-4699-9fe1-6a320d31b42d" Jul 2 00:54:45.163567 kubelet[2063]: I0702 00:54:45.163514 2063 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:45.165506 env[1214]: time="2024-07-02T00:54:45.164016358Z" level=info msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" Jul 2 00:54:45.187718 env[1214]: time="2024-07-02T00:54:45.187661105Z" level=error msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" failed" error="failed to destroy network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Jul 2 00:54:45.187916 kubelet[2063]: E0702 00:54:45.187890 2063 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:45.187978 kubelet[2063]: E0702 00:54:45.187936 2063 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3"} Jul 2 00:54:45.187978 kubelet[2063]: E0702 00:54:45.187970 2063 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Jul 2 00:54:45.188055 kubelet[2063]: E0702 00:54:45.187995 2063 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"53f96a20-2bb3-4586-9b6d-4a3d96d028e2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-rk75r" podUID="53f96a20-2bb3-4586-9b6d-4a3d96d028e2" Jul 2 00:54:46.944046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1926767715.mount: Deactivated successfully. Jul 2 00:54:47.148915 env[1214]: time="2024-07-02T00:54:47.148858798Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:47.150454 env[1214]: time="2024-07-02T00:54:47.150422253Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:47.151883 env[1214]: time="2024-07-02T00:54:47.151855506Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:47.153026 env[1214]: time="2024-07-02T00:54:47.153004396Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:95f8004836427050c9997ad0800819ced5636f6bda647b4158fc7c497910c8d0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:47.153445 env[1214]: time="2024-07-02T00:54:47.153412160Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.28.0\" returns image reference \"sha256:d80cbd636ae2754a08d04558f0436508a17d92258e4712cc4a6299f43497607f\"" Jul 2 00:54:47.165163 env[1214]: time="2024-07-02T00:54:47.165120985Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Jul 2 00:54:47.176157 env[1214]: time="2024-07-02T00:54:47.176115884Z" level=info msg="CreateContainer within sandbox \"db3f1850321c50ecb5d9afd84a2583dcaca049aec309cf5b3bb99c5fb5b2523b\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"5c698b85fa08b56efacda77a90637b21b51817f50ac55e34bc4583b9b6ebea44\"" Jul 2 00:54:47.176783 env[1214]: time="2024-07-02T00:54:47.176758090Z" level=info msg="StartContainer for \"5c698b85fa08b56efacda77a90637b21b51817f50ac55e34bc4583b9b6ebea44\"" Jul 2 00:54:47.195646 systemd[1]: Started cri-containerd-5c698b85fa08b56efacda77a90637b21b51817f50ac55e34bc4583b9b6ebea44.scope. Jul 2 00:54:47.235000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236918 kernel: kauditd_printk_skb: 45 callbacks suppressed Jul 2 00:54:47.236975 kernel: audit: type=1400 audit(1719881687.235:1002): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.235000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2521 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:47.243299 kernel: audit: type=1300 audit(1719881687.235:1002): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2521 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:47.243357 kernel: audit: type=1327 audit(1719881687.235:1002): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363938623835666130386235366566616364613737613930363337 Jul 2 00:54:47.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363938623835666130386235366566616364613737613930363337 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.248083 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.248156 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.252726 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.252795 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.256685 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.260081 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.260160 kernel: audit: type=1400 audit(1719881687.236:1003): avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit: BPF prog-id=139 op=LOAD Jul 2 00:54:47.236000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2521 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:47.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363938623835666130386235366566616364613737613930363337 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.236000 audit: BPF prog-id=140 op=LOAD Jul 2 00:54:47.236000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2521 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:47.236000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363938623835666130386235366566616364613737613930363337 Jul 2 00:54:47.240000 audit: BPF prog-id=140 op=UNLOAD Jul 2 00:54:47.240000 audit: BPF prog-id=139 op=UNLOAD Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { perfmon } for pid=3033 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit[3033]: AVC avc: denied { bpf } for pid=3033 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:47.240000 audit: BPF prog-id=141 op=LOAD Jul 2 00:54:47.240000 audit[3033]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2521 pid=3033 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:47.240000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563363938623835666130386235366566616364613737613930363337 Jul 2 00:54:47.358340 env[1214]: time="2024-07-02T00:54:47.358282367Z" level=info msg="StartContainer for \"5c698b85fa08b56efacda77a90637b21b51817f50ac55e34bc4583b9b6ebea44\" returns successfully" Jul 2 00:54:47.440085 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Jul 2 00:54:47.440298 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Jul 2 00:54:48.172071 kubelet[2063]: E0702 00:54:48.172041 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:48.186794 kubelet[2063]: I0702 00:54:48.186748 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-68x9p" podStartSLOduration=1.478448109 podStartE2EDuration="14.186710183s" podCreationTimestamp="2024-07-02 00:54:34 +0000 UTC" firstStartedPulling="2024-07-02 00:54:34.445494129 +0000 UTC m=+21.539026836" lastFinishedPulling="2024-07-02 00:54:47.153756163 +0000 UTC m=+34.247288910" observedRunningTime="2024-07-02 00:54:48.182628787 +0000 UTC m=+35.276161534" watchObservedRunningTime="2024-07-02 00:54:48.186710183 +0000 UTC m=+35.280242930" Jul 2 00:54:48.683200 systemd[1]: Started sshd@8-10.0.0.92:22-10.0.0.1:48322.service. Jul 2 00:54:48.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.92:22-10.0.0.1:48322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:48.710000 audit[3157]: AVC avc: denied { write } for pid=3157 comm="tee" name="fd" dev="proc" ino=18259 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.710000 audit[3157]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffffbaa26 a2=241 a3=1b6 items=1 ppid=3104 pid=3157 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.710000 audit: CWD cwd="/etc/service/enabled/felix/log" Jul 2 00:54:48.710000 audit: PATH item=0 name="/dev/fd/63" inode=16248 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.710000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.716000 audit[3160]: AVC avc: denied { write } for pid=3160 comm="tee" name="fd" dev="proc" ino=16257 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.716000 audit[3160]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffcfc8ba27 a2=241 a3=1b6 items=1 ppid=3115 pid=3160 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.716000 audit: CWD cwd="/etc/service/enabled/bird/log" Jul 2 00:54:48.716000 audit: PATH item=0 name="/dev/fd/63" inode=16249 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.716000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.724000 audit[3168]: AVC avc: denied { write } for pid=3168 comm="tee" name="fd" dev="proc" ino=16261 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.724000 audit[3119]: USER_ACCT pid=3119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.725154 sshd[3119]: Accepted publickey for core from 10.0.0.1 port 48322 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:48.725000 audit[3146]: AVC avc: denied { write } for pid=3146 comm="tee" name="fd" dev="proc" ino=16264 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.725000 audit[3119]: CRED_ACQ pid=3119 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.725000 audit[3119]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc1ebabb0 a2=3 a3=1 items=0 ppid=1 pid=3119 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.725000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:48.726743 sshd[3119]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:48.725000 audit[3146]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffff7e8a26 a2=241 a3=1b6 items=1 ppid=3108 pid=3146 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.725000 audit: CWD cwd="/etc/service/enabled/bird6/log" Jul 2 00:54:48.725000 audit: PATH item=0 name="/dev/fd/63" inode=18249 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.724000 audit[3168]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffbd6ea16 a2=241 a3=1b6 items=1 ppid=3109 pid=3168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.724000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Jul 2 00:54:48.724000 audit: PATH item=0 name="/dev/fd/63" inode=16254 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.724000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.728000 audit[3164]: AVC avc: denied { write } for pid=3164 comm="tee" name="fd" dev="proc" ino=16270 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.728000 audit[3164]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe7e6da28 a2=241 a3=1b6 items=1 ppid=3110 pid=3164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.728000 audit: CWD cwd="/etc/service/enabled/cni/log" Jul 2 00:54:48.728000 audit: PATH item=0 name="/dev/fd/63" inode=18254 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.728000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.731573 systemd[1]: Started session-9.scope. Jul 2 00:54:48.733003 systemd-logind[1205]: New session 9 of user core. Jul 2 00:54:48.737000 audit[3119]: USER_START pid=3119 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.738000 audit[3183]: CRED_ACQ pid=3183 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.742000 audit[3174]: AVC avc: denied { write } for pid=3174 comm="tee" name="fd" dev="proc" ino=18293 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.742000 audit[3174]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce3b1a26 a2=241 a3=1b6 items=1 ppid=3102 pid=3174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.742000 audit: CWD cwd="/etc/service/enabled/confd/log" Jul 2 00:54:48.742000 audit: PATH item=0 name="/dev/fd/63" inode=17307 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.742000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.747000 audit[3185]: AVC avc: denied { write } for pid=3185 comm="tee" name="fd" dev="proc" ino=18297 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Jul 2 00:54:48.747000 audit[3185]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe5aa0a17 a2=241 a3=1b6 items=1 ppid=3103 pid=3185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:48.747000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Jul 2 00:54:48.747000 audit: PATH item=0 name="/dev/fd/63" inode=19178 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Jul 2 00:54:48.747000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Jul 2 00:54:48.885957 sshd[3119]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:48.886000 audit[3119]: USER_END pid=3119 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.886000 audit[3119]: CRED_DISP pid=3119 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:48.888521 systemd[1]: sshd@8-10.0.0.92:22-10.0.0.1:48322.service: Deactivated successfully. Jul 2 00:54:48.888000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.0.0.92:22-10.0.0.1:48322 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:48.889254 systemd[1]: session-9.scope: Deactivated successfully. Jul 2 00:54:48.889779 systemd-logind[1205]: Session 9 logged out. Waiting for processes to exit. Jul 2 00:54:48.890503 systemd-logind[1205]: Removed session 9. Jul 2 00:54:49.172650 kubelet[2063]: E0702 00:54:49.172616 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:50.176824 kubelet[2063]: E0702 00:54:50.176798 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:53.890197 systemd[1]: Started sshd@9-10.0.0.92:22-10.0.0.1:37728.service. Jul 2 00:54:53.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:37728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:53.893223 kernel: kauditd_printk_skb: 79 callbacks suppressed Jul 2 00:54:53.893306 kernel: audit: type=1130 audit(1719881693.889:1024): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:37728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:53.923000 audit[3351]: USER_ACCT pid=3351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.924359 sshd[3351]: Accepted publickey for core from 10.0.0.1 port 37728 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:53.925487 sshd[3351]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:53.924000 audit[3351]: CRED_ACQ pid=3351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.929095 kernel: audit: type=1101 audit(1719881693.923:1025): pid=3351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.929787 kernel: audit: type=1103 audit(1719881693.924:1026): pid=3351 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.929830 kernel: audit: type=1006 audit(1719881693.924:1027): pid=3351 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Jul 2 00:54:53.929862 kernel: audit: type=1300 audit(1719881693.924:1027): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3725290 a2=3 a3=1 items=0 ppid=1 pid=3351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:53.924000 audit[3351]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3725290 a2=3 a3=1 items=0 ppid=1 pid=3351 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:53.929707 systemd-logind[1205]: New session 10 of user core. Jul 2 00:54:53.930160 systemd[1]: Started session-10.scope. Jul 2 00:54:53.924000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:53.932925 kernel: audit: type=1327 audit(1719881693.924:1027): proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:53.933000 audit[3351]: USER_START pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.934000 audit[3353]: CRED_ACQ pid=3353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.938910 kernel: audit: type=1105 audit(1719881693.933:1028): pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:53.938964 kernel: audit: type=1103 audit(1719881693.934:1029): pid=3353 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.074363 sshd[3351]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:54.080879 kernel: audit: type=1106 audit(1719881694.075:1030): pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.080980 kernel: audit: type=1104 audit(1719881694.075:1031): pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.075000 audit[3351]: USER_END pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.075000 audit[3351]: CRED_DISP pid=3351 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.078176 systemd[1]: Started sshd@10-10.0.0.92:22-10.0.0.1:37744.service. Jul 2 00:54:54.081135 systemd[1]: sshd@9-10.0.0.92:22-10.0.0.1:37728.service: Deactivated successfully. Jul 2 00:54:54.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.92:22-10.0.0.1:37744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:54.080000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.0.0.92:22-10.0.0.1:37728 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:54.081834 systemd[1]: session-10.scope: Deactivated successfully. Jul 2 00:54:54.085721 systemd-logind[1205]: Session 10 logged out. Waiting for processes to exit. Jul 2 00:54:54.092455 systemd-logind[1205]: Removed session 10. Jul 2 00:54:54.114000 audit[3387]: USER_ACCT pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.115321 sshd[3387]: Accepted publickey for core from 10.0.0.1 port 37744 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:54.115000 audit[3387]: CRED_ACQ pid=3387 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.115000 audit[3387]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffea2c49b0 a2=3 a3=1 items=0 ppid=1 pid=3387 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:54.