Feb 12 19:39:20.160343 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Fri Feb 9 17:23:38 -00 2024 Feb 12 19:39:20.160381 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:39:20.160401 kernel: BIOS-provided physical RAM map: Feb 12 19:39:20.165501 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009fbff] usable Feb 12 19:39:20.165518 kernel: BIOS-e820: [mem 0x000000000009fc00-0x000000000009ffff] reserved Feb 12 19:39:20.165529 kernel: BIOS-e820: [mem 0x00000000000f0000-0x00000000000fffff] reserved Feb 12 19:39:20.165542 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000007ffd7fff] usable Feb 12 19:39:20.165553 kernel: BIOS-e820: [mem 0x000000007ffd8000-0x000000007fffffff] reserved Feb 12 19:39:20.165574 kernel: BIOS-e820: [mem 0x00000000feffc000-0x00000000feffffff] reserved Feb 12 19:39:20.165585 kernel: BIOS-e820: [mem 0x00000000fffc0000-0x00000000ffffffff] reserved Feb 12 19:39:20.165596 kernel: NX (Execute Disable) protection: active Feb 12 19:39:20.165607 kernel: SMBIOS 2.8 present. Feb 12 19:39:20.165667 kernel: DMI: DigitalOcean Droplet/Droplet, BIOS 20171212 12/12/2017 Feb 12 19:39:20.165679 kernel: Hypervisor detected: KVM Feb 12 19:39:20.165694 kernel: kvm-clock: Using msrs 4b564d01 and 4b564d00 Feb 12 19:39:20.165710 kernel: kvm-clock: cpu 0, msr 30faa001, primary cpu clock Feb 12 19:39:20.165722 kernel: kvm-clock: using sched offset of 5205867500 cycles Feb 12 19:39:20.165735 kernel: clocksource: kvm-clock: mask: 0xffffffffffffffff max_cycles: 0x1cd42e4dffb, max_idle_ns: 881590591483 ns Feb 12 19:39:20.165747 kernel: tsc: Detected 1999.999 MHz processor Feb 12 19:39:20.165759 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Feb 12 19:39:20.165772 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Feb 12 19:39:20.165783 kernel: last_pfn = 0x7ffd8 max_arch_pfn = 0x400000000 Feb 12 19:39:20.165795 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Feb 12 19:39:20.165811 kernel: ACPI: Early table checksum verification disabled Feb 12 19:39:20.165822 kernel: ACPI: RSDP 0x00000000000F5A50 000014 (v00 BOCHS ) Feb 12 19:39:20.165835 kernel: ACPI: RSDT 0x000000007FFE1986 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165847 kernel: ACPI: FACP 0x000000007FFE176A 000074 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165859 kernel: ACPI: DSDT 0x000000007FFE0040 00172A (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165871 kernel: ACPI: FACS 0x000000007FFE0000 000040 Feb 12 19:39:20.165882 kernel: ACPI: APIC 0x000000007FFE17DE 000080 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165894 kernel: ACPI: HPET 0x000000007FFE185E 000038 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165907 kernel: ACPI: SRAT 0x000000007FFE1896 0000C8 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165924 kernel: ACPI: WAET 0x000000007FFE195E 000028 (v01 BOCHS BXPC 00000001 BXPC 00000001) Feb 12 19:39:20.165937 kernel: ACPI: Reserving FACP table memory at [mem 0x7ffe176a-0x7ffe17dd] Feb 12 19:39:20.165950 kernel: ACPI: Reserving DSDT table memory at [mem 0x7ffe0040-0x7ffe1769] Feb 12 19:39:20.165961 kernel: ACPI: Reserving FACS table memory at [mem 0x7ffe0000-0x7ffe003f] Feb 12 19:39:20.165973 kernel: ACPI: Reserving APIC table memory at [mem 0x7ffe17de-0x7ffe185d] Feb 12 19:39:20.165984 kernel: ACPI: Reserving HPET table memory at [mem 0x7ffe185e-0x7ffe1895] Feb 12 19:39:20.165996 kernel: ACPI: Reserving SRAT table memory at [mem 0x7ffe1896-0x7ffe195d] Feb 12 19:39:20.166008 kernel: ACPI: Reserving WAET table memory at [mem 0x7ffe195e-0x7ffe1985] Feb 12 19:39:20.166029 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Feb 12 19:39:20.166041 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Feb 12 19:39:20.166065 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x0009ffff] Feb 12 19:39:20.166104 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00100000-0x7fffffff] Feb 12 19:39:20.166117 kernel: NUMA: Node 0 [mem 0x00000000-0x0009ffff] + [mem 0x00100000-0x7ffd7fff] -> [mem 0x00000000-0x7ffd7fff] Feb 12 19:39:20.166130 kernel: NODE_DATA(0) allocated [mem 0x7ffd2000-0x7ffd7fff] Feb 12 19:39:20.166148 kernel: Zone ranges: Feb 12 19:39:20.166160 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Feb 12 19:39:20.166173 kernel: DMA32 [mem 0x0000000001000000-0x000000007ffd7fff] Feb 12 19:39:20.166186 kernel: Normal empty Feb 12 19:39:20.166198 kernel: Movable zone start for each node Feb 12 19:39:20.166210 kernel: Early memory node ranges Feb 12 19:39:20.166223 kernel: node 0: [mem 0x0000000000001000-0x000000000009efff] Feb 12 19:39:20.166235 kernel: node 0: [mem 0x0000000000100000-0x000000007ffd7fff] Feb 12 19:39:20.166249 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x000000007ffd7fff] Feb 12 19:39:20.166264 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Feb 12 19:39:20.166278 kernel: On node 0, zone DMA: 97 pages in unavailable ranges Feb 12 19:39:20.166291 kernel: On node 0, zone DMA32: 40 pages in unavailable ranges Feb 12 19:39:20.166303 kernel: ACPI: PM-Timer IO Port: 0x608 Feb 12 19:39:20.166315 kernel: ACPI: LAPIC_NMI (acpi_id[0xff] dfl dfl lint[0x1]) Feb 12 19:39:20.166326 kernel: IOAPIC[0]: apic_id 0, version 17, address 0xfec00000, GSI 0-23 Feb 12 19:39:20.166339 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 0 global_irq 2 dfl dfl) Feb 12 19:39:20.166351 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 5 global_irq 5 high level) Feb 12 19:39:20.166363 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Feb 12 19:39:20.166381 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 10 global_irq 10 high level) Feb 12 19:39:20.166393 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 11 global_irq 11 high level) Feb 12 19:39:20.166428 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Feb 12 19:39:20.166441 kernel: ACPI: HPET id: 0x8086a201 base: 0xfed00000 Feb 12 19:39:20.166454 kernel: TSC deadline timer available Feb 12 19:39:20.166487 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Feb 12 19:39:20.166500 kernel: [mem 0x80000000-0xfeffbfff] available for PCI devices Feb 12 19:39:20.166513 kernel: Booting paravirtualized kernel on KVM Feb 12 19:39:20.166526 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Feb 12 19:39:20.166544 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Feb 12 19:39:20.166555 kernel: percpu: Embedded 55 pages/cpu s185624 r8192 d31464 u1048576 Feb 12 19:39:20.166567 kernel: pcpu-alloc: s185624 r8192 d31464 u1048576 alloc=1*2097152 Feb 12 19:39:20.166580 kernel: pcpu-alloc: [0] 0 1 Feb 12 19:39:20.166592 kernel: kvm-guest: stealtime: cpu 0, msr 7dc1c0c0 Feb 12 19:39:20.166605 kernel: kvm-guest: PV spinlocks disabled, no host support Feb 12 19:39:20.166618 kernel: Built 1 zonelists, mobility grouping on. Total pages: 515800 Feb 12 19:39:20.166631 kernel: Policy zone: DMA32 Feb 12 19:39:20.166647 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:39:20.166664 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:39:20.166677 kernel: Dentry cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:39:20.166689 kernel: Inode-cache hash table entries: 131072 (order: 8, 1048576 bytes, linear) Feb 12 19:39:20.166701 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:39:20.166714 kernel: Memory: 1975320K/2096600K available (12294K kernel code, 2275K rwdata, 13700K rodata, 45496K init, 4048K bss, 121020K reserved, 0K cma-reserved) Feb 12 19:39:20.166726 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:39:20.166738 kernel: Kernel/User page tables isolation: enabled Feb 12 19:39:20.166750 kernel: ftrace: allocating 34475 entries in 135 pages Feb 12 19:39:20.166764 kernel: ftrace: allocated 135 pages with 4 groups Feb 12 19:39:20.166776 kernel: rcu: Hierarchical RCU implementation. Feb 12 19:39:20.166802 kernel: rcu: RCU event tracing is enabled. Feb 12 19:39:20.166815 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:39:20.166829 kernel: Rude variant of Tasks RCU enabled. Feb 12 19:39:20.166840 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:39:20.166849 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:39:20.166857 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:39:20.166866 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 16 Feb 12 19:39:20.166877 kernel: random: crng init done Feb 12 19:39:20.166885 kernel: Console: colour VGA+ 80x25 Feb 12 19:39:20.166894 kernel: printk: console [tty0] enabled Feb 12 19:39:20.166902 kernel: printk: console [ttyS0] enabled Feb 12 19:39:20.166910 kernel: ACPI: Core revision 20210730 Feb 12 19:39:20.166921 kernel: clocksource: hpet: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 19112604467 ns Feb 12 19:39:20.166934 kernel: APIC: Switch to symmetric I/O mode setup Feb 12 19:39:20.166947 kernel: x2apic enabled Feb 12 19:39:20.166959 kernel: Switched APIC routing to physical x2apic. Feb 12 19:39:20.166970 kernel: ..TIMER: vector=0x30 apic1=0 pin1=2 apic2=-1 pin2=-1 Feb 12 19:39:20.166979 kernel: clocksource: tsc-early: mask: 0xffffffffffffffff max_cycles: 0x39a85afc727, max_idle_ns: 881590685098 ns Feb 12 19:39:20.166988 kernel: Calibrating delay loop (skipped) preset value.. 