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:54.116476 sshd[3387]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:54.119677 systemd-logind[1205]: New session 11 of user core. Jul 2 00:54:54.120576 systemd[1]: Started session-11.scope. Jul 2 00:54:54.123000 audit[3387]: USER_START pid=3387 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.124000 audit[3390]: CRED_ACQ pid=3390 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.278037 sshd[3387]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:54.279000 audit[3387]: USER_END pid=3387 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.279000 audit[3387]: CRED_DISP pid=3387 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.283787 systemd[1]: sshd@10-10.0.0.92:22-10.0.0.1:37744.service: Deactivated successfully. Jul 2 00:54:54.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.0.0.92:22-10.0.0.1:37744 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:54.284495 systemd[1]: session-11.scope: Deactivated successfully. Jul 2 00:54:54.287681 systemd-logind[1205]: Session 11 logged out. Waiting for processes to exit. Jul 2 00:54:54.289836 systemd[1]: Started sshd@11-10.0.0.92:22-10.0.0.1:37756.service. Jul 2 00:54:54.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.92:22-10.0.0.1:37756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:54.292769 systemd-logind[1205]: Removed session 11. Jul 2 00:54:54.326000 audit[3399]: USER_ACCT pid=3399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.327224 sshd[3399]: Accepted publickey for core from 10.0.0.1 port 37756 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:54.327000 audit[3399]: CRED_ACQ pid=3399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.327000 audit[3399]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd021add0 a2=3 a3=1 items=0 ppid=1 pid=3399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:54.327000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:54.328675 sshd[3399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:54.332843 systemd-logind[1205]: New session 12 of user core. Jul 2 00:54:54.333212 systemd[1]: Started session-12.scope. Jul 2 00:54:54.336000 audit[3399]: USER_START pid=3399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.337000 audit[3401]: CRED_ACQ pid=3401 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.447381 sshd[3399]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:54.448000 audit[3399]: USER_END pid=3399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.448000 audit[3399]: CRED_DISP pid=3399 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:54.450677 systemd[1]: sshd@11-10.0.0.92:22-10.0.0.1:37756.service: Deactivated successfully. Jul 2 00:54:54.450000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.0.0.92:22-10.0.0.1:37756 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:54.451362 systemd[1]: session-12.scope: Deactivated successfully. Jul 2 00:54:54.451715 systemd-logind[1205]: Session 12 logged out. Waiting for processes to exit. Jul 2 00:54:54.452510 systemd-logind[1205]: Removed session 12. Jul 2 00:54:57.003366 env[1214]: time="2024-07-02T00:54:57.003259382Z" level=info msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.068 [INFO][3480] k8s.go 608: Cleaning up netns ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.069 [INFO][3480] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" iface="eth0" netns="/var/run/netns/cni-7cd11a77-b496-b2af-2964-55972755c2df" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.070 [INFO][3480] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" iface="eth0" netns="/var/run/netns/cni-7cd11a77-b496-b2af-2964-55972755c2df" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.071 [INFO][3480] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" iface="eth0" netns="/var/run/netns/cni-7cd11a77-b496-b2af-2964-55972755c2df" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.071 [INFO][3480] k8s.go 615: Releasing IP address(es) ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.071 [INFO][3480] utils.go 188: Calico CNI releasing IP address ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.152 [INFO][3487] ipam_plugin.go 411: Releasing address using handleID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.152 [INFO][3487] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.152 [INFO][3487] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.161 [WARNING][3487] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.161 [INFO][3487] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.163 [INFO][3487] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:57.166198 env[1214]: 2024-07-02 00:54:57.164 [INFO][3480] k8s.go 621: Teardown processing complete. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:54:57.168002 env[1214]: time="2024-07-02T00:54:57.167647869Z" level=info msg="TearDown network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" successfully" Jul 2 00:54:57.168002 env[1214]: time="2024-07-02T00:54:57.167691789Z" level=info msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" returns successfully" Jul 2 00:54:57.168056 kubelet[2063]: E0702 00:54:57.168018 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:57.168370 systemd[1]: run-netns-cni\x2d7cd11a77\x2db496\x2db2af\x2d2964\x2d55972755c2df.mount: Deactivated successfully. Jul 2 00:54:57.169839 env[1214]: time="2024-07-02T00:54:57.169734803Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mwnbm,Uid:09f2169c-1b4a-4699-9fe1-6a320d31b42d,Namespace:kube-system,Attempt:1,}" Jul 2 00:54:57.315087 systemd-networkd[1042]: calideaf3933c33: Link UP Jul 2 00:54:57.317201 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:54:57.317296 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calideaf3933c33: link becomes ready Jul 2 00:54:57.317246 systemd-networkd[1042]: calideaf3933c33: Gained carrier Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.214 [INFO][3510] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.233 [INFO][3510] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--mwnbm-eth0 coredns-76f75df574- kube-system 09f2169c-1b4a-4699-9fe1-6a320d31b42d 814 0 2024-07-02 00:54:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-mwnbm eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calideaf3933c33 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.233 [INFO][3510] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.269 [INFO][3533] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" HandleID="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.279 [INFO][3533] ipam_plugin.go 264: Auto assigning IP ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" HandleID="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400004d2e0), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-mwnbm", "timestamp":"2024-07-02 00:54:57.269129845 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.279 [INFO][3533] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.279 [INFO][3533] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.279 [INFO][3533] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.281 [INFO][3533] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.287 [INFO][3533] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.294 [INFO][3533] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.295 [INFO][3533] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.297 [INFO][3533] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.297 [INFO][3533] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.299 [INFO][3533] ipam.go 1685: Creating new handle: k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.302 [INFO][3533] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.306 [INFO][3533] ipam.go 1216: Successfully claimed IPs: [192.168.88.129/26] block=192.168.88.128/26 handle="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.306 [INFO][3533] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.129/26] handle="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" host="localhost" Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.306 [INFO][3533] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:57.328685 env[1214]: 2024-07-02 00:54:57.306 [INFO][3533] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.129/26] IPv6=[] ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" HandleID="k8s-pod-network.932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.308 [INFO][3510] k8s.go 386: Populated endpoint ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mwnbm-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"09f2169c-1b4a-4699-9fe1-6a320d31b42d", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-mwnbm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaf3933c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.308 [INFO][3510] k8s.go 387: Calico CNI using IPs: [192.168.88.129/32] ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.308 [INFO][3510] dataplane_linux.go 68: Setting the host side veth name to calideaf3933c33 ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.317 [INFO][3510] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.317 [INFO][3510] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mwnbm-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"09f2169c-1b4a-4699-9fe1-6a320d31b42d", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b", Pod:"coredns-76f75df574-mwnbm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaf3933c33", MAC:"6e:86:87:9e:bc:01", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:57.329365 env[1214]: 2024-07-02 00:54:57.325 [INFO][3510] k8s.go 500: Wrote updated endpoint to datastore ContainerID="932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b" Namespace="kube-system" Pod="coredns-76f75df574-mwnbm" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:54:57.341742 env[1214]: time="2024-07-02T00:54:57.341678742Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:57.341742 env[1214]: time="2024-07-02T00:54:57.341717662Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:57.341742 env[1214]: time="2024-07-02T00:54:57.341727783Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:57.341963 env[1214]: time="2024-07-02T00:54:57.341931024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b pid=3564 runtime=io.containerd.runc.v2 Jul 2 00:54:57.355691 systemd[1]: Started cri-containerd-932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b.scope. Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit: BPF prog-id=142 op=LOAD Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326362373738383433336431326363323361363331333839336539 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326362373738383433336431326363323361363331333839336539 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.376000 audit: BPF prog-id=143 op=LOAD Jul 2 00:54:57.376000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326362373738383433336431326363323361363331333839336539 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit: BPF prog-id=144 op=LOAD Jul 2 00:54:57.377000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326362373738383433336431326363323361363331333839336539 Jul 2 00:54:57.377000 audit: BPF prog-id=144 op=UNLOAD Jul 2 00:54:57.377000 audit: BPF prog-id=143 op=UNLOAD Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { perfmon } for pid=3574 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit[3574]: AVC avc: denied { bpf } for pid=3574 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.377000 audit: BPF prog-id=145 op=LOAD Jul 2 00:54:57.377000 audit[3574]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3564 pid=3574 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.377000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933326362373738383433336431326363323361363331333839336539 Jul 2 00:54:57.378288 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:54:57.393772 env[1214]: time="2024-07-02T00:54:57.393733939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-mwnbm,Uid:09f2169c-1b4a-4699-9fe1-6a320d31b42d,Namespace:kube-system,Attempt:1,} returns sandbox id \"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b\"" Jul 2 00:54:57.394502 kubelet[2063]: E0702 00:54:57.394482 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:57.396598 env[1214]: time="2024-07-02T00:54:57.396563719Z" level=info msg="CreateContainer within sandbox \"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:54:57.409207 env[1214]: time="2024-07-02T00:54:57.409164365Z" level=info msg="CreateContainer within sandbox \"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"73f3dc44d74760d98ade03f47c79108930f2d553a5e978e8737bc30f54f1c582\"" Jul 2 00:54:57.409610 env[1214]: time="2024-07-02T00:54:57.409584968Z" level=info msg="StartContainer for \"73f3dc44d74760d98ade03f47c79108930f2d553a5e978e8737bc30f54f1c582\"" Jul 2 00:54:57.423937 systemd[1]: Started cri-containerd-73f3dc44d74760d98ade03f47c79108930f2d553a5e978e8737bc30f54f1c582.scope. Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.439000 audit: BPF prog-id=146 op=LOAD Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3564 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663364633434643734373630643938616465303366343763373931 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3564 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663364633434643734373630643938616465303366343763373931 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit: BPF prog-id=147 op=LOAD Jul 2 00:54:57.440000 audit[3605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3564 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663364633434643734373630643938616465303366343763373931 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit: BPF prog-id=148 op=LOAD Jul 2 00:54:57.440000 audit[3605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3564 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663364633434643734373630643938616465303366343763373931 Jul 2 00:54:57.440000 audit: BPF prog-id=148 op=UNLOAD Jul 2 00:54:57.440000 audit: BPF prog-id=147 op=UNLOAD Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { perfmon } for pid=3605 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit[3605]: AVC avc: denied { bpf } for pid=3605 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:57.440000 audit: BPF prog-id=149 op=LOAD Jul 2 00:54:57.440000 audit[3605]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3564 pid=3605 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:57.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3733663364633434643734373630643938616465303366343763373931 Jul 2 00:54:57.456160 env[1214]: time="2024-07-02T00:54:57.456112007Z" level=info msg="StartContainer for \"73f3dc44d74760d98ade03f47c79108930f2d553a5e978e8737bc30f54f1c582\" returns successfully" Jul 2 00:54:58.002670 env[1214]: time="2024-07-02T00:54:58.002619594Z" level=info msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" Jul 2 00:54:58.002872 env[1214]: time="2024-07-02T00:54:58.002680874Z" level=info msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" Jul 2 00:54:58.002933 env[1214]: time="2024-07-02T00:54:58.002617234Z" level=info msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] k8s.go 608: Cleaning up netns ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" iface="eth0" netns="/var/run/netns/cni-49eb6f10-3e7c-760e-1120-a04cb11d8666" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" iface="eth0" netns="/var/run/netns/cni-49eb6f10-3e7c-760e-1120-a04cb11d8666" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" iface="eth0" netns="/var/run/netns/cni-49eb6f10-3e7c-760e-1120-a04cb11d8666" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] k8s.go 615: Releasing IP address(es) ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.046 [INFO][3684] utils.go 188: Calico CNI releasing IP address ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.066 [INFO][3709] ipam_plugin.go 411: Releasing address using handleID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.067 [INFO][3709] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.067 [INFO][3709] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.077 [WARNING][3709] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.077 [INFO][3709] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.086 [INFO][3709] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.093605 env[1214]: 2024-07-02 00:54:58.089 [INFO][3684] k8s.go 621: Teardown processing complete. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:54:58.094422 env[1214]: time="2024-07-02T00:54:58.093736285Z" level=info msg="TearDown network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" successfully" Jul 2 00:54:58.094422 env[1214]: time="2024-07-02T00:54:58.093766925Z" level=info msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" returns successfully" Jul 2 00:54:58.094422 env[1214]: time="2024-07-02T00:54:58.094330689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5856d689df-s98tz,Uid:eac07240-ede1-43ad-b618-d7921e37ca39,Namespace:calico-system,Attempt:1,}" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.074 [INFO][3683] k8s.go 608: Cleaning up netns ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.074 [INFO][3683] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" iface="eth0" netns="/var/run/netns/cni-4842729a-2e70-385b-88a3-2a5822d33ce8" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.075 [INFO][3683] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" iface="eth0" netns="/var/run/netns/cni-4842729a-2e70-385b-88a3-2a5822d33ce8" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.075 [INFO][3683] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" iface="eth0" netns="/var/run/netns/cni-4842729a-2e70-385b-88a3-2a5822d33ce8" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.075 [INFO][3683] k8s.go 615: Releasing IP address(es) ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.075 [INFO][3683] utils.go 188: Calico CNI releasing IP address ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.100 [INFO][3719] ipam_plugin.go 411: Releasing address using handleID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.100 [INFO][3719] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.100 [INFO][3719] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.109 [WARNING][3719] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.109 [INFO][3719] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.111 [INFO][3719] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.117029 env[1214]: 2024-07-02 00:54:58.113 [INFO][3683] k8s.go 621: Teardown processing complete. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:54:58.117489 env[1214]: time="2024-07-02T00:54:58.117180522Z" level=info msg="TearDown network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" successfully" Jul 2 00:54:58.117489 env[1214]: time="2024-07-02T00:54:58.117217803Z" level=info msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" returns successfully" Jul 2 00:54:58.119682 kubelet[2063]: E0702 00:54:58.117788 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:58.119901 env[1214]: time="2024-07-02T00:54:58.118102529Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-fxp76,Uid:1dafe043-8e09-41e8-8461-235c56ab0198,Namespace:kube-system,Attempt:1,}" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] k8s.go 608: Cleaning up netns ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" iface="eth0" netns="/var/run/netns/cni-b6ff32b5-4893-d397-bd83-31f54316809c" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" iface="eth0" netns="/var/run/netns/cni-b6ff32b5-4893-d397-bd83-31f54316809c" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" iface="eth0" netns="/var/run/netns/cni-b6ff32b5-4893-d397-bd83-31f54316809c" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] k8s.go 615: Releasing IP address(es) ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.085 [INFO][3694] utils.go 188: Calico CNI releasing IP address ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.122 [INFO][3726] ipam_plugin.go 411: Releasing address using handleID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.123 [INFO][3726] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.123 [INFO][3726] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.133 [WARNING][3726] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.133 [INFO][3726] ipam_plugin.go 439: Releasing address using workloadID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.134 [INFO][3726] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.137928 env[1214]: 2024-07-02 00:54:58.136 [INFO][3694] k8s.go 621: Teardown processing complete. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:54:58.138368 env[1214]: time="2024-07-02T00:54:58.138042342Z" level=info msg="TearDown network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" successfully" Jul 2 00:54:58.138368 env[1214]: time="2024-07-02T00:54:58.138071463Z" level=info msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" returns successfully" Jul 2 00:54:58.139077 env[1214]: time="2024-07-02T00:54:58.138963508Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rk75r,Uid:53f96a20-2bb3-4586-9b6d-4a3d96d028e2,Namespace:calico-system,Attempt:1,}" Jul 2 00:54:58.171445 systemd[1]: run-containerd-runc-k8s.io-932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b-runc.Y9qsWD.mount: Deactivated successfully. Jul 2 00:54:58.171551 systemd[1]: run-netns-cni\x2db6ff32b5\x2d4893\x2dd397\x2dbd83\x2d31f54316809c.mount: Deactivated successfully. Jul 2 00:54:58.171600 systemd[1]: run-netns-cni\x2d49eb6f10\x2d3e7c\x2d760e\x2d1120\x2da04cb11d8666.mount: Deactivated successfully. Jul 2 00:54:58.171645 systemd[1]: run-netns-cni\x2d4842729a\x2d2e70\x2d385b\x2d88a3\x2d2a5822d33ce8.mount: Deactivated successfully. Jul 2 00:54:58.194895 kubelet[2063]: E0702 00:54:58.194116 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:58.227474 kubelet[2063]: I0702 00:54:58.227162 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-mwnbm" podStartSLOduration=30.22712194 podStartE2EDuration="30.22712194s" podCreationTimestamp="2024-07-02 00:54:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:58.208929178 +0000 UTC m=+45.302461925" watchObservedRunningTime="2024-07-02 00:54:58.22712194 +0000 UTC m=+45.320654687" Jul 2 00:54:58.232000 audit[3800]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=3800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:58.232000 audit[3800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5908 a0=3 a1=ffffdc3fbf70 a2=0 a3=1 items=0 ppid=2257 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:58.232000 audit[3800]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=3800 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:58.232000 audit[3800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2700 a0=3 a1=ffffdc3fbf70 a2=0 a3=1 items=0 ppid=2257 pid=3800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:58.249000 audit[3810]: NETFILTER_CFG table=filter:97 family=2 entries=13 op=nft_register_rule pid=3810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:58.249000 audit[3810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc13e3450 a2=0 a3=1 items=0 ppid=2257 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.249000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:58.256000 audit[3810]: NETFILTER_CFG table=nat:98 family=2 entries=33 op=nft_register_chain pid=3810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:58.256000 audit[3810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffc13e3450 a2=0 a3=1 items=0 ppid=2257 pid=3810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:58.343811 systemd-networkd[1042]: califf3507f9e30: Link UP Jul 2 00:54:58.345737 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Jul 2 00:54:58.345822 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califf3507f9e30: link becomes ready Jul 2 00:54:58.345870 systemd-networkd[1042]: califf3507f9e30: Gained carrier Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.139 [INFO][3733] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.156 [INFO][3733] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0 calico-kube-controllers-5856d689df- calico-system eac07240-ede1-43ad-b618-d7921e37ca39 828 0 2024-07-02 00:54:34 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5856d689df projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s localhost calico-kube-controllers-5856d689df-s98tz eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califf3507f9e30 [] []}} ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.156 [INFO][3733] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.231 [INFO][3786] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" HandleID="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.301 [INFO][3786] ipam_plugin.go 264: Auto assigning IP ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" HandleID="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000639a10), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"calico-kube-controllers-5856d689df-s98tz", "timestamp":"2024-07-02 00:54:58.23156589 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.302 [INFO][3786] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.302 [INFO][3786] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.304 [INFO][3786] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.308 [INFO][3786] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.312 [INFO][3786] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.319 [INFO][3786] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.321 [INFO][3786] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.324 [INFO][3786] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.324 [INFO][3786] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.326 [INFO][3786] ipam.go 1685: Creating new handle: k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800 Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.330 [INFO][3786] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.334 [INFO][3786] ipam.go 1216: Successfully claimed IPs: [192.168.88.130/26] block=192.168.88.128/26 handle="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.334 [INFO][3786] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.130/26] handle="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" host="localhost" Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.335 [INFO][3786] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.358685 env[1214]: 2024-07-02 00:54:58.335 [INFO][3786] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.130/26] IPv6=[] ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" HandleID="k8s-pod-network.3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.337 [INFO][3733] k8s.go 386: Populated endpoint ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0", GenerateName:"calico-kube-controllers-5856d689df-", Namespace:"calico-system", SelfLink:"", UID:"eac07240-ede1-43ad-b618-d7921e37ca39", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5856d689df", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"calico-kube-controllers-5856d689df-s98tz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf3507f9e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.337 [INFO][3733] k8s.go 387: Calico CNI using IPs: [192.168.88.130/32] ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.337 [INFO][3733] dataplane_linux.go 68: Setting the host side veth name to califf3507f9e30 ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.347 [INFO][3733] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.348 [INFO][3733] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0", GenerateName:"calico-kube-controllers-5856d689df-", Namespace:"calico-system", SelfLink:"", UID:"eac07240-ede1-43ad-b618-d7921e37ca39", ResourceVersion:"828", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5856d689df", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800", Pod:"calico-kube-controllers-5856d689df-s98tz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf3507f9e30", MAC:"22:a3:3a:b8:11:dc", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.359251 env[1214]: 2024-07-02 00:54:58.356 [INFO][3733] k8s.go 500: Wrote updated endpoint to datastore ContainerID="3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800" Namespace="calico-system" Pod="calico-kube-controllers-5856d689df-s98tz" WorkloadEndpoint="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:54:58.378221 env[1214]: time="2024-07-02T00:54:58.378130993Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:58.378221 env[1214]: time="2024-07-02T00:54:58.378211833Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:58.378399 env[1214]: time="2024-07-02T00:54:58.378237994Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:58.378681 env[1214]: time="2024-07-02T00:54:58.378514795Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800 pid=3847 runtime=io.containerd.runc.v2 Jul 2 00:54:58.381563 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali90d0863e34b: link becomes ready Jul 2 00:54:58.383497 systemd-networkd[1042]: cali90d0863e34b: Link UP Jul 2 00:54:58.383699 systemd-networkd[1042]: cali90d0863e34b: Gained carrier Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.161 [INFO][3748] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.178 [INFO][3748] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-coredns--76f75df574--fxp76-eth0 coredns-76f75df574- kube-system 1dafe043-8e09-41e8-8461-235c56ab0198 829 0 2024-07-02 00:54:28 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s localhost coredns-76f75df574-fxp76 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali90d0863e34b [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.178 [INFO][3748] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.248 [INFO][3791] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" HandleID="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.303 [INFO][3791] ipam_plugin.go 264: Auto assigning IP ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" HandleID="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000114980), Attrs:map[string]string{"namespace":"kube-system", "node":"localhost", "pod":"coredns-76f75df574-fxp76", "timestamp":"2024-07-02 00:54:58.2479808 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.303 [INFO][3791] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.334 [INFO][3791] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.334 [INFO][3791] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.338 [INFO][3791] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.347 [INFO][3791] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.352 [INFO][3791] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.353 [INFO][3791] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.358 [INFO][3791] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.359 [INFO][3791] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.360 [INFO][3791] ipam.go 1685: Creating new handle: k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.363 [INFO][3791] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.371 [INFO][3791] ipam.go 1216: Successfully claimed IPs: [192.168.88.131/26] block=192.168.88.128/26 handle="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.372 [INFO][3791] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.131/26] handle="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" host="localhost" Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.372 [INFO][3791] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.393054 env[1214]: 2024-07-02 00:54:58.372 [INFO][3791] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.131/26] IPv6=[] ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" HandleID="k8s-pod-network.530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.377 [INFO][3748] k8s.go 386: Populated endpoint ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--fxp76-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1dafe043-8e09-41e8-8461-235c56ab0198", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"coredns-76f75df574-fxp76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90d0863e34b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.378 [INFO][3748] k8s.go 387: Calico CNI using IPs: [192.168.88.131/32] ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.378 [INFO][3748] dataplane_linux.go 68: Setting the host side veth name to cali90d0863e34b ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.380 [INFO][3748] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.381 [INFO][3748] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--fxp76-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1dafe043-8e09-41e8-8461-235c56ab0198", ResourceVersion:"829", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f", Pod:"coredns-76f75df574-fxp76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90d0863e34b", MAC:"ae:ec:b6:0d:19:7a", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.393871 env[1214]: 2024-07-02 00:54:58.388 [INFO][3748] k8s.go 500: Wrote updated endpoint to datastore ContainerID="530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f" Namespace="kube-system" Pod="coredns-76f75df574-fxp76" WorkloadEndpoint="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:54:58.415511 env[1214]: time="2024-07-02T00:54:58.415420643Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:58.415654 env[1214]: time="2024-07-02T00:54:58.415511524Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:58.415654 env[1214]: time="2024-07-02T00:54:58.415561484Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:58.415773 env[1214]: time="2024-07-02T00:54:58.415737445Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f pid=3889 runtime=io.containerd.runc.v2 Jul 2 00:54:58.416628 systemd[1]: run-containerd-runc-k8s.io-3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800-runc.AmjgK8.mount: Deactivated