3999.99 BogoMIPS (lpj=1999999) Feb 12 19:39:20.166996 kernel: Last level iTLB entries: 4KB 0, 2MB 0, 4MB 0 Feb 12 19:39:20.167005 kernel: Last level dTLB entries: 4KB 0, 2MB 0, 4MB 0, 1GB 0 Feb 12 19:39:20.167013 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Feb 12 19:39:20.167021 kernel: Spectre V2 : Mitigation: Retpolines Feb 12 19:39:20.167030 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Feb 12 19:39:20.167039 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Feb 12 19:39:20.167050 kernel: Spectre V2 : Enabling Restricted Speculation for firmware calls Feb 12 19:39:20.167068 kernel: Spectre V2 : mitigation: Enabling conditional Indirect Branch Prediction Barrier Feb 12 19:39:20.167077 kernel: Speculative Store Bypass: Mitigation: Speculative Store Bypass disabled via prctl and seccomp Feb 12 19:39:20.167088 kernel: MDS: Mitigation: Clear CPU buffers Feb 12 19:39:20.167096 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Feb 12 19:39:20.167105 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Feb 12 19:39:20.167114 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Feb 12 19:39:20.167123 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Feb 12 19:39:20.167132 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Feb 12 19:39:20.167141 kernel: x86/fpu: Enabled xstate features 0x7, context size is 832 bytes, using 'standard' format. Feb 12 19:39:20.167152 kernel: Freeing SMP alternatives memory: 32K Feb 12 19:39:20.167160 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:39:20.167169 kernel: LSM: Security Framework initializing Feb 12 19:39:20.167178 kernel: SELinux: Initializing. Feb 12 19:39:20.167187 kernel: Mount-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:39:20.167195 kernel: Mountpoint-cache hash table entries: 4096 (order: 3, 32768 bytes, linear) Feb 12 19:39:20.167207 kernel: smpboot: CPU0: Intel DO-Regular (family: 0x6, model: 0x3f, stepping: 0x2) Feb 12 19:39:20.167216 kernel: Performance Events: unsupported p6 CPU model 63 no PMU driver, software events only. Feb 12 19:39:20.167224 kernel: signal: max sigframe size: 1776 Feb 12 19:39:20.167233 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:39:20.167242 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Feb 12 19:39:20.167260 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:39:20.167269 kernel: x86: Booting SMP configuration: Feb 12 19:39:20.167282 kernel: .... node #0, CPUs: #1 Feb 12 19:39:20.167291 kernel: kvm-clock: cpu 1, msr 30faa041, secondary cpu clock Feb 12 19:39:20.167300 kernel: kvm-guest: stealtime: cpu 1, msr 7dd1c0c0 Feb 12 19:39:20.167311 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:39:20.167321 kernel: smpboot: Max logical packages: 1 Feb 12 19:39:20.167330 kernel: smpboot: Total of 2 processors activated (7999.99 BogoMIPS) Feb 12 19:39:20.167338 kernel: devtmpfs: initialized Feb 12 19:39:20.167347 kernel: x86/mm: Memory block size: 128MB Feb 12 19:39:20.167363 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:39:20.167372 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:39:20.167381 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:39:20.167392 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:39:20.167435 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:39:20.167449 kernel: audit: type=2000 audit(1707766759.551:1): state=initialized audit_enabled=0 res=1 Feb 12 19:39:20.167462 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:39:20.167476 kernel: thermal_sys: Registered thermal governor 'user_space' Feb 12 19:39:20.167485 kernel: cpuidle: using governor menu Feb 12 19:39:20.167493 kernel: ACPI: bus type PCI registered Feb 12 19:39:20.167502 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:39:20.167511 kernel: dca service started, version 1.12.1 Feb 12 19:39:20.167520 kernel: PCI: Using configuration type 1 for base access Feb 12 19:39:20.167532 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Feb 12 19:39:20.167541 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:39:20.167550 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:39:20.167563 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:39:20.167577 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:39:20.167590 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:39:20.167602 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:39:20.167612 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:39:20.167625 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:39:20.167641 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:39:20.167662 kernel: ACPI: Interpreter enabled Feb 12 19:39:20.167675 kernel: ACPI: PM: (supports S0 S5) Feb 12 19:39:20.167688 kernel: ACPI: Using IOAPIC for interrupt routing Feb 12 19:39:20.167699 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Feb 12 19:39:20.167710 kernel: ACPI: Enabled 2 GPEs in block 00 to 0F Feb 12 19:39:20.167722 kernel: ACPI: PCI Root Bridge [PCI0] (domain 0000 [bus 00-ff]) Feb 12 19:39:20.168045 kernel: acpi PNP0A03:00: _OSC: OS supports [ASPM ClockPM Segments MSI HPX-Type3] Feb 12 19:39:20.168173 kernel: acpi PNP0A03:00: fail to add MMCONFIG information, can't access extended PCI configuration space under this bridge. Feb 12 19:39:20.168191 kernel: acpiphp: Slot [3] registered Feb 12 19:39:20.168205 kernel: acpiphp: Slot [4] registered Feb 12 19:39:20.168218 kernel: acpiphp: Slot [5] registered Feb 12 19:39:20.168231 kernel: acpiphp: Slot [6] registered Feb 12 19:39:20.168244 kernel: acpiphp: Slot [7] registered Feb 12 19:39:20.168253 kernel: acpiphp: Slot [8] registered Feb 12 19:39:20.168261 kernel: acpiphp: Slot [9] registered Feb 12 19:39:20.168299 kernel: acpiphp: Slot [10] registered Feb 12 19:39:20.168310 kernel: acpiphp: Slot [11] registered Feb 12 19:39:20.168323 kernel: acpiphp: Slot [12] registered Feb 12 19:39:20.168336 kernel: acpiphp: Slot [13] registered Feb 12 19:39:20.168350 kernel: acpiphp: Slot [14] registered Feb 12 19:39:20.168360 kernel: acpiphp: Slot [15] registered Feb 12 19:39:20.168369 kernel: acpiphp: Slot [16] registered Feb 12 19:39:20.168378 kernel: acpiphp: Slot [17] registered Feb 12 19:39:20.168387 kernel: acpiphp: Slot [18] registered Feb 12 19:39:20.168395 kernel: acpiphp: Slot [19] registered Feb 12 19:39:20.168432 kernel: acpiphp: Slot [20] registered Feb 12 19:39:20.168441 kernel: acpiphp: Slot [21] registered Feb 12 19:39:20.168450 kernel: acpiphp: Slot [22] registered Feb 12 19:39:20.168459 kernel: acpiphp: Slot [23] registered Feb 12 19:39:20.168467 kernel: acpiphp: Slot [24] registered Feb 12 19:39:20.168486 kernel: acpiphp: Slot [25] registered Feb 12 19:39:20.168495 kernel: acpiphp: Slot [26] registered Feb 12 19:39:20.168503 kernel: acpiphp: Slot [27] registered Feb 12 19:39:20.168512 kernel: acpiphp: Slot [28] registered Feb 12 19:39:20.168524 kernel: acpiphp: Slot [29] registered Feb 12 19:39:20.168537 kernel: acpiphp: Slot [30] registered Feb 12 19:39:20.168550 kernel: acpiphp: Slot [31] registered Feb 12 19:39:20.168563 kernel: PCI host bridge to bus 0000:00 Feb 12 19:39:20.168763 kernel: pci_bus 0000:00: root bus resource [io 0x0000-0x0cf7 window] Feb 12 19:39:20.168901 kernel: pci_bus 0000:00: root bus resource [io 0x0d00-0xffff window] Feb 12 19:39:20.169037 kernel: pci_bus 0000:00: root bus resource [mem 0x000a0000-0x000bffff window] Feb 12 19:39:20.169166 kernel: pci_bus 0000:00: root bus resource [mem 0x80000000-0xfebfffff window] Feb 12 19:39:20.169319 kernel: pci_bus 0000:00: root bus resource [mem 0x100000000-0x17fffffff window] Feb 12 19:39:20.172722 kernel: pci_bus 0000:00: root bus resource [bus 00-ff] Feb 12 19:39:20.172981 kernel: pci 0000:00:00.0: [8086:1237] type 00 class 0x060000 Feb 12 19:39:20.173399 kernel: pci 0000:00:01.0: [8086:7000] type 00 class 0x060100 Feb 12 19:39:20.173683 kernel: pci 0000:00:01.1: [8086:7010] type 00 class 0x010180 Feb 12 19:39:20.173860 kernel: pci 0000:00:01.1: reg 0x20: [io 0xc1e0-0xc1ef] Feb 12 19:39:20.174093 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x10: [io 0x01f0-0x01f7] Feb 12 19:39:20.174300 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x14: [io 0x03f6] Feb 12 19:39:20.174475 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x18: [io 0x0170-0x0177] Feb 12 19:39:20.174633 kernel: pci 0000:00:01.1: legacy IDE quirk: reg 0x1c: [io 0x0376] Feb 12 19:39:20.174859 kernel: pci 0000:00:01.2: [8086:7020] type 00 class 0x0c0300 Feb 12 19:39:20.175231 kernel: pci 0000:00:01.2: reg 0x20: [io 0xc180-0xc19f] Feb 12 19:39:20.175433 kernel: pci 0000:00:01.3: [8086:7113] type 00 class 0x068000 Feb 12 19:39:20.175608 kernel: pci 0000:00:01.3: quirk: [io 0x0600-0x063f] claimed by PIIX4 ACPI Feb 12 19:39:20.175768 kernel: pci 0000:00:01.3: quirk: [io 0x0700-0x070f] claimed by PIIX4 SMB Feb 12 19:39:20.175957 kernel: pci 0000:00:02.0: [1af4:1050] type 00 class 0x030000 Feb 12 19:39:20.176115 kernel: pci 0000:00:02.0: reg 0x10: [mem 0xfe000000-0xfe7fffff pref] Feb 12 19:39:20.176276 kernel: pci 0000:00:02.0: reg 0x18: [mem 0xfe800000-0xfe803fff 64bit pref] Feb 12 19:39:20.176485 kernel: pci 0000:00:02.0: reg 0x20: [mem 0xfebf0000-0xfebf0fff] Feb 12 19:39:20.176637 kernel: pci 0000:00:02.0: reg 0x30: [mem 0xfebe0000-0xfebeffff pref] Feb 12 19:39:20.176802 kernel: pci 0000:00:02.0: Video device with shadowed ROM at [mem 0x000c0000-0x000dffff] Feb 12 19:39:20.176970 kernel: pci 0000:00:03.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:39:20.177132 kernel: pci 0000:00:03.0: reg 0x10: [io 0xc1a0-0xc1bf] Feb 12 19:39:20.177274 kernel: pci 0000:00:03.0: reg 0x14: [mem 0xfebf1000-0xfebf1fff] Feb 12 19:39:20.177456 kernel: pci 0000:00:03.0: reg 0x20: [mem 0xfe804000-0xfe807fff 64bit pref] Feb 12 19:39:20.177638 kernel: pci 0000:00:04.0: [1af4:1000] type 00 class 0x020000 Feb 12 19:39:20.177813 kernel: pci 0000:00:04.0: reg 0x10: [io 0xc1c0-0xc1df] Feb 12 19:39:20.177968 kernel: pci 0000:00:04.0: reg 0x14: [mem 0xfebf2000-0xfebf2fff] Feb 12 19:39:20.178124 kernel: pci 0000:00:04.0: reg 0x20: [mem 0xfe808000-0xfe80bfff 64bit pref] Feb 12 19:39:20.178333 kernel: pci 0000:00:05.0: [1af4:1004] type 00 class 0x010000 Feb 12 19:39:20.187572 kernel: pci 0000:00:05.0: reg 0x10: [io 0xc100-0xc13f] Feb 12 19:39:20.187776 kernel: pci 0000:00:05.0: reg 0x14: [mem 0xfebf3000-0xfebf3fff] Feb 12 19:39:20.187923 kernel: pci 0000:00:05.0: reg 0x20: [mem 0xfe80c000-0xfe80ffff 64bit pref] Feb 12 19:39:20.188110 kernel: pci 0000:00:06.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:39:20.188258 kernel: pci 0000:00:06.0: reg 0x10: [io 0xc000-0xc07f] Feb 12 19:39:20.188399 kernel: pci 0000:00:06.0: reg 0x14: [mem 0xfebf4000-0xfebf4fff] Feb 12 19:39:20.188566 kernel: pci 0000:00:06.0: reg 0x20: [mem 0xfe810000-0xfe813fff 64bit pref] Feb 12 19:39:20.188712 kernel: pci 0000:00:07.0: [1af4:1001] type 00 class 0x010000 Feb 12 19:39:20.188849 kernel: pci 0000:00:07.0: reg 0x10: [io 0xc080-0xc0ff] Feb 12 19:39:20.188985 kernel: pci 0000:00:07.0: reg 0x14: [mem 0xfebf5000-0xfebf5fff] Feb 12 19:39:20.189129 kernel: pci 0000:00:07.0: reg 0x20: [mem 0xfe814000-0xfe817fff 64bit pref] Feb 12 19:39:20.189494 kernel: pci 0000:00:08.0: [1af4:1002] type 00 class 0x00ff00 Feb 12 19:39:20.189653 kernel: pci 0000:00:08.0: reg 0x10: [io 0xc140-0xc17f] Feb 12 19:39:20.189822 kernel: pci 0000:00:08.0: reg 0x20: [mem 0xfe818000-0xfe81bfff 64bit pref] Feb 12 19:39:20.189840 kernel: ACPI: PCI: Interrupt link LNKA configured for IRQ 10 Feb 12 19:39:20.189853 kernel: ACPI: PCI: Interrupt link LNKB configured for IRQ 10 Feb 12 19:39:20.189867 kernel: ACPI: PCI: Interrupt link LNKC configured for IRQ 11 Feb 12 19:39:20.189888 kernel: ACPI: PCI: Interrupt link LNKD configured for IRQ 11 Feb 12 19:39:20.189900 kernel: ACPI: PCI: Interrupt link LNKS configured for IRQ 9 Feb 12 19:39:20.189913 kernel: iommu: Default domain type: Translated Feb 12 19:39:20.189927 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Feb 12 19:39:20.190091 kernel: pci 0000:00:02.0: vgaarb: setting as boot VGA device Feb 12 19:39:20.190233 kernel: pci 0000:00:02.0: vgaarb: VGA device added: decodes=io+mem,owns=io+mem,locks=none Feb 12 19:39:20.190391 kernel: pci 0000:00:02.0: vgaarb: bridge control possible Feb 12 19:39:20.190451 kernel: vgaarb: loaded Feb 12 19:39:20.190471 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:39:20.190482 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:39:20.190494 kernel: PTP clock support registered Feb 12 19:39:20.190512 kernel: PCI: Using ACPI for IRQ routing Feb 12 19:39:20.190530 kernel: PCI: pci_cache_line_size set to 64 bytes Feb 12 19:39:20.190542 kernel: e820: reserve RAM buffer [mem 0x0009fc00-0x0009ffff] Feb 12 19:39:20.190554 kernel: e820: reserve RAM buffer [mem 0x7ffd8000-0x7fffffff] Feb 12 19:39:20.190565 kernel: hpet0: at MMIO 0xfed00000, IRQs 2, 8, 0 Feb 12 19:39:20.190577 kernel: hpet0: 3 comparators, 64-bit 100.000000 MHz counter Feb 12 19:39:20.190593 kernel: clocksource: Switched to clocksource kvm-clock Feb 12 19:39:20.190608 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:39:20.190621 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:39:20.190633 kernel: pnp: PnP ACPI init Feb 12 19:39:20.190645 kernel: pnp: PnP ACPI: found 4 devices Feb 12 19:39:20.190658 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Feb 12 19:39:20.190671 kernel: NET: Registered PF_INET protocol family Feb 12 19:39:20.190682 kernel: IP idents hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:39:20.190695 kernel: tcp_listen_portaddr_hash hash table entries: 1024 (order: 2, 16384 bytes, linear) Feb 12 19:39:20.190713 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:39:20.190725 kernel: TCP established hash table entries: 16384 (order: 5, 131072 bytes, linear) Feb 12 19:39:20.190742 kernel: TCP bind hash table entries: 16384 (order: 6, 262144 bytes, linear) Feb 12 19:39:20.190757 kernel: TCP: Hash tables configured (established 16384 bind 16384) Feb 12 19:39:20.190801 kernel: UDP hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:39:20.190814 kernel: UDP-Lite hash table entries: 1024 (order: 3, 32768 bytes, linear) Feb 12 19:39:20.190826 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:39:20.190839 kernel: NET: Registered PF_XDP protocol family Feb 12 19:39:20.190999 kernel: pci_bus 0000:00: resource 4 [io 0x0000-0x0cf7 window] Feb 12 19:39:20.191155 kernel: pci_bus 0000:00: resource 5 [io 0x0d00-0xffff window] Feb 12 19:39:20.191289 kernel: pci_bus 0000:00: resource 6 [mem 0x000a0000-0x000bffff window] Feb 12 19:39:20.191456 kernel: pci_bus 0000:00: resource 7 [mem 0x80000000-0xfebfffff window] Feb 12 19:39:20.191709 kernel: pci_bus 0000:00: resource 8 [mem 0x100000000-0x17fffffff window] Feb 12 19:39:20.191918 kernel: pci 0000:00:01.0: PIIX3: Enabling Passive Release Feb 12 19:39:20.192100 kernel: pci 0000:00:00.0: Limiting direct PCI/PCI transfers Feb 12 19:39:20.192287 kernel: pci 0000:00:01.0: Activating ISA DMA hang workarounds Feb 12 19:39:20.192317 kernel: ACPI: \_SB_.LNKD: Enabled at IRQ 11 Feb 12 19:39:20.192622 kernel: pci 0000:00:01.2: quirk_usb_early_handoff+0x0/0x730 took 67132 usecs Feb 12 19:39:20.192645 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:39:20.192661 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Feb 12 19:39:20.192677 kernel: clocksource: tsc: mask: 0xffffffffffffffff max_cycles: 0x39a85afc727, max_idle_ns: 881590685098 ns Feb 12 19:39:20.192693 kernel: Initialise system trusted keyrings Feb 12 19:39:20.192709 kernel: workingset: timestamp_bits=39 max_order=19 bucket_order=0 Feb 12 19:39:20.192724 kernel: Key type asymmetric registered Feb 12 19:39:20.192739 kernel: Asymmetric key parser 'x509' registered Feb 12 19:39:20.192770 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:39:20.192785 kernel: io scheduler mq-deadline registered Feb 12 19:39:20.192810 kernel: io scheduler kyber registered Feb 12 19:39:20.192825 kernel: io scheduler bfq registered Feb 12 19:39:20.192841 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Feb 12 19:39:20.192856 kernel: ACPI: \_SB_.LNKB: Enabled at IRQ 10 Feb 12 19:39:20.192872 kernel: ACPI: \_SB_.LNKC: Enabled at IRQ 11 Feb 12 19:39:20.192887 kernel: ACPI: \_SB_.LNKA: Enabled at IRQ 10 Feb 12 19:39:20.192903 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:39:20.192918 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Feb 12 19:39:20.192958 kernel: i8042: PNP: PS/2 Controller [PNP0303:KBD,PNP0f13:MOU] at 0x60,0x64 irq 1,12 Feb 12 19:39:20.192984 kernel: serio: i8042 KBD port at 0x60,0x64 irq 1 Feb 12 19:39:20.193000 kernel: serio: i8042 AUX port at 0x60,0x64 irq 12 Feb 12 19:39:20.193015 kernel: input: AT Translated Set 2 keyboard as /devices/platform/i8042/serio0/input/input0 Feb 12 19:39:20.193210 kernel: rtc_cmos 00:03: RTC can wake from S4 Feb 12 19:39:20.193371 kernel: rtc_cmos 00:03: registered as rtc0 Feb 12 19:39:20.193655 kernel: rtc_cmos 00:03: setting system clock to 2024-02-12T19:39:19 UTC (1707766759) Feb 12 19:39:20.193820 kernel: rtc_cmos 00:03: alarms up to one day, y3k, 242 bytes nvram Feb 12 19:39:20.193835 kernel: intel_pstate: CPU model not supported Feb 12 19:39:20.193844 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:39:20.193854 kernel: Segment Routing with IPv6 Feb 12 19:39:20.193862 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:39:20.193872 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:39:20.193888 kernel: Key type dns_resolver registered Feb 12 19:39:20.193898 kernel: IPI shorthand broadcast: enabled Feb 12 19:39:20.193907 kernel: sched_clock: Marking stable (984070831, 162480893)->(1364204705, -217652981) Feb 12 19:39:20.193926 kernel: registered taskstats version 1 Feb 12 19:39:20.193939 kernel: Loading compiled-in X.509 certificates Feb 12 19:39:20.193958 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: 56154408a02b3bd349a9e9180c9bd837fd1d636a' Feb 12 19:39:20.193967 kernel: Key type .fscrypt registered Feb 12 19:39:20.193976 kernel: Key type fscrypt-provisioning registered Feb 12 19:39:20.193986 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:39:20.193999 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:39:20.194024 kernel: ima: No architecture policies found Feb 12 19:39:20.194037 kernel: Freeing unused kernel image (initmem) memory: 45496K Feb 12 19:39:20.194052 kernel: Write protecting the kernel read-only data: 28672k Feb 12 19:39:20.194086 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Feb 12 19:39:20.194103 kernel: Freeing unused kernel image (rodata/data gap) memory: 636K Feb 12 19:39:20.194118 kernel: Run /init as init process Feb 12 19:39:20.194141 kernel: with arguments: Feb 12 19:39:20.194158 kernel: /init Feb 12 19:39:20.194209 kernel: with environment: Feb 12 19:39:20.194225 kernel: HOME=/ Feb 12 19:39:20.194239 kernel: TERM=linux Feb 12 19:39:20.194256 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:39:20.194285 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:39:20.194309 systemd[1]: Detected virtualization kvm. Feb 12 19:39:20.194324 systemd[1]: Detected architecture x86-64. Feb 12 19:39:20.194337 systemd[1]: Running in initrd. Feb 12 19:39:20.194350 systemd[1]: No hostname configured, using default hostname. Feb 12 19:39:20.194369 systemd[1]: Hostname set to . Feb 12 19:39:20.194383 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:39:20.194393 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:39:20.194403 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:39:20.202559 systemd[1]: Reached target cryptsetup.target. Feb 12 19:39:20.202576 systemd[1]: Reached target paths.target. Feb 12 19:39:20.202590 systemd[1]: Reached target slices.target. Feb 12 19:39:20.202603 systemd[1]: Reached target swap.target. Feb 12 19:39:20.202615 systemd[1]: Reached target timers.target. Feb 12 19:39:20.202641 systemd[1]: Listening on iscsid.socket. Feb 12 19:39:20.202665 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:39:20.202687 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:39:20.202703 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:39:20.202715 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:39:20.202729 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:39:20.202743 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:39:20.202758 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:39:20.202789 systemd[1]: Reached target sockets.target. Feb 12 19:39:20.202799 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:39:20.202809 systemd[1]: Finished network-cleanup.service. Feb 12 19:39:20.202825 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:39:20.202835 systemd[1]: Starting systemd-journald.service... Feb 12 19:39:20.202845 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:39:20.202861 systemd[1]: Starting systemd-resolved.service... Feb 12 19:39:20.202870 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:39:20.202880 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:39:20.202890 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:39:20.202916 systemd-journald[185]: Journal started Feb 12 19:39:20.203177 systemd-journald[185]: Runtime Journal (/run/log/journal/b2e8e7cccdd84521a453285f7bdb0283) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:39:20.160553 systemd-modules-load[186]: Inserted module 'overlay' Feb 12 19:39:20.295749 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:39:20.295790 kernel: Bridge firewalling registered Feb 12 19:39:20.295812 kernel: SCSI subsystem initialized Feb 12 19:39:20.295830 systemd[1]: Started systemd-journald.service. Feb 12 19:39:20.295883 kernel: audit: type=1130 audit(1707766760.268:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.295905 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:39:20.295926 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:39:20.295945 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:39:20.295965 kernel: audit: type=1130 audit(1707766760.285:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.268000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.285000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.221553 systemd-modules-load[186]: Inserted module 'br_netfilter' Feb 12 19:39:20.311664 kernel: audit: type=1130 audit(1707766760.296:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.311708 kernel: audit: type=1130 audit(1707766760.303:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.296000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.303000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.233780 systemd-resolved[187]: Positive Trust Anchors: Feb 12 19:39:20.318640 kernel: audit: type=1130 audit(1707766760.311:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.233795 systemd-resolved[187]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:39:20.233846 systemd-resolved[187]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:39:20.247047 systemd-resolved[187]: Defaulting to hostname 'linux'. Feb 12 19:39:20.286386 systemd[1]: Started systemd-resolved.service. Feb 12 19:39:20.297136 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:39:20.302652 