successfully. Jul 2 00:54:58.418190 systemd[1]: Started cri-containerd-3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800.scope. Jul 2 00:54:58.426328 systemd[1]: Started cri-containerd-530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f.scope. Jul 2 00:54:58.432507 systemd-networkd[1042]: calif76f8847ad0: Link UP Jul 2 00:54:58.432714 systemd-networkd[1042]: calif76f8847ad0: Gained carrier Jul 2 00:54:58.433569 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif76f8847ad0: link becomes ready Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.188 [INFO][3767] utils.go 100: File /var/lib/calico/mtu does not exist Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.208 [INFO][3767] plugin.go 326: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {localhost-k8s-csi--node--driver--rk75r-eth0 csi-node-driver- calico-system 53f96a20-2bb3-4586-9b6d-4a3d96d028e2 830 0 2024-07-02 00:54:34 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7d7f6c786c k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s localhost csi-node-driver-rk75r eth0 default [] [] [kns.calico-system ksa.calico-system.default] calif76f8847ad0 [] []}} ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.208 [INFO][3767] k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.330 [INFO][3819] ipam_plugin.go 224: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" HandleID="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.350 [INFO][3819] ipam_plugin.go 264: Auto assigning IP ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" HandleID="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002f5d90), Attrs:map[string]string{"namespace":"calico-system", "node":"localhost", "pod":"csi-node-driver-rk75r", "timestamp":"2024-07-02 00:54:58.330480793 +0000 UTC"}, Hostname:"localhost", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.350 [INFO][3819] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.372 [INFO][3819] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.372 [INFO][3819] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'localhost' Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.374 [INFO][3819] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.377 [INFO][3819] ipam.go 372: Looking up existing affinities for host host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.394 [INFO][3819] ipam.go 489: Trying affinity for 192.168.88.128/26 host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.396 [INFO][3819] ipam.go 155: Attempting to load block cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.398 [INFO][3819] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.88.128/26 host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.401 [INFO][3819] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.88.128/26 handle="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.403 [INFO][3819] ipam.go 1685: Creating new handle: k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5 Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.408 [INFO][3819] ipam.go 1203: Writing block in order to claim IPs block=192.168.88.128/26 handle="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.415 [INFO][3819] ipam.go 1216: Successfully claimed IPs: [192.168.88.132/26] block=192.168.88.128/26 handle="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.415 [INFO][3819] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.88.132/26] handle="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" host="localhost" Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.415 [INFO][3819] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:54:58.453673 env[1214]: 2024-07-02 00:54:58.415 [INFO][3819] ipam_plugin.go 282: Calico CNI IPAM assigned addresses IPv4=[192.168.88.132/26] IPv6=[] ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" HandleID="k8s-pod-network.76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.429 [INFO][3767] k8s.go 386: Populated endpoint ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rk75r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"53f96a20-2bb3-4586-9b6d-4a3d96d028e2", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"", Pod:"csi-node-driver-rk75r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif76f8847ad0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.429 [INFO][3767] k8s.go 387: Calico CNI using IPs: [192.168.88.132/32] ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.429 [INFO][3767] dataplane_linux.go 68: Setting the host side veth name to calif76f8847ad0 ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.433 [INFO][3767] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.433 [INFO][3767] k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rk75r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"53f96a20-2bb3-4586-9b6d-4a3d96d028e2", ResourceVersion:"830", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5", Pod:"csi-node-driver-rk75r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif76f8847ad0", MAC:"6e:5d:09:54:ef:30", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:54:58.454497 env[1214]: 2024-07-02 00:54:58.448 [INFO][3767] k8s.go 500: Wrote updated endpoint to datastore ContainerID="76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5" Namespace="calico-system" Pod="csi-node-driver-rk75r" WorkloadEndpoint="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.469000 audit: BPF prog-id=150 op=LOAD Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343262363064366237366363613461313637336361346538383065 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343262363064366237366363613461313637336361346538383065 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.470000 audit: BPF prog-id=151 op=LOAD Jul 2 00:54:58.470000 audit[3859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.470000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343262363064366237366363613461313637336361346538383065 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit: BPF prog-id=152 op=LOAD Jul 2 00:54:58.472000 audit[3859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343262363064366237366363613461313637336361346538383065 Jul 2 00:54:58.472000 audit: BPF prog-id=152 op=UNLOAD Jul 2 00:54:58.472000 audit: BPF prog-id=151 op=UNLOAD Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { perfmon } for pid=3859 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit[3859]: AVC avc: denied { bpf } for pid=3859 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.472000 audit: BPF prog-id=153 op=LOAD Jul 2 00:54:58.472000 audit[3859]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3847 pid=3859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.472000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363343262363064366237366363613461313637336361346538383065 Jul 2 00:54:58.481456 env[1214]: time="2024-07-02T00:54:58.481088603Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Jul 2 00:54:58.481456 env[1214]: time="2024-07-02T00:54:58.481131844Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Jul 2 00:54:58.481456 env[1214]: time="2024-07-02T00:54:58.481142444Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Jul 2 00:54:58.481456 env[1214]: time="2024-07-02T00:54:58.481356605Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5 pid=3939 runtime=io.containerd.runc.v2 Jul 2 00:54:58.484947 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.486000 audit: BPF prog-id=154 op=LOAD Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000147b38 a2=10 a3=0 items=0 ppid=3889 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533303534326637323536663061356234383931386133336131323939 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=3889 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533303534326637323536663061356234383931386133336131323939 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.487000 audit: BPF prog-id=155 op=LOAD Jul 2 00:54:58.487000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=3889 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.487000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533303534326637323536663061356234383931386133336131323939 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit: BPF prog-id=156 op=LOAD Jul 2 00:54:58.488000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=3889 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533303534326637323536663061356234383931386133336131323939 Jul 2 00:54:58.488000 audit: BPF prog-id=156 op=UNLOAD Jul 2 00:54:58.488000 audit: BPF prog-id=155 op=UNLOAD Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { perfmon } for pid=3898 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit[3898]: AVC avc: denied { bpf } for pid=3898 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.488000 audit: BPF prog-id=157 op=LOAD Jul 2 00:54:58.488000 audit[3898]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=3889 pid=3898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3533303534326637323536663061356234383931386133336131323939 Jul 2 00:54:58.490792 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:54:58.501842 systemd[1]: Started cri-containerd-76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5.scope. Jul 2 00:54:58.508987 env[1214]: time="2024-07-02T00:54:58.508547068Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-fxp76,Uid:1dafe043-8e09-41e8-8461-235c56ab0198,Namespace:kube-system,Attempt:1,} returns sandbox id \"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f\"" Jul 2 00:54:58.512897 kubelet[2063]: E0702 00:54:58.512869 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:58.513835 env[1214]: time="2024-07-02T00:54:58.513795263Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5856d689df-s98tz,Uid:eac07240-ede1-43ad-b618-d7921e37ca39,Namespace:calico-system,Attempt:1,} returns sandbox id \"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800\"" Jul 2 00:54:58.516332 env[1214]: time="2024-07-02T00:54:58.516292760Z" level=info msg="CreateContainer within sandbox \"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Jul 2 00:54:58.518079 env[1214]: time="2024-07-02T00:54:58.518021331Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\"" Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.528000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit: BPF prog-id=158 op=LOAD Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=3939 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736626361323930663363373161373238383837373232633962383138 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3939 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736626361323930663363373161373238383837373232633962383138 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.529000 audit: BPF prog-id=159 op=LOAD Jul 2 00:54:58.529000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3939 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.529000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736626361323930663363373161373238383837373232633962383138 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.530000 audit: BPF prog-id=160 op=LOAD Jul 2 00:54:58.530000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3939 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.530000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736626361323930663363373161373238383837373232633962383138 Jul 2 00:54:58.530000 audit: BPF prog-id=160 op=UNLOAD Jul 2 00:54:58.530000 audit: BPF prog-id=159 op=UNLOAD Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { perfmon } for pid=3948 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit[3948]: AVC avc: denied { bpf } for pid=3948 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.531000 audit: BPF prog-id=161 op=LOAD Jul 2 00:54:58.531000 audit[3948]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3939 pid=3948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.531000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736626361323930663363373161373238383837373232633962383138 Jul 2 00:54:58.532642 systemd-resolved[1155]: Failed to determine the local hostname and LLMNR/mDNS names, ignoring: No such device or address Jul 2 00:54:58.542342 env[1214]: time="2024-07-02T00:54:58.542287934Z" level=info msg="CreateContainer within sandbox \"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"4ec43c022e33f8dd608b84f105aa6c34b054081ecb8ce6cce477283c8bf59829\"" Jul 2 00:54:58.542941 env[1214]: time="2024-07-02T00:54:58.542909738Z" level=info msg="StartContainer for \"4ec43c022e33f8dd608b84f105aa6c34b054081ecb8ce6cce477283c8bf59829\"" Jul 2 00:54:58.545693 env[1214]: time="2024-07-02T00:54:58.545644437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-rk75r,Uid:53f96a20-2bb3-4586-9b6d-4a3d96d028e2,Namespace:calico-system,Attempt:1,} returns sandbox id \"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5\"" Jul 2 00:54:58.559875 systemd[1]: Started cri-containerd-4ec43c022e33f8dd608b84f105aa6c34b054081ecb8ce6cce477283c8bf59829.scope. Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.582000 audit: BPF prog-id=162 op=LOAD Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3889 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465633433633032326533336638646436303862383466313035616136 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3889 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465633433633032326533336638646436303862383466313035616136 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit: BPF prog-id=163 op=LOAD Jul 2 00:54:58.583000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3889 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465633433633032326533336638646436303862383466313035616136 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit: BPF prog-id=164 op=LOAD Jul 2 00:54:58.583000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=19 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3889 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465633433633032326533336638646436303862383466313035616136 Jul 2 00:54:58.583000 audit: BPF prog-id=164 op=UNLOAD Jul 2 00:54:58.583000 audit: BPF prog-id=163 op=UNLOAD Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:54:58.583000 audit: BPF prog-id=165 op=LOAD Jul 2 00:54:58.583000 audit[3995]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3889 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:58.583000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3465633433633032326533336638646436303862383466313035616136 Jul 2 00:54:58.596522 env[1214]: time="2024-07-02T00:54:58.596467057Z" level=info msg="StartContainer for \"4ec43c022e33f8dd608b84f105aa6c34b054081ecb8ce6cce477283c8bf59829\" returns successfully" Jul 2 00:54:58.893643 systemd-networkd[1042]: calideaf3933c33: Gained IPv6LL Jul 2 00:54:59.197537 kubelet[2063]: E0702 00:54:59.197435 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:59.201246 kubelet[2063]: E0702 00:54:59.201205 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:54:59.221923 kubelet[2063]: I0702 00:54:59.221878 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-fxp76" podStartSLOduration=31.221835182 podStartE2EDuration="31.221835182s" podCreationTimestamp="2024-07-02 00:54:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-07-02 00:54:59.212273559 +0000 UTC m=+46.305806306" watchObservedRunningTime="2024-07-02 00:54:59.221835182 +0000 UTC m=+46.315367929" Jul 2 00:54:59.222000 audit[4032]: NETFILTER_CFG table=filter:99 family=2 entries=10 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:59.225025 kernel: kauditd_printk_skb: 377 callbacks suppressed Jul 2 00:54:59.225204 kernel: audit: type=1325 audit(1719881699.222:1163): table=filter:99 family=2 entries=10 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:59.225244 kernel: audit: type=1300 audit(1719881699.222:1163): arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc852cde0 a2=0 a3=1 items=0 ppid=2257 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.222000 audit[4032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffc852cde0 a2=0 a3=1 items=0 ppid=2257 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:59.229680 kernel: audit: type=1327 audit(1719881699.222:1163): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:59.222000 audit[4032]: NETFILTER_CFG table=nat:100 family=2 entries=42 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:59.222000 audit[4032]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffc852cde0 a2=0 a3=1 items=0 ppid=2257 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.237873 kernel: audit: type=1325 audit(1719881699.222:1164): table=nat:100 family=2 entries=42 op=nft_register_rule pid=4032 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:54:59.237973 kernel: audit: type=1300 audit(1719881699.222:1164): arch=c00000b7 syscall=211 success=yes exit=13428 a0=3 a1=ffffc852cde0 a2=0 a3=1 items=0 ppid=2257 pid=4032 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.237997 kernel: audit: type=1327 audit(1719881699.222:1164): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:59.222000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:54:59.407819 systemd-networkd[1042]: califf3507f9e30: Gained IPv6LL Jul 2 00:54:59.452218 systemd[1]: Started sshd@12-10.0.0.92:22-10.0.0.1:37760.service. Jul 2 00:54:59.451000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.92:22-10.0.0.1:37760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.455553 kernel: audit: type=1130 audit(1719881699.451:1165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.92:22-10.0.0.1:37760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.494000 audit[4055]: USER_ACCT pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.497614 sshd[4055]: Accepted publickey for core from 10.0.0.1 port 37760 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:59.498556 kernel: audit: type=1101 audit(1719881699.494:1166): pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.498612 kernel: audit: type=1103 audit(1719881699.497:1167): pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.497000 audit[4055]: CRED_ACQ pid=4055 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.502162 kernel: audit: type=1006 audit(1719881699.500:1168): pid=4055 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Jul 2 00:54:59.500000 audit[4055]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0a81350 a2=3 a3=1 items=0 ppid=1 pid=4055 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.500000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:59.502767 sshd[4055]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:59.506096 systemd-logind[1205]: New session 13 of user core. Jul 2 00:54:59.506930 systemd[1]: Started session-13.scope. Jul 2 00:54:59.510000 audit[4055]: USER_START pid=4055 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.511000 audit[4057]: CRED_ACQ pid=4057 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.533869 systemd-networkd[1042]: calif76f8847ad0: Gained IPv6LL Jul 2 00:54:59.646194 sshd[4055]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:59.646000 audit[4055]: USER_END pid=4055 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.646000 audit[4055]: CRED_DISP pid=4055 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.649818 systemd[1]: Started sshd@13-10.0.0.92:22-10.0.0.1:37774.service. Jul 2 00:54:59.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.92:22-10.0.0.1:37774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.650474 systemd[1]: sshd@12-10.0.0.92:22-10.0.0.1:37760.service: Deactivated successfully. Jul 2 00:54:59.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.0.0.92:22-10.0.0.1:37760 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.651312 systemd[1]: session-13.scope: Deactivated successfully. Jul 2 00:54:59.651861 systemd-logind[1205]: Session 13 logged out. Waiting for processes to exit. Jul 2 00:54:59.652760 systemd-logind[1205]: Removed session 13. Jul 2 00:54:59.683000 audit[4068]: USER_ACCT pid=4068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.685454 sshd[4068]: Accepted publickey for core from 10.0.0.1 port 37774 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:59.685000 audit[4068]: CRED_ACQ pid=4068 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.685000 audit[4068]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc0e39500 a2=3 a3=1 items=0 ppid=1 pid=4068 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.685000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:59.686025 sshd[4068]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:59.689866 systemd-logind[1205]: New session 14 of user core. Jul 2 00:54:59.690714 systemd[1]: Started session-14.scope. Jul 2 00:54:59.694000 audit[4068]: USER_START pid=4068 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.695000 audit[4071]: CRED_ACQ pid=4071 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.910661 sshd[4068]: pam_unix(sshd:session): session closed for user core Jul 2 00:54:59.911000 audit[4068]: USER_END pid=4068 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.911000 audit[4068]: CRED_DISP pid=4068 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.913000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.92:22-10.0.0.1:37786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.913718 systemd[1]: Started sshd@14-10.0.0.92:22-10.0.0.1:37786.service. Jul 2 00:54:59.917442 systemd-logind[1205]: Session 14 logged out. Waiting for processes to exit. Jul 2 00:54:59.920000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.0.0.92:22-10.0.0.1:37774 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:54:59.920859 systemd[1]: sshd@13-10.0.0.92:22-10.0.0.1:37774.service: Deactivated successfully. Jul 2 00:54:59.921519 systemd[1]: session-14.scope: Deactivated successfully. Jul 2 00:54:59.922445 systemd-logind[1205]: Removed session 14. Jul 2 00:54:59.972602 env[1214]: time="2024-07-02T00:54:59.972560913Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:59.974462 env[1214]: time="2024-07-02T00:54:59.974415965Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:59.975875 env[1214]: time="2024-07-02T00:54:59.975761774Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:59.977110 env[1214]: time="2024-07-02T00:54:59.977081223Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:c35e88abef622483409fff52313bf764a75095197be4c5a7c7830da342654de1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:54:59.977572 env[1214]: time="2024-07-02T00:54:59.977545426Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.28.0\" returns image reference \"sha256:89df47edb6965978d3683de1cac38ee5b47d7054332bbea7cc0ef3b3c17da2e1\"" Jul 2 00:54:59.978989 env[1214]: time="2024-07-02T00:54:59.978901475Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\"" Jul 2 00:54:59.986000 audit[4081]: USER_ACCT pid=4081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.987702 sshd[4081]: Accepted publickey for core from 10.0.0.1 port 37786 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:54:59.991000 audit[4081]: CRED_ACQ pid=4081 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:54:59.992384 env[1214]: time="2024-07-02T00:54:59.992274322Z" level=info msg="CreateContainer within sandbox \"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Jul 2 00:54:59.992000 audit[4081]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe85abae0 a2=3 a3=1 items=0 ppid=1 pid=4081 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:54:59.992000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:54:59.993026 sshd[4081]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:54:59.999428 systemd-logind[1205]: New session 15 of user core. Jul 2 00:55:00.000474 systemd[1]: Started session-15.scope. Jul 2 00:55:00.006769 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3024871291.mount: Deactivated successfully. Jul 2 00:55:00.009944 env[1214]: time="2024-07-02T00:55:00.009903037Z" level=info msg="CreateContainer within sandbox \"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"fa1e20566599a6c18b348acde8790a7432a15933cd9c5063cf85fbf5f95993e7\"" Jul 2 00:55:00.009000 audit[4081]: USER_START pid=4081 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:00.011251 env[1214]: time="2024-07-02T00:55:00.010725162Z" level=info msg="StartContainer for \"fa1e20566599a6c18b348acde8790a7432a15933cd9c5063cf85fbf5f95993e7\"" Jul 2 00:55:00.011000 audit[4086]: CRED_ACQ pid=4086 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:00.027876 systemd[1]: Started cri-containerd-fa1e20566599a6c18b348acde8790a7432a15933cd9c5063cf85fbf5f95993e7.scope. Jul 2 00:55:00.046000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit: BPF prog-id=166 op=LOAD Jul 2 00:55:00.047000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.047000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3847 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316532303536363539396136633138623334386163646538373930 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3847 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316532303536363539396136633138623334386163646538373930 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit: BPF prog-id=167 op=LOAD Jul 2 00:55:00.048000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3847 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316532303536363539396136633138623334386163646538373930 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.048000 audit: BPF prog-id=168 op=LOAD Jul 2 00:55:00.048000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3847 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316532303536363539396136633138623334386163646538373930 Jul 2 00:55:00.049000 audit: BPF prog-id=168 op=UNLOAD Jul 2 00:55:00.049000 audit: BPF prog-id=167 op=UNLOAD Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { perfmon } for pid=4093 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit[4093]: AVC avc: denied { bpf } for pid=4093 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:00.049000 audit: BPF prog-id=169 op=LOAD Jul 2 00:55:00.049000 audit[4093]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3847 pid=4093 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6661316532303536363539396136633138623334386163646538373930 Jul 2 00:55:00.071192 env[1214]: time="2024-07-02T00:55:00.071147351Z" level=info msg="StartContainer for \"fa1e20566599a6c18b348acde8790a7432a15933cd9c5063cf85fbf5f95993e7\" returns successfully" Jul 2 00:55:00.205797 kubelet[2063]: E0702 00:55:00.205187 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:00.205797 kubelet[2063]: E0702 00:55:00.205575 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:00.214079 kubelet[2063]: I0702 00:55:00.213957 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5856d689df-s98tz" podStartSLOduration=24.752428522 podStartE2EDuration="26.21391607s" podCreationTimestamp="2024-07-02 00:54:34 +0000 UTC" firstStartedPulling="2024-07-02 00:54:58.516683842 +0000 UTC m=+45.610216589" lastFinishedPulling="2024-07-02 00:54:59.97817139 +0000 UTC m=+47.071704137" observedRunningTime="2024-07-02 00:55:00.212935864 +0000 UTC m=+47.306468611" watchObservedRunningTime="2024-07-02 00:55:00.21391607 +0000 UTC m=+47.307448817" Jul 2 00:55:00.242000 audit[4129]: NETFILTER_CFG table=filter:101 family=2 entries=10 op=nft_register_rule pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:00.242000 audit[4129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffd52151d0 a2=0 a3=1 items=0 ppid=2257 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.242000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:00.256000 audit[4129]: NETFILTER_CFG table=nat:102 family=2 entries=54 op=nft_register_chain pid=4129 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:00.256000 audit[4129]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19092 a0=3 a1=ffffd52151d0 a2=0 a3=1 items=0 ppid=2257 pid=4129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:00.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:00.366941 systemd-networkd[1042]: cali90d0863e34b: Gained IPv6LL Jul 2 00:55:01.012870 env[1214]: time="2024-07-02T00:55:01.012820692Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:01.014398 env[1214]: time="2024-07-02T00:55:01.014365742Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:01.015624 env[1214]: time="2024-07-02T00:55:01.015586189Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:01.017133 env[1214]: time="2024-07-02T00:55:01.017105839Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:ac5f0089ad8eab325e5d16a59536f9292619adf16736b1554a439a66d543a63d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:01.017654 env[1214]: time="2024-07-02T00:55:01.017628562Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.28.0\" returns image reference \"sha256:94ad0dc71bacd91f470c20e61073c2dc00648fd583c0fb95657dee38af05e5ed\"" Jul 2 00:55:01.019343 env[1214]: time="2024-07-02T00:55:01.019315493Z" level=info msg="CreateContainer within sandbox \"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Jul 2 00:55:01.029630 env[1214]: time="2024-07-02T00:55:01.029594558Z" level=info msg="CreateContainer within sandbox \"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"bc570f158e62dd21b7c3a0b84ae767e1c05ae19b284ac5658b12fca3dcbd2c0f\"" Jul 2 00:55:01.033624 env[1214]: time="2024-07-02T00:55:01.032271175Z" level=info msg="StartContainer for \"bc570f158e62dd21b7c3a0b84ae767e1c05ae19b284ac5658b12fca3dcbd2c0f\"" Jul 2 00:55:01.054979 systemd[1]: Started cri-containerd-bc570f158e62dd21b7c3a0b84ae767e1c05ae19b284ac5658b12fca3dcbd2c0f.scope. Jul 2 00:55:01.097000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.097000 audit[4168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=3939 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353730663135386536326464323162376333613062383461653736 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit: BPF prog-id=170 op=LOAD Jul 2 00:55:01.098000 audit[4168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=3939 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353730663135386536326464323162376333613062383461653736 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.098000 audit: BPF prog-id=171 op=LOAD Jul 2 00:55:01.098000 audit[4168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=3939 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353730663135386536326464323162376333613062383461653736 Jul 2 00:55:01.099000 audit: BPF prog-id=171 op=UNLOAD Jul 2 00:55:01.099000 audit: BPF prog-id=170 op=UNLOAD Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { perfmon } for pid=4168 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit[4168]: AVC avc: denied { bpf } for pid=4168 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:01.099000 audit: BPF prog-id=172 op=LOAD Jul 2 00:55:01.099000 audit[4168]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=3939 pid=4168 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.099000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263353730663135386536326464323162376333613062383461653736 Jul 2 00:55:01.112500 env[1214]: time="2024-07-02T00:55:01.110648350Z" level=info msg="StartContainer for \"bc570f158e62dd21b7c3a0b84ae767e1c05ae19b284ac5658b12fca3dcbd2c0f\" returns successfully" Jul 2 00:55:01.115946 env[1214]: time="2024-07-02T00:55:01.113641489Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\"" Jul 2 00:55:01.208051 kubelet[2063]: E0702 00:55:01.207755 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:01.209471 kubelet[2063]: I0702 00:55:01.208894 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:55:01.398000 audit[4196]: NETFILTER_CFG table=filter:103 family=2 entries=22 op=nft_register_rule pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:01.398000 audit[4196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=12604 a0=3 a1=ffffe22fb950 a2=0 a3=1 items=0 ppid=2257 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:01.399000 audit[4196]: NETFILTER_CFG table=nat:104 family=2 entries=18 op=nft_register_rule pid=4196 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:01.399000 audit[4196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5004 a0=3 a1=ffffe22fb950 a2=0 a3=1 items=0 ppid=2257 pid=4196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.399000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:01.406683 sshd[4081]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:01.409366 systemd[1]: Started sshd@15-10.0.0.92:22-10.0.0.1:35298.service. Jul 2 00:55:01.408000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.92:22-10.0.0.1:35298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:01.410000 audit[4081]: USER_END pid=4081 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.410000 audit[4081]: CRED_DISP pid=4081 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.412766 systemd[1]: sshd@14-10.0.0.92:22-10.0.0.1:37786.service: Deactivated successfully. Jul 2 00:55:01.412000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.0.0.92:22-10.0.0.1:37786 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:01.413705 systemd[1]: session-15.scope: Deactivated successfully. Jul 2 00:55:01.414866 systemd-logind[1205]: Session 15 logged out. Waiting for processes to exit. Jul 2 00:55:01.415731 systemd-logind[1205]: Removed session 15. Jul 2 00:55:01.442000 audit[4198]: USER_ACCT pid=4198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.442796 sshd[4198]: Accepted publickey for core from 10.0.0.1 port 35298 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:55:01.443000 audit[4198]: CRED_ACQ pid=4198 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.443000 audit[4198]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff60dd490 a2=3 a3=1 items=0 ppid=1 pid=4198 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.443000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:01.444055 sshd[4198]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:55:01.448292 systemd[1]: Started session-16.scope. Jul 2 00:55:01.448595 systemd-logind[1205]: New session 16 of user core. Jul 2 00:55:01.452000 audit[4198]: USER_START pid=4198 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.453000 audit[4201]: CRED_ACQ pid=4201 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.712293 sshd[4198]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:01.715000 audit[4198]: USER_END pid=4198 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.715000 audit[4198]: CRED_DISP pid=4198 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.716000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.92:22-10.0.0.1:35304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:01.717161 systemd[1]: Started sshd@16-10.0.0.92:22-10.0.0.1:35304.service. Jul 2 00:55:01.717717 systemd[1]: sshd@15-10.0.0.92:22-10.0.0.1:35298.service: Deactivated successfully. Jul 2 00:55:01.719218 systemd[1]: session-16.scope: Deactivated successfully. Jul 2 00:55:01.