systemd-modules-load[186]: Inserted module 'dm_multipath' Feb 12 19:39:20.304705 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:39:20.312721 systemd[1]: Reached target nss-lookup.target. Feb 12 19:39:20.321045 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:39:20.325827 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:39:20.334602 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:39:20.351605 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:39:20.375685 kernel: audit: type=1130 audit(1707766760.351:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.375740 kernel: audit: type=1130 audit(1707766760.358:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.358000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.352625 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:39:20.359104 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:39:20.376000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.378454 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:39:20.385154 kernel: audit: type=1130 audit(1707766760.376:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.395948 dracut-cmdline[207]: dracut-dracut-053 Feb 12 19:39:20.400865 dracut-cmdline[207]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=ttyS0,115200n8 console=tty0 flatcar.first_boot=detected flatcar.oem.id=digitalocean verity.usrhash=4dbf910aaff679d18007a871aba359cc2cf6cb85992bb7598afad40271debbd6 Feb 12 19:39:20.503455 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:39:20.524485 kernel: iscsi: registered transport (tcp) Feb 12 19:39:20.558077 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:39:20.558190 kernel: QLogic iSCSI HBA Driver Feb 12 19:39:20.631049 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:39:20.631000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.633388 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:39:20.638792 kernel: audit: type=1130 audit(1707766760.631:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:20.712522 kernel: raid6: avx2x4 gen() 15577 MB/s Feb 12 19:39:20.730482 kernel: raid6: avx2x4 xor() 6733 MB/s Feb 12 19:39:20.748481 kernel: raid6: avx2x2 gen() 14856 MB/s Feb 12 19:39:20.777224 kernel: raid6: avx2x2 xor() 8836 MB/s Feb 12 19:39:20.794964 kernel: raid6: avx2x1 gen() 11762 MB/s Feb 12 19:39:20.812520 kernel: raid6: avx2x1 xor() 7653 MB/s Feb 12 19:39:20.830492 kernel: raid6: sse2x4 gen() 7543 MB/s Feb 12 19:39:20.848489 kernel: raid6: sse2x4 xor() 3943 MB/s Feb 12 19:39:20.866498 kernel: raid6: sse2x2 gen() 7312 MB/s Feb 12 19:39:20.884497 kernel: raid6: sse2x2 xor() 4828 MB/s Feb 12 19:39:20.902497 kernel: raid6: sse2x1 gen() 5490 MB/s Feb 12 19:39:20.921008 kernel: raid6: sse2x1 xor() 3978 MB/s Feb 12 19:39:20.921112 kernel: raid6: using algorithm avx2x4 gen() 15577 MB/s Feb 12 19:39:20.921126 kernel: raid6: .... xor() 6733 MB/s, rmw enabled Feb 12 19:39:20.922289 kernel: raid6: using avx2x2 recovery algorithm Feb 12 19:39:20.945493 kernel: xor: automatically using best checksumming function avx Feb 12 19:39:21.085497 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Feb 12 19:39:21.099597 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:39:21.099000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:21.100000 audit: BPF prog-id=7 op=LOAD Feb 12 19:39:21.100000 audit: BPF prog-id=8 op=LOAD Feb 12 19:39:21.101638 systemd[1]: Starting systemd-udevd.service... Feb 12 19:39:21.120645 systemd-udevd[384]: Using default interface naming scheme 'v252'. Feb 12 19:39:21.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:21.127436 systemd[1]: Started systemd-udevd.service. Feb 12 19:39:21.128983 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:39:21.149090 dracut-pre-trigger[389]: rd.md=0: removing MD RAID activation Feb 12 19:39:21.193235 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:39:21.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:21.195084 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:39:21.252000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:21.252267 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:39:21.339170 kernel: scsi host0: Virtio SCSI HBA Feb 12 19:39:21.350300 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:39:21.389501 kernel: virtio_blk virtio4: [vda] 125829120 512-byte logical blocks (64.4 GB/60.0 GiB) Feb 12 19:39:21.433444 kernel: GPT:Primary header thinks Alt. header is not at the end of the disk. Feb 12 19:39:21.433516 kernel: GPT:9289727 != 125829119 Feb 12 19:39:21.433530 kernel: GPT:Alternate GPT header not at the end of the disk. Feb 12 19:39:21.433541 kernel: GPT:9289727 != 125829119 Feb 12 19:39:21.433552 kernel: GPT: Use GNU Parted to correct GPT errors. Feb 12 19:39:21.433562 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:21.436784 kernel: virtio_blk virtio5: [vdb] 1000 512-byte logical blocks (512 kB/500 KiB) Feb 12 19:39:21.481910 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:39:21.534258 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/vda6 scanned by (udev-worker) (442) Feb 12 19:39:21.534304 kernel: AVX2 version of gcm_enc/dec engaged. Feb 12 19:39:21.534323 kernel: AES CTR mode by8 optimization enabled Feb 12 19:39:21.534342 kernel: libata version 3.00 loaded. Feb 12 19:39:21.534361 kernel: ata_piix 0000:00:01.1: version 2.13 Feb 12 19:39:21.534715 kernel: scsi host1: ata_piix Feb 12 19:39:21.534929 kernel: ACPI: bus type USB registered Feb 12 19:39:21.540483 kernel: usbcore: registered new interface driver usbfs Feb 12 19:39:21.540583 kernel: usbcore: registered new interface driver hub Feb 12 19:39:21.540602 kernel: usbcore: registered new device driver usb Feb 12 19:39:21.541435 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:39:21.548785 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:39:21.560617 kernel: scsi host2: ata_piix Feb 12 19:39:21.560899 kernel: ata1: PATA max MWDMA2 cmd 0x1f0 ctl 0x3f6 bmdma 0xc1e0 irq 14 Feb 12 19:39:21.560919 kernel: ata2: PATA max MWDMA2 cmd 0x170 ctl 0x376 bmdma 0xc1e8 irq 15 Feb 12 19:39:21.560931 kernel: ehci_hcd: USB 2.0 'Enhanced' Host Controller (EHCI) Driver Feb 12 19:39:21.555324 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:39:21.569669 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:39:21.574608 systemd[1]: Starting disk-uuid.service... Feb 12 19:39:21.583686 disk-uuid[480]: Primary Header is updated. Feb 12 19:39:21.583686 disk-uuid[480]: Secondary Entries is updated. Feb 12 19:39:21.583686 disk-uuid[480]: Secondary Header is updated. Feb 12 19:39:21.590504 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:21.597522 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:21.718443 kernel: ehci-pci: EHCI PCI platform driver Feb 12 19:39:21.737472 kernel: uhci_hcd: USB Universal Host Controller Interface driver Feb 12 19:39:21.758535 kernel: uhci_hcd 0000:00:01.2: UHCI Host Controller Feb 12 19:39:21.758872 kernel: uhci_hcd 0000:00:01.2: new USB bus registered, assigned bus number 1 Feb 12 19:39:21.759085 kernel: uhci_hcd 0000:00:01.2: detected 2 ports Feb 12 19:39:21.760945 kernel: uhci_hcd 0000:00:01.2: irq 11, io base 0x0000c180 Feb 12 19:39:21.761250 kernel: hub 1-0:1.0: USB hub found Feb 12 19:39:21.762172 kernel: hub 1-0:1.0: 2 ports detected Feb 12 19:39:22.597476 kernel: vda: vda1 vda2 vda3 vda4 vda6 vda7 vda9 Feb 12 19:39:22.598272 disk-uuid[487]: The operation has completed successfully. Feb 12 19:39:22.648030 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:39:22.649645 systemd[1]: Finished disk-uuid.service. Feb 12 19:39:22.650000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:22.650000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:22.652779 systemd[1]: Starting verity-setup.service... Feb 12 19:39:22.681467 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Feb 12 19:39:22.751982 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:39:22.754149 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:39:22.757344 systemd[1]: Finished verity-setup.service. Feb 12 19:39:22.757000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:22.866779 