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.0.0.92:22-10.0.0.1:35298 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:01.720272 systemd-logind[1205]: Session 16 logged out. Waiting for processes to exit. Jul 2 00:55:01.721258 systemd-logind[1205]: Removed session 16. Jul 2 00:55:01.755000 audit[4230]: USER_ACCT pid=4230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.756374 sshd[4230]: Accepted publickey for core from 10.0.0.1 port 35304 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:55:01.756000 audit[4230]: CRED_ACQ pid=4230 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.756000 audit[4230]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc64917c0 a2=3 a3=1 items=0 ppid=1 pid=4230 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:01.756000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:01.757468 sshd[4230]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:55:01.761289 systemd-logind[1205]: New session 17 of user core. Jul 2 00:55:01.761804 systemd[1]: Started session-17.scope. Jul 2 00:55:01.766000 audit[4230]: USER_START pid=4230 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.767000 audit[4235]: CRED_ACQ pid=4235 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.904828 sshd[4230]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:01.905000 audit[4230]: USER_END pid=4230 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.905000 audit[4230]: CRED_DISP pid=4230 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:01.907497 systemd[1]: sshd@16-10.0.0.92:22-10.0.0.1:35304.service: Deactivated successfully. Jul 2 00:55:01.907000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.0.0.92:22-10.0.0.1:35304 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:01.907812 systemd-logind[1205]: Session 17 logged out. Waiting for processes to exit. Jul 2 00:55:01.908230 systemd[1]: session-17.scope: Deactivated successfully. Jul 2 00:55:01.908843 systemd-logind[1205]: Removed session 17. Jul 2 00:55:02.219665 kubelet[2063]: I0702 00:55:02.219328 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:55:02.220386 kubelet[2063]: E0702 00:55:02.220366 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:02.245000 audit[4246]: NETFILTER_CFG table=filter:105 family=2 entries=33 op=nft_register_rule pid=4246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:02.245000 audit[4246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11860 a0=3 a1=ffffcbb38fa0 a2=0 a3=1 items=0 ppid=2257 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.245000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:02.249202 env[1214]: time="2024-07-02T00:55:02.249161551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:02.251049 env[1214]: time="2024-07-02T00:55:02.251019363Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:02.250000 audit[4246]: NETFILTER_CFG table=nat:106 family=2 entries=25 op=nft_register_chain pid=4246 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:02.250000 audit[4246]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8580 a0=3 a1=ffffcbb38fa0 a2=0 a3=1 items=0 ppid=2257 pid=4246 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.250000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:02.252962 env[1214]: time="2024-07-02T00:55:02.252742733Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:02.254679 env[1214]: time="2024-07-02T00:55:02.254641265Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:b3caf3e7b3042b293728a5ab55d893798d60fec55993a9531e82997de0e534cc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Jul 2 00:55:02.255211 env[1214]: time="2024-07-02T00:55:02.255186509Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.28.0\" returns image reference \"sha256:f708eddd5878891da5bc6148fc8bb3f7277210481a15957910fe5fb551a5ed28\"" Jul 2 00:55:02.257368 env[1214]: time="2024-07-02T00:55:02.257330162Z" level=info msg="CreateContainer within sandbox \"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Jul 2 00:55:02.270868 env[1214]: time="2024-07-02T00:55:02.270798205Z" level=info msg="CreateContainer within sandbox \"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"3c6c193655eb9180abcffe559053a1f15c141539a71691cd8049b4b18d92b549\"" Jul 2 00:55:02.271485 env[1214]: time="2024-07-02T00:55:02.271438129Z" level=info msg="StartContainer for \"3c6c193655eb9180abcffe559053a1f15c141539a71691cd8049b4b18d92b549\"" Jul 2 00:55:02.292451 systemd[1]: Started cri-containerd-3c6c193655eb9180abcffe559053a1f15c141539a71691cd8049b4b18d92b549.scope. Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3939 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366331393336353565623931383061626366666535353930353361 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.310000 audit: BPF prog-id=173 op=LOAD Jul 2 00:55:02.310000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3939 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.310000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366331393336353565623931383061626366666535353930353361 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit: BPF prog-id=174 op=LOAD Jul 2 00:55:02.311000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3939 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366331393336353565623931383061626366666535353930353361 Jul 2 00:55:02.311000 audit: BPF prog-id=174 op=UNLOAD Jul 2 00:55:02.311000 audit: BPF prog-id=173 op=UNLOAD Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { perfmon } for pid=4255 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit[4255]: AVC avc: denied { bpf } for pid=4255 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:02.311000 audit: BPF prog-id=175 op=LOAD Jul 2 00:55:02.311000 audit[4255]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3939 pid=4255 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:02.311000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366331393336353565623931383061626366666535353930353361 Jul 2 00:55:02.325018 env[1214]: time="2024-07-02T00:55:02.324977661Z" level=info msg="StartContainer for \"3c6c193655eb9180abcffe559053a1f15c141539a71691cd8049b4b18d92b549\" returns successfully" Jul 2 00:55:03.076806 kubelet[2063]: I0702 00:55:03.076753 2063 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Jul 2 00:55:03.078097 kubelet[2063]: I0702 00:55:03.078062 2063 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Jul 2 00:55:03.213418 kubelet[2063]: E0702 00:55:03.213365 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:03.230131 kubelet[2063]: I0702 00:55:03.230067 2063 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-rk75r" podStartSLOduration=25.521747265 podStartE2EDuration="29.230029368s" podCreationTimestamp="2024-07-02 00:54:34 +0000 UTC" firstStartedPulling="2024-07-02 00:54:58.547140607 +0000 UTC m=+45.640673354" lastFinishedPulling="2024-07-02 00:55:02.25542271 +0000 UTC m=+49.348955457" observedRunningTime="2024-07-02 00:55:03.229295324 +0000 UTC m=+50.322828071" watchObservedRunningTime="2024-07-02 00:55:03.230029368 +0000 UTC m=+50.323562115" Jul 2 00:55:03.265350 systemd[1]: run-containerd-runc-k8s.io-3c6c193655eb9180abcffe559053a1f15c141539a71691cd8049b4b18d92b549-runc.NM4nud.mount: Deactivated successfully. Jul 2 00:55:03.266735 systemd-networkd[1042]: vxlan.calico: Link UP Jul 2 00:55:03.266741 systemd-networkd[1042]: vxlan.calico: Gained carrier Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.283000 audit: BPF prog-id=176 op=LOAD Jul 2 00:55:03.283000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc67f99a8 a2=70 a3=ffffc67f9a18 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.283000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit: BPF prog-id=176 op=UNLOAD Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit: BPF prog-id=177 op=LOAD Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=5 a1=ffffc67f99a8 a2=70 a3=4b243c items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit: BPF prog-id=177 op=UNLOAD Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=0 a1=ffffc67f9960 a2=70 a3=ffffc67f99d0 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit: BPF prog-id=178 op=LOAD Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffc67f9948 a2=70 a3=ffffc67f99b8 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit: BPF prog-id=178 op=UNLOAD Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc67f9a18 a2=70 a3=0 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc67f9a08 a2=70 a3=0 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=4 a0=12 a1=ffffc67f9978 a2=70 a3=0 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=no exit=-22 a0=0 a1=ffffc67f9a50 a2=70 a3=32e3a48f items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=0 a1=ffffc67f9a50 a2=70 a3=32e3a48f items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { perfmon } for pid=4382 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit[4382]: AVC avc: denied { bpf } for pid=4382 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.284000 audit: BPF prog-id=179 op=LOAD Jul 2 00:55:03.284000 audit[4382]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=6 a0=5 a1=ffffc67f9978 a2=70 a3=32e3a4a9 items=0 ppid=4333 pid=4382 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.284000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Jul 2 00:55:03.287000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.287000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb84ce48 a2=70 a3=ffffcb84ceb8 items=0 ppid=4333 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.287000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:55:03.287000 audit[4385]: AVC avc: denied { bpf } for pid=4385 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Jul 2 00:55:03.287000 audit[4385]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffcb84cd18 a2=70 a3=ffffcb84cd88 items=0 ppid=4333 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.287000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Jul 2 00:55:03.301000 audit: BPF prog-id=179 op=UNLOAD Jul 2 00:55:03.354000 audit[4417]: NETFILTER_CFG table=mangle:107 family=2 entries=16 op=nft_register_chain pid=4417 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:55:03.354000 audit[4417]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6868 a0=3 a1=fffffd914f20 a2=0 a3=ffffa1c28fa8 items=0 ppid=4333 pid=4417 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.354000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:55:03.361000 audit[4418]: NETFILTER_CFG table=raw:108 family=2 entries=19 op=nft_register_chain pid=4418 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:55:03.361000 audit[4418]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6992 a0=3 a1=ffffde55b0c0 a2=0 a3=ffffb6e92fa8 items=0 ppid=4333 pid=4418 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.361000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:55:03.367000 audit[4419]: NETFILTER_CFG table=nat:109 family=2 entries=15 op=nft_register_chain pid=4419 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:55:03.367000 audit[4419]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5084 a0=3 a1=ffffd875c970 a2=0 a3=ffff9e75afa8 items=0 ppid=4333 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.367000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:55:03.368000 audit[4422]: NETFILTER_CFG table=filter:110 family=2 entries=153 op=nft_register_chain pid=4422 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Jul 2 00:55:03.368000 audit[4422]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=86564 a0=3 a1=ffffed386b80 a2=0 a3=ffffa727afa8 items=0 ppid=4333 pid=4422 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:03.368000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Jul 2 00:55:05.101647 systemd-networkd[1042]: vxlan.calico: Gained IPv6LL Jul 2 00:55:06.909765 systemd[1]: Started sshd@17-10.0.0.92:22-10.0.0.1:35320.service. Jul 2 00:55:06.909000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:06.910633 kernel: kauditd_printk_skb: 301 callbacks suppressed Jul 2 00:55:06.910672 kernel: audit: type=1130 audit(1719881706.909:1266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:06.947000 audit[4432]: USER_ACCT pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.948522 sshd[4432]: Accepted publickey for core from 10.0.0.1 port 35320 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:55:06.949670 sshd[4432]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:55:06.948000 audit[4432]: CRED_ACQ pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.953233 kernel: audit: type=1101 audit(1719881706.947:1267): pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.953327 kernel: audit: type=1103 audit(1719881706.948:1268): pid=4432 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.953352 kernel: audit: type=1006 audit(1719881706.948:1269): pid=4432 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Jul 2 00:55:06.954932 kernel: audit: type=1300 audit(1719881706.948:1269): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfc65ba0 a2=3 a3=1 items=0 ppid=1 pid=4432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:06.948000 audit[4432]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfc65ba0 a2=3 a3=1 items=0 ppid=1 pid=4432 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:06.954589 systemd-logind[1205]: New session 18 of user core. Jul 2 00:55:06.954709 systemd[1]: Started session-18.scope. Jul 2 00:55:06.948000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:06.959185 kernel: audit: type=1327 audit(1719881706.948:1269): proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:06.959262 kernel: audit: type=1105 audit(1719881706.958:1270): pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.958000 audit[4432]: USER_START pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.959000 audit[4434]: CRED_ACQ pid=4434 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:06.963822 kernel: audit: type=1103 audit(1719881706.959:1271): pid=4434 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:07.107718 sshd[4432]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:07.108000 audit[4432]: USER_END pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:07.110903 systemd-logind[1205]: Session 18 logged out. Waiting for processes to exit. Jul 2 00:55:07.111159 systemd[1]: sshd@17-10.0.0.92:22-10.0.0.1:35320.service: Deactivated successfully. Jul 2 00:55:07.108000 audit[4432]: CRED_DISP pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:07.112026 systemd[1]: session-18.scope: Deactivated successfully. Jul 2 00:55:07.112623 systemd-logind[1205]: Removed session 18. Jul 2 00:55:07.113783 kernel: audit: type=1106 audit(1719881707.108:1272): pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:07.113837 kernel: audit: type=1104 audit(1719881707.108:1273): pid=4432 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:07.108000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.0.0.92:22-10.0.0.1:35320 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:07.277000 audit[4445]: NETFILTER_CFG table=filter:111 family=2 entries=20 op=nft_register_rule pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:07.277000 audit[4445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2932 a0=3 a1=ffffdaf9a280 a2=0 a3=1 items=0 ppid=2257 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:07.277000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:07.278000 audit[4445]: NETFILTER_CFG table=nat:112 family=2 entries=104 op=nft_register_chain pid=4445 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:07.278000 audit[4445]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48684 a0=3 a1=ffffdaf9a280 a2=0 a3=1 items=0 ppid=2257 pid=4445 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:07.278000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:08.416618 kubelet[2063]: I0702 00:55:08.416584 2063 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Jul 2 00:55:08.492059 systemd[1]: run-containerd-runc-k8s.io-fa1e20566599a6c18b348acde8790a7432a15933cd9c5063cf85fbf5f95993e7-runc.SJupXp.mount: Deactivated successfully. Jul 2 00:55:09.397000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.397000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000e1ea40 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:09.397000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:09.408000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.408000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40009bd410 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:09.408000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:09.755000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.755000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4005d3aed0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.755000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:09.755000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.755000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400604ece0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.755000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:09.766000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=8226 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.766000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400e78d080 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:09.766000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=8232 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.766000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4005d3b110 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:09.768000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=8230 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.768000 audit[1929]: AVC avc: denied { watch } for pid=1929 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:09.768000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006b56bd0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.768000 audit[1929]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400604edc0 a2=fc6 a3=0 items=0 ppid=1767 pid=1929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c636,c638 key=(null) Jul 2 00:55:09.