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:39:22.867344 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:39:22.868217 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:39:22.869522 systemd[1]: Starting ignition-setup.service... Feb 12 19:39:22.872175 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:39:22.887265 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:39:22.887372 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:39:22.887385 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:39:22.908955 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:39:22.919859 systemd[1]: Finished ignition-setup.service. Feb 12 19:39:22.920000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:22.922193 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:39:23.086254 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:39:23.086000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.088000 audit: BPF prog-id=9 op=LOAD Feb 12 19:39:23.089934 systemd[1]: Starting systemd-networkd.service... Feb 12 19:39:23.101360 ignition[599]: Ignition 2.14.0 Feb 12 19:39:23.101376 ignition[599]: Stage: fetch-offline Feb 12 19:39:23.101462 ignition[599]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.101536 ignition[599]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.107960 ignition[599]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.110508 ignition[599]: parsed url from cmdline: "" Feb 12 19:39:23.112000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.112289 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:39:23.110524 ignition[599]: no config URL provided Feb 12 19:39:23.110534 ignition[599]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:39:23.110549 ignition[599]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:39:23.110556 ignition[599]: failed to fetch config: resource requires networking Feb 12 19:39:23.110708 ignition[599]: Ignition finished successfully Feb 12 19:39:23.128958 systemd-networkd[691]: lo: Link UP Feb 12 19:39:23.128979 systemd-networkd[691]: lo: Gained carrier Feb 12 19:39:23.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.129885 systemd-networkd[691]: Enumeration completed Feb 12 19:39:23.130085 systemd[1]: Started systemd-networkd.service. Feb 12 19:39:23.131096 systemd[1]: Reached target network.target. Feb 12 19:39:23.133235 systemd[1]: Starting ignition-fetch.service... Feb 12 19:39:23.134664 systemd-networkd[691]: eth1: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:39:23.136116 systemd-networkd[691]: eth0: Configuring with /usr/lib/systemd/network/yy-digitalocean.network. Feb 12 19:39:23.150021 ignition[693]: Ignition 2.14.0 Feb 12 19:39:23.137816 systemd-networkd[691]: eth1: Link UP Feb 12 19:39:23.150030 ignition[693]: Stage: fetch Feb 12 19:39:23.137823 systemd-networkd[691]: eth1: Gained carrier Feb 12 19:39:23.150218 ignition[693]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.141905 systemd[1]: Starting iscsiuio.service... Feb 12 19:39:23.150240 ignition[693]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.153638 systemd-networkd[691]: eth0: Link UP Feb 12 19:39:23.152551 ignition[693]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.153644 systemd-networkd[691]: eth0: Gained carrier Feb 12 19:39:23.152703 ignition[693]: parsed url from cmdline: "" Feb 12 19:39:23.152709 ignition[693]: no config URL provided Feb 12 19:39:23.152719 ignition[693]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:39:23.152733 ignition[693]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:39:23.152787 ignition[693]: GET http://169.254.169.254/metadata/v1/user-data: attempt #1 Feb 12 19:39:23.172849 ignition[693]: GET error: Get "http://169.254.169.254/metadata/v1/user-data": dial tcp 169.254.169.254:80: connect: network is unreachable Feb 12 19:39:23.176622 systemd-networkd[691]: eth1: DHCPv4 address 10.124.0.9/20 acquired from 169.254.169.253 Feb 12 19:39:23.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.180660 systemd[1]: Started iscsiuio.service. Feb 12 19:39:23.182931 systemd[1]: Starting iscsid.service... Feb 12 19:39:23.188705 systemd-networkd[691]: eth0: DHCPv4 address 164.90.149.146/20, gateway 164.90.144.1 acquired from 169.254.169.253 Feb 12 19:39:23.192193 iscsid[702]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:39:23.192193 iscsid[702]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:39:23.192193 iscsid[702]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:39:23.192193 iscsid[702]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:39:23.192193 iscsid[702]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:39:23.192193 iscsid[702]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:39:23.192000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.192386 systemd[1]: Started iscsid.service. Feb 12 19:39:23.194541 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:39:23.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.216032 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:39:23.217039 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:39:23.217814 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:39:23.218607 systemd[1]: Reached target remote-fs.target. Feb 12 19:39:23.223885 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:39:23.241260 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:39:23.241000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.373384 ignition[693]: GET http://169.254.169.254/metadata/v1/user-data: attempt #2 Feb 12 19:39:23.391786 ignition[693]: GET result: OK Feb 12 19:39:23.392012 ignition[693]: parsing config with SHA512: ab13109f172bbd2257a7f895dfd53341aef2ea9bf7c256dccb499fd7b6f5d13b4853abca9fb745772c2bba0978632859722dc90cf933638bd9e0534d30f20e09 Feb 12 19:39:23.445275 unknown[693]: fetched base config from "system" Feb 12 19:39:23.445299 unknown[693]: fetched base config from "system" Feb 12 19:39:23.446203 ignition[693]: fetch: fetch complete Feb 12 19:39:23.445310 unknown[693]: fetched user config from "digitalocean" Feb 12 19:39:23.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.446212 ignition[693]: fetch: fetch passed Feb 12 19:39:23.448315 systemd[1]: Finished ignition-fetch.service. Feb 12 19:39:23.446276 ignition[693]: Ignition finished successfully Feb 12 19:39:23.450122 systemd[1]: Starting ignition-kargs.service... Feb 12 19:39:23.463849 ignition[716]: Ignition 2.14.0 Feb 12 19:39:23.463867 ignition[716]: Stage: kargs Feb 12 19:39:23.464044 ignition[716]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.464070 ignition[716]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.466660 ignition[716]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.468815 ignition[716]: kargs: kargs passed Feb 12 19:39:23.468918 ignition[716]: Ignition finished successfully Feb 12 19:39:23.470000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.470564 systemd[1]: Finished ignition-kargs.service. Feb 12 19:39:23.472617 systemd[1]: Starting ignition-disks.service... Feb 12 19:39:23.493084 ignition[722]: Ignition 2.14.0 Feb 12 19:39:23.493101 ignition[722]: Stage: disks Feb 12 19:39:23.493278 ignition[722]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.493305 ignition[722]: parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.495427 ignition[722]: no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.497104 ignition[722]: disks: disks passed Feb 12 19:39:23.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.498369 systemd[1]: Finished ignition-disks.service. Feb 12 19:39:23.497206 ignition[722]: Ignition finished successfully Feb 12 19:39:23.499279 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:39:23.499949 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:39:23.500576 systemd[1]: Reached target local-fs.target. Feb 12 19:39:23.501777 systemd[1]: Reached target sysinit.target. Feb 12 19:39:23.502920 systemd[1]: Reached target basic.target. Feb 12 19:39:23.505915 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:39:23.531469 systemd-fsck[729]: ROOT: clean, 602/553520 files, 56014/553472 blocks Feb 12 19:39:23.537279 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:39:23.537000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.539529 systemd[1]: Mounting sysroot.mount... Feb 12 19:39:23.552509 kernel: EXT4-fs (vda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:39:23.552986 systemd[1]: Mounted sysroot.mount. Feb 12 19:39:23.553953 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:39:23.557072 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:39:23.559099 systemd[1]: Starting flatcar-digitalocean-network.service... Feb 12 19:39:23.561205 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:39:23.561972 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:39:23.562052 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:39:23.568303 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:39:23.570577 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:39:23.585626 initrd-setup-root[741]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:39:23.605777 initrd-setup-root[749]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:39:23.618867 initrd-setup-root[757]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:39:23.639852 initrd-setup-root[767]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:39:23.737382 coreos-metadata[735]: Feb 12 19:39:23.737 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:39:23.748605 kernel: kauditd_printk_skb: 22 callbacks suppressed Feb 12 19:39:23.748688 kernel: audit: type=1130 audit(1707766763.746:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.746483 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:39:23.755494 coreos-metadata[735]: Feb 12 19:39:23.755 INFO Fetch successful Feb 12 19:39:23.756496 systemd[1]: Starting ignition-mount.service... Feb 12 19:39:23.760945 systemd[1]: Starting sysroot-boot.service... Feb 12 19:39:23.768122 systemd[1]: flatcar-digitalocean-network.service: Deactivated successfully. Feb 12 19:39:23.769572 systemd[1]: Finished flatcar-digitalocean-network.service. Feb 12 19:39:23.771000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.777477 kernel: audit: type=1130 audit(1707766763.771:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.771000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.782619 kernel: audit: type=1131 audit(1707766763.771:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-digitalocean-network comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.782663 coreos-metadata[736]: Feb 12 19:39:23.782 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:39:23.784518 bash[786]: umount: /sysroot/usr/share/oem: not mounted. Feb 12 19:39:23.794050 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:39:23.798487 coreos-metadata[736]: Feb 12 19:39:23.797 INFO Fetch successful Feb 12 19:39:23.805904 coreos-metadata[736]: Feb 12 19:39:23.805 INFO wrote hostname ci-3510.3.2-f-2b8c436d32 to /sysroot/etc/hostname Feb 12 19:39:23.809872 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:39:23.813397 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/vda6 scanned by mount (794) Feb 12 19:39:23.813631 ignition[788]: INFO : Ignition 2.14.0 Feb 12 19:39:23.813631 ignition[788]: INFO : Stage: mount Feb 12 19:39:23.815227 ignition[788]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.815227 ignition[788]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.837146 kernel: audit: type=1130 audit(1707766763.816:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.837200 kernel: BTRFS info (device vda6): using crc32c (crc32c-intel) checksum algorithm Feb 12 19:39:23.837222 kernel: BTRFS info (device vda6): using free space tree Feb 12 19:39:23.837241 kernel: BTRFS info (device vda6): has skinny extents Feb 12 19:39:23.816000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.837371 ignition[788]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.840693 ignition[788]: INFO : mount: mount passed Feb 12 19:39:23.840693 ignition[788]: INFO : Ignition finished successfully Feb 12 19:39:23.847996 kernel: audit: type=1130 audit(1707766763.841:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.841000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.841023 systemd[1]: Finished ignition-mount.service. Feb 12 19:39:23.856651 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:39:23.859076 systemd[1]: Starting ignition-files.service... Feb 12 19:39:23.872349 systemd[1]: Finished sysroot-boot.service. Feb 12 19:39:23.873000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.881457 kernel: audit: type=1130 audit(1707766763.873:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:23.899449 ignition[817]: INFO : Ignition 2.14.0 Feb 12 19:39:23.900834 ignition[817]: INFO : Stage: files Feb 12 19:39:23.901884 ignition[817]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:23.903041 ignition[817]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:23.905357 ignition[817]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:23.913040 ignition[817]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:39:23.915890 ignition[817]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:39:23.915890 ignition[817]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:39:23.921108 ignition[817]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:39:23.922853 ignition[817]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:39:23.924843 unknown[817]: wrote ssh authorized keys file for user: core Feb 12 19:39:23.925866 ignition[817]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:39:23.926846 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:39:23.926846 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-amd64-v1.3.0.tgz: attempt #1 Feb 12 19:39:24.444469 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:39:24.673581 systemd-networkd[691]: eth0: Gained IPv6LL Feb 12 19:39:24.769517 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 5d0324ca8a3c90c680b6e1fddb245a2255582fa15949ba1f3c6bb7323df9d3af754dae98d6e40ac9ccafb2999c932df2c4288d418949a4915d928eb23c090540 Feb 12 19:39:24.771696 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/cni-plugins-linux-amd64-v1.3.0.tgz" Feb 12 19:39:24.771696 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:39:24.771696 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-amd64.tar.gz: attempt #1 Feb 12 19:39:24.993710 systemd-networkd[691]: eth1: Gained IPv6LL Feb 12 19:39:25.172031 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:39:25.355375 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(4): file matches expected sum of: aa622325bf05520939f9e020d7a28ab48ac23e2fae6f47d5a4e52174c88c1ebc31b464853e4fd65bd8f5331f330a6ca96fd370d247d3eeaed042da4ee2d1219a Feb 12 19:39:25.355375 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-amd64.tar.gz" Feb 12 19:39:25.355375 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:39:25.360837 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Feb 12 19:39:25.368201 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:39:25.447130 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Feb 12 19:39:25.448969 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:39:25.450568 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubeadm: attempt #1 Feb 12 19:39:25.517116 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:39:25.913436 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: f40216b7d14046931c58072d10c7122934eac5a23c08821371f8b08ac1779443ad11d3458a4c5dcde7cf80fc600a9fefb14b1942aa46a52330248d497ca88836 Feb 12 19:39:25.915220 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:39:25.915220 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:39:25.915220 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubelet: attempt #1 Feb 12 19:39:25.960448 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:39:26.755858 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: a283da2224d456958b2cb99b4f6faf4457c4ed89e9e95f37d970c637f6a7f64ff4dd4d2bfce538759b2d2090933bece599a285ef8fd132eb383fece9a3941560 Feb 12 19:39:26.758647 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:39:26.759996 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:39:26.759996 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/amd64/kubectl: attempt #1 Feb 12 19:39:26.809677 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:39:27.088099 ignition[817]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 857e67001e74840518413593d90c6e64ad3f00d55fa44ad9a8e2ed6135392c908caff7ec19af18cbe10784b8f83afe687a0bc3bacbc9eee984cdeb9c0749cb83 Feb 12 19:39:27.088099 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:39:27.088099 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:39:27.092128 ignition[817]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(f): [started] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(f): [finished] processing unit "coreos-metadata-sshkeys@.