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:09.768000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E302E302E3932002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265726E Jul 2 00:55:12.112044 systemd[1]: Started sshd@18-10.0.0.92:22-10.0.0.1:55300.service. Jul 2 00:55:12.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:55300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:12.112808 kernel: kauditd_printk_skb: 31 callbacks suppressed Jul 2 00:55:12.112866 kernel: audit: type=1130 audit(1719881712.111:1285): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:55300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:12.144000 audit[4500]: USER_ACCT pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.145505 sshd[4500]: Accepted publickey for core from 10.0.0.1 port 55300 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:55:12.148554 kernel: audit: type=1101 audit(1719881712.144:1286): pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.149000 audit[4500]: CRED_ACQ pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.150241 sshd[4500]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:55:12.154389 kernel: audit: type=1103 audit(1719881712.149:1287): pid=4500 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.154451 kernel: audit: type=1006 audit(1719881712.149:1288): pid=4500 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Jul 2 00:55:12.154472 kernel: audit: type=1300 audit(1719881712.149:1288): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8c565a0 a2=3 a3=1 items=0 ppid=1 pid=4500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:12.149000 audit[4500]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff8c565a0 a2=3 a3=1 items=0 ppid=1 pid=4500 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:12.154101 systemd-logind[1205]: New session 19 of user core. Jul 2 00:55:12.154573 systemd[1]: Started session-19.scope. Jul 2 00:55:12.149000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:12.158321 kernel: audit: type=1327 audit(1719881712.149:1288): proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:12.161000 audit[4500]: USER_START pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.162000 audit[4502]: CRED_ACQ pid=4502 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.167051 kernel: audit: type=1105 audit(1719881712.161:1289): pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.167106 kernel: audit: type=1103 audit(1719881712.162:1290): pid=4502 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.277508 sshd[4500]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:12.277000 audit[4500]: USER_END pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.280353 systemd[1]: session-19.scope: Deactivated successfully. Jul 2 00:55:12.278000 audit[4500]: CRED_DISP pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.280977 systemd-logind[1205]: Session 19 logged out. Waiting for processes to exit. Jul 2 00:55:12.281059 systemd[1]: sshd@18-10.0.0.92:22-10.0.0.1:55300.service: Deactivated successfully. Jul 2 00:55:12.282165 systemd-logind[1205]: Removed session 19. Jul 2 00:55:12.283253 kernel: audit: type=1106 audit(1719881712.277:1291): pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.283316 kernel: audit: type=1104 audit(1719881712.278:1292): pid=4500 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:12.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.0.0.92:22-10.0.0.1:55300 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:13.001099 env[1214]: time="2024-07-02T00:55:13.001037872Z" level=info msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.034 [WARNING][4526] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rk75r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"53f96a20-2bb3-4586-9b6d-4a3d96d028e2", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5", Pod:"csi-node-driver-rk75r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif76f8847ad0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.034 [INFO][4526] k8s.go 608: Cleaning up netns ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.034 [INFO][4526] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" iface="eth0" netns="" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.034 [INFO][4526] k8s.go 615: Releasing IP address(es) ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.034 [INFO][4526] utils.go 188: Calico CNI releasing IP address ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.055 [INFO][4536] ipam_plugin.go 411: Releasing address using handleID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.056 [INFO][4536] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.056 [INFO][4536] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.064 [WARNING][4536] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.064 [INFO][4536] ipam_plugin.go 439: Releasing address using workloadID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.065 [INFO][4536] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.068392 env[1214]: 2024-07-02 00:55:13.066 [INFO][4526] k8s.go 621: Teardown processing complete. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.068816 env[1214]: time="2024-07-02T00:55:13.068419910Z" level=info msg="TearDown network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" successfully" Jul 2 00:55:13.068816 env[1214]: time="2024-07-02T00:55:13.068452270Z" level=info msg="StopPodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" returns successfully" Jul 2 00:55:13.069007 env[1214]: time="2024-07-02T00:55:13.068961233Z" level=info msg="RemovePodSandbox for \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" Jul 2 00:55:13.069050 env[1214]: time="2024-07-02T00:55:13.069000753Z" level=info msg="Forcibly stopping sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\"" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.104 [WARNING][4559] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-csi--node--driver--rk75r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"53f96a20-2bb3-4586-9b6d-4a3d96d028e2", ResourceVersion:"941", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7d7f6c786c", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"76bca290f3c71a728887722c9b818afe004a28992b54500abd446bc49e1525e5", Pod:"csi-node-driver-rk75r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.88.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calif76f8847ad0", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.104 [INFO][4559] k8s.go 608: Cleaning up netns ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.104 [INFO][4559] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" iface="eth0" netns="" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.104 [INFO][4559] k8s.go 615: Releasing IP address(es) ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.104 [INFO][4559] utils.go 188: Calico CNI releasing IP address ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.124 [INFO][4566] ipam_plugin.go 411: Releasing address using handleID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.124 [INFO][4566] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.125 [INFO][4566] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.132 [WARNING][4566] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.133 [INFO][4566] ipam_plugin.go 439: Releasing address using workloadID ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" HandleID="k8s-pod-network.458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Workload="localhost-k8s-csi--node--driver--rk75r-eth0" Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.134 [INFO][4566] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.137297 env[1214]: 2024-07-02 00:55:13.136 [INFO][4559] k8s.go 621: Teardown processing complete. ContainerID="458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3" Jul 2 00:55:13.137782 env[1214]: time="2024-07-02T00:55:13.137312997Z" level=info msg="TearDown network for sandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" successfully" Jul 2 00:55:13.139911 env[1214]: time="2024-07-02T00:55:13.139871291Z" level=info msg="RemovePodSandbox \"458bd30c15d337cc7290699127c97dfe3cfffe45e1bdb5c08779759cb6fb5ae3\" returns successfully" Jul 2 00:55:13.140423 env[1214]: time="2024-07-02T00:55:13.140388013Z" level=info msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.183 [WARNING][4588] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0", GenerateName:"calico-kube-controllers-5856d689df-", Namespace:"calico-system", SelfLink:"", UID:"eac07240-ede1-43ad-b618-d7921e37ca39", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5856d689df", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800", Pod:"calico-kube-controllers-5856d689df-s98tz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf3507f9e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.184 [INFO][4588] k8s.go 608: Cleaning up netns ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.184 [INFO][4588] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" iface="eth0" netns="" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.184 [INFO][4588] k8s.go 615: Releasing IP address(es) ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.184 [INFO][4588] utils.go 188: Calico CNI releasing IP address ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.200 [INFO][4597] ipam_plugin.go 411: Releasing address using handleID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.200 [INFO][4597] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.200 [INFO][4597] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.210 [WARNING][4597] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.210 [INFO][4597] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.211 [INFO][4597] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.214722 env[1214]: 2024-07-02 00:55:13.213 [INFO][4588] k8s.go 621: Teardown processing complete. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.215134 env[1214]: time="2024-07-02T00:55:13.214746729Z" level=info msg="TearDown network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" successfully" Jul 2 00:55:13.215134 env[1214]: time="2024-07-02T00:55:13.214785409Z" level=info msg="StopPodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" returns successfully" Jul 2 00:55:13.215226 env[1214]: time="2024-07-02T00:55:13.215197692Z" level=info msg="RemovePodSandbox for \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" Jul 2 00:55:13.215269 env[1214]: time="2024-07-02T00:55:13.215232892Z" level=info msg="Forcibly stopping sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\"" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.249 [WARNING][4620] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0", GenerateName:"calico-kube-controllers-5856d689df-", Namespace:"calico-system", SelfLink:"", UID:"eac07240-ede1-43ad-b618-d7921e37ca39", ResourceVersion:"976", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5856d689df", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"3c42b60d6b76cca4a1673ca4e880e7ce44875c3f5ffbb1dae697bcd567282800", Pod:"calico-kube-controllers-5856d689df-s98tz", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.88.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califf3507f9e30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.250 [INFO][4620] k8s.go 608: Cleaning up netns ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.250 [INFO][4620] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" iface="eth0" netns="" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.250 [INFO][4620] k8s.go 615: Releasing IP address(es) ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.250 [INFO][4620] utils.go 188: Calico CNI releasing IP address ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.266 [INFO][4629] ipam_plugin.go 411: Releasing address using handleID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.266 [INFO][4629] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.266 [INFO][4629] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.274 [WARNING][4629] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.274 [INFO][4629] ipam_plugin.go 439: Releasing address using workloadID ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" HandleID="k8s-pod-network.a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Workload="localhost-k8s-calico--kube--controllers--5856d689df--s98tz-eth0" Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.276 [INFO][4629] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.279678 env[1214]: 2024-07-02 00:55:13.277 [INFO][4620] k8s.go 621: Teardown processing complete. ContainerID="a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc" Jul 2 00:55:13.279678 env[1214]: time="2024-07-02T00:55:13.278748830Z" level=info msg="TearDown network for sandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" successfully" Jul 2 00:55:13.282056 env[1214]: time="2024-07-02T00:55:13.282023327Z" level=info msg="RemovePodSandbox \"a650645f8b16c72f8ae3745385b3e6fb710471788349aa768d852e08bfe7a1fc\" returns successfully" Jul 2 00:55:13.282499 env[1214]: time="2024-07-02T00:55:13.282471170Z" level=info msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.315 [WARNING][4652] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--fxp76-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1dafe043-8e09-41e8-8461-235c56ab0198", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f", Pod:"coredns-76f75df574-fxp76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90d0863e34b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.315 [INFO][4652] k8s.go 608: Cleaning up netns ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.316 [INFO][4652] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" iface="eth0" netns="" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.316 [INFO][4652] k8s.go 615: Releasing IP address(es) ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.316 [INFO][4652] utils.go 188: Calico CNI releasing IP address ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.333 [INFO][4660] ipam_plugin.go 411: Releasing address using handleID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.333 [INFO][4660] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.333 [INFO][4660] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.341 [WARNING][4660] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.341 [INFO][4660] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.342 [INFO][4660] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.345355 env[1214]: 2024-07-02 00:55:13.344 [INFO][4652] k8s.go 621: Teardown processing complete. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.345805 env[1214]: time="2024-07-02T00:55:13.345391305Z" level=info msg="TearDown network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" successfully" Jul 2 00:55:13.345805 env[1214]: time="2024-07-02T00:55:13.345423025Z" level=info msg="StopPodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" returns successfully" Jul 2 00:55:13.345921 env[1214]: time="2024-07-02T00:55:13.345873667Z" level=info msg="RemovePodSandbox for \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" Jul 2 00:55:13.345963 env[1214]: time="2024-07-02T00:55:13.345918468Z" level=info msg="Forcibly stopping sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\"" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.381 [WARNING][4682] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--fxp76-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"1dafe043-8e09-41e8-8461-235c56ab0198", ResourceVersion:"865", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"530542f7256f0a5b48918a33a12996624d90c492042d78d28e0cfacb1829332f", Pod:"coredns-76f75df574-fxp76", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali90d0863e34b", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.381 [INFO][4682] k8s.go 608: Cleaning up netns ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.381 [INFO][4682] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" iface="eth0" netns="" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.381 [INFO][4682] k8s.go 615: Releasing IP address(es) ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.381 [INFO][4682] utils.go 188: Calico CNI releasing IP address ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.401 [INFO][4697] ipam_plugin.go 411: Releasing address using handleID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.401 [INFO][4697] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.402 [INFO][4697] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.411 [WARNING][4697] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.411 [INFO][4697] ipam_plugin.go 439: Releasing address using workloadID ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" HandleID="k8s-pod-network.e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Workload="localhost-k8s-coredns--76f75df574--fxp76-eth0" Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.412 [INFO][4697] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.415437 env[1214]: 2024-07-02 00:55:13.414 [INFO][4682] k8s.go 621: Teardown processing complete. ContainerID="e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42" Jul 2 00:55:13.416024 env[1214]: time="2024-07-02T00:55:13.415467598Z" level=info msg="TearDown network for sandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" successfully" Jul 2 00:55:13.423809 env[1214]: time="2024-07-02T00:55:13.423755602Z" level=info msg="RemovePodSandbox \"e96c6a42f60bdb509fa50e90e599ad924237e4da059e6b194fd892d189995c42\" returns successfully" Jul 2 00:55:13.424300 env[1214]: time="2024-07-02T00:55:13.424260085Z" level=info msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.457 [WARNING][4720] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mwnbm-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"09f2169c-1b4a-4699-9fe1-6a320d31b42d", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b", Pod:"coredns-76f75df574-mwnbm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaf3933c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.457 [INFO][4720] k8s.go 608: Cleaning up netns ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.457 [INFO][4720] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" iface="eth0" netns="" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.457 [INFO][4720] k8s.go 615: Releasing IP address(es) ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.457 [INFO][4720] utils.go 188: Calico CNI releasing IP address ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.475 [INFO][4727] ipam_plugin.go 411: Releasing address using handleID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.475 [INFO][4727] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.475 [INFO][4727] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.484 [WARNING][4727] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.484 [INFO][4727] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.485 [INFO][4727] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.488300 env[1214]: 2024-07-02 00:55:13.486 [INFO][4720] k8s.go 621: Teardown processing complete. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.488765 env[1214]: time="2024-07-02T00:55:13.488312106Z" level=info msg="TearDown network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" successfully" Jul 2 00:55:13.488765 env[1214]: time="2024-07-02T00:55:13.488342826Z" level=info msg="StopPodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" returns successfully" Jul 2 00:55:13.488848 env[1214]: time="2024-07-02T00:55:13.488816228Z" level=info msg="RemovePodSandbox for \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" Jul 2 00:55:13.488930 env[1214]: time="2024-07-02T00:55:13.488860909Z" level=info msg="Forcibly stopping sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\"" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.520 [WARNING][4750] k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"localhost-k8s-coredns--76f75df574--mwnbm-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"09f2169c-1b4a-4699-9fe1-6a320d31b42d", ResourceVersion:"836", Generation:0, CreationTimestamp:time.Date(2024, time.July, 2, 0, 54, 28, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"localhost", ContainerID:"932cb7788433d12cc23a6313893e9d67539f0111ee8c5d831b2d113342ebf12b", Pod:"coredns-76f75df574-mwnbm", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.88.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calideaf3933c33", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.520 [INFO][4750] k8s.go 608: Cleaning up netns ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.520 [INFO][4750] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" iface="eth0" netns="" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.520 [INFO][4750] k8s.go 615: Releasing IP address(es) ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.520 [INFO][4750] utils.go 188: Calico CNI releasing IP address ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.537 [INFO][4758] ipam_plugin.go 411: Releasing address using handleID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.537 [INFO][4758] ipam_plugin.go 352: About to acquire host-wide IPAM lock. Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.537 [INFO][4758] ipam_plugin.go 367: Acquired host-wide IPAM lock. Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.547 [WARNING][4758] ipam_plugin.go 428: Asked to release address but it doesn't exist. Ignoring ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.547 [INFO][4758] ipam_plugin.go 439: Releasing address using workloadID ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" HandleID="k8s-pod-network.7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Workload="localhost-k8s-coredns--76f75df574--mwnbm-eth0" Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.548 [INFO][4758] ipam_plugin.go 373: Released host-wide IPAM lock. Jul 2 00:55:13.552046 env[1214]: 2024-07-02 00:55:13.549 [INFO][4750] k8s.go 621: Teardown processing complete. ContainerID="7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a" Jul 2 00:55:13.552046 env[1214]: time="2024-07-02T00:55:13.550834118Z" level=info msg="TearDown network for sandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" successfully" Jul 2 00:55:13.554560 env[1214]: time="2024-07-02T00:55:13.554507058Z" level=info msg="RemovePodSandbox \"7a0c757343c3d6d5e43fc1a6bb8585fad82ef098d9379d9c79b2f64b28b1ff2a\" returns successfully" Jul 2 00:55:15.149187 kubelet[2063]: E0702 00:55:15.149160 2063 dns.go:153] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 1.1.1.1 1.0.0.1 8.8.8.8" Jul 2 00:55:15.682000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:15.682000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d97d20 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:15.682000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:15.684000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:15.684000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000eb0680 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:15.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:15.684000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:15.684000 audit[1939]: AVC avc: denied { watch } for pid=1939 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=8224 scontext=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Jul 2 00:55:15.684000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000eb0820 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:15.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:15.684000 audit[1939]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400221e660 a2=fc6 a3=0 items=0 ppid=1771 pid=1939 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c669,c902 key=(null) Jul 2 00:55:15.684000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Jul 2 00:55:17.281000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:55302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:17.281798 systemd[1]: Started sshd@19-10.0.0.92:22-10.0.0.1:55302.service. Jul 2 00:55:17.284615 kernel: kauditd_printk_skb: 13 callbacks suppressed Jul 2 00:55:17.284730 kernel: audit: type=1130 audit(1719881717.281:1298): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:55302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:17.329000 audit[4793]: USER_ACCT pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.329858 sshd[4793]: Accepted publickey for core from 10.0.0.1 port 55302 ssh2: RSA SHA256:p8Y1IuTS6TxJ481HRtC9DuXWW9Af2DGdhQUd1gde29c Jul 2 00:55:17.331043 sshd[4793]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Jul 2 00:55:17.330000 audit[4793]: CRED_ACQ pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.334286 kernel: audit: type=1101 audit(1719881717.329:1299): pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.334350 kernel: audit: type=1103 audit(1719881717.330:1300): pid=4793 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.334373 kernel: audit: type=1006 audit(1719881717.330:1301): pid=4793 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=20 res=1 Jul 2 00:55:17.336200 kernel: audit: type=1300 audit(1719881717.330:1301): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3496840 a2=3 a3=1 items=0 ppid=1 pid=4793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:17.330000 audit[4793]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe3496840 a2=3 a3=1 items=0 ppid=1 pid=4793 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:17.340866 kernel: audit: type=1327 audit(1719881717.330:1301): proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:17.330000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Jul 2 00:55:17.340854 systemd[1]: Started session-20.scope. Jul 2 00:55:17.341371 systemd-logind[1205]: New session 20 of user core. Jul 2 00:55:17.346000 audit[4793]: USER_START pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.349577 kernel: audit: type=1105 audit(1719881717.346:1302): pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.349682 kernel: audit: type=1103 audit(1719881717.348:1303): pid=4795 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.348000 audit[4795]: CRED_ACQ pid=4795 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.479264 sshd[4793]: pam_unix(sshd:session): session closed for user core Jul 2 00:55:17.479000 audit[4793]: USER_END pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.481954 systemd[1]: sshd@19-10.0.0.92:22-10.0.0.1:55302.service: Deactivated successfully. Jul 2 00:55:17.482675 systemd[1]: session-20.scope: Deactivated successfully. Jul 2 00:55:17.479000 audit[4793]: CRED_DISP pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.484203 systemd-logind[1205]: Session 20 logged out. Waiting for processes to exit. Jul 2 00:55:17.485046 kernel: audit: type=1106 audit(1719881717.479:1304): pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.485097 kernel: audit: type=1104 audit(1719881717.479:1305): pid=4793 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.0.0.1 addr=10.0.0.1 terminal=ssh res=success' Jul 2 00:55:17.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.0.0.92:22-10.0.0.1:55302 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Jul 2 00:55:17.485607 systemd-logind[1205]: Removed session 20. Jul 2 00:55:18.227025 kubelet[2063]: I0702 00:55:18.226462 2063 topology_manager.go:215] "Topology Admit Handler" podUID="127a6291-a7ab-41d5-af16-e0d520fcf876" podNamespace="calico-apiserver" podName="calico-apiserver-8dfb9f75c-qhxkd" Jul 2 00:55:18.231304 systemd[1]: Created slice kubepods-besteffort-pod127a6291_a7ab_41d5_af16_e0d520fcf876.slice. Jul 2 00:55:18.244000 audit[4806]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:18.244000 audit[4806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=fffff5d3a830 a2=0 a3=1 items=0 ppid=2257 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:18.244000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:18.247000 audit[4806]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4806 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:18.247000 audit[4806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=fffff5d3a830 a2=0 a3=1 items=0 ppid=2257 pid=4806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:18.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:18.256000 audit[4808]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:18.256000 audit[4808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3676 a0=3 a1=ffffcff15a60 a2=0 a3=1 items=0 ppid=2257 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:18.256000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:18.258000 audit[4808]: NETFILTER_CFG table=nat:116 family=2 entries=44 op=nft_register_rule pid=4808 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Jul 2 00:55:18.258000 audit[4808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=14988 a0=3 a1=ffffcff15a60 a2=0 a3=1 items=0 ppid=2257 pid=4808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Jul 2 00:55:18.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Jul 2 00:55:18.328337 kubelet[2063]: I0702 00:55:18.328286 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rddkh\" (UniqueName: \"kubernetes.io/projected/127a6291-a7ab-41d5-af16-e0d520fcf876-kube-api-access-rddkh\") pod \"calico-apiserver-8dfb9f75c-qhxkd\" (UID: \"127a6291-a7ab-41d5-af16-e0d520fcf876\") " pod="calico-apiserver/calico-apiserver-8dfb9f75c-qhxkd" Jul 2 00:55:18.328471 kubelet[2063]: I0702 00:55:18.328355 2063 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/127a6291-a7ab-41d5-af16-e0d520fcf876-calico-apiserver-certs\") pod \"calico-apiserver-8dfb9f75c-qhxkd\" (UID: \"127a6291-a7ab-41d5-af16-e0d520fcf876\") " pod="calico-apiserver/calico-apiserver-8dfb9f75c-qhxkd" Jul 2 00:55:18.429242 kubelet[2063]: E0702 00:55:18.429181 2063 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 00:55:18.431111 kubelet[2063]: E0702 00:55:18.431071 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/127a6291-a7ab-41d5-af16-e0d520fcf876-calico-apiserver-certs podName:127a6291-a7ab-41d5-af16-e0d520fcf876 nodeName:}" failed. No retries permitted until 2024-07-02 00:55:18.929261812 +0000 UTC m=+66.022794559 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/127a6291-a7ab-41d5-af16-e0d520fcf876-calico-apiserver-certs") pod "calico-apiserver-8dfb9f75c-qhxkd" (UID: "127a6291-a7ab-41d5-af16-e0d520fcf876") : secret "calico-apiserver-certs" not found Jul 2 00:55:18.933768 kubelet[2063]: E0702 00:55:18.933720 2063 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Jul 2 00:55:18.933934 kubelet[2063]: E0702 00:55:18.933796 2063 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/127a6291-a7ab-41d5-af16-e0d520fcf876-calico-apiserver-certs podName:127a6291-a7ab-41d5-af16-e0d520fcf876 nodeName:}" failed. No retries permitted until 2024-07-02 00:55:19.933781089 +0000 UTC m=+67.027313796 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/127a6291-a7ab-41d5-af16-e0d520fcf876-calico-apiserver-certs") pod "calico-apiserver-8dfb9f75c-qhxkd" (UID: "127a6291-a7ab-41d5-af16-e0d520fcf876") : secret "calico-apiserver-certs" not found