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(10): [started] processing unit "prepare-helm.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(10): op(11): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(10): op(11): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(10): [finished] processing unit "prepare-helm.service" Feb 12 19:39:27.092128 ignition[817]: INFO : files: op(12): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:39:27.147106 kernel: audit: type=1130 audit(1707766767.102:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.147141 kernel: audit: type=1130 audit(1707766767.117:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.147155 kernel: audit: type=1131 audit(1707766767.118:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.147168 kernel: audit: type=1130 audit(1707766767.127:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.117000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.118000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.100820 systemd[1]: Finished ignition-files.service. Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(12): op(13): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(12): op(13): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(12): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(14): [started] processing unit "prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(14): op(15): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(14): op(15): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(14): [finished] processing unit "prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(16): [started] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(16): [finished] setting preset to enabled for "coreos-metadata-sshkeys@.service " Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(17): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(17): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(18): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(19): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:39:27.148150 ignition[817]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:39:27.148150 ignition[817]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:39:27.148150 ignition[817]: INFO : files: files passed Feb 12 19:39:27.148150 ignition[817]: INFO : Ignition finished successfully Feb 12 19:39:27.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.161000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.104305 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:39:27.110127 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:39:27.169111 initrd-setup-root-after-ignition[842]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:39:27.111647 systemd[1]: Starting ignition-quench.service... Feb 12 19:39:27.117091 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:39:27.117262 systemd[1]: Finished ignition-quench.service. Feb 12 19:39:27.119197 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:39:27.128203 systemd[1]: Reached target ignition-complete.target. Feb 12 19:39:27.134712 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:39:27.160149 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:39:27.160316 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:39:27.161873 systemd[1]: Reached target initrd-fs.target. Feb 12 19:39:27.163088 systemd[1]: Reached target initrd.target. Feb 12 19:39:27.164579 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:39:27.166082 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:39:27.185332 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:39:27.185000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.187502 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:39:27.201156 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:39:27.202871 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:39:27.204344 systemd[1]: Stopped target timers.target. Feb 12 19:39:27.205708 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:39:27.206726 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:39:27.207000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.208352 systemd[1]: Stopped target initrd.target. Feb 12 19:39:27.209670 systemd[1]: Stopped target basic.target. Feb 12 19:39:27.210990 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:39:27.212382 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:39:27.213742 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:39:27.215166 systemd[1]: Stopped target remote-fs.target. Feb 12 19:39:27.216483 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:39:27.217852 systemd[1]: Stopped target sysinit.target. Feb 12 19:39:27.219182 systemd[1]: Stopped target local-fs.target. Feb 12 19:39:27.220498 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:39:27.221818 systemd[1]: Stopped target swap.target. Feb 12 19:39:27.223084 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:39:27.224030 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:39:27.224000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.225590 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:39:27.226900 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:39:27.227843 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:39:27.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.229361 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:39:27.229679 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:39:27.230000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.231090 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:39:27.231000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.231217 systemd[1]: Stopped ignition-files.service. Feb 12 19:39:27.232000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.232164 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:39:27.232296 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:39:27.234703 systemd[1]: Stopping ignition-mount.service... Feb 12 19:39:27.237558 systemd[1]: Stopping iscsid.service... Feb 12 19:39:27.239831 iscsid[702]: iscsid shutting down. Feb 12 19:39:27.240798 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:39:27.242100 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:39:27.242317 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:39:27.244000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.244708 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:39:27.245854 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:39:27.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.249539 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:39:27.250641 systemd[1]: Stopped iscsid.service. Feb 12 19:39:27.251000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.253839 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:39:27.254780 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:39:27.255000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.259927 systemd[1]: Stopping iscsiuio.service... Feb 12 19:39:27.261494 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:39:27.262357 systemd[1]: Stopped iscsiuio.service. Feb 12 19:39:27.263116 ignition[855]: INFO : Ignition 2.14.0 Feb 12 19:39:27.263116 ignition[855]: INFO : Stage: umount Feb 12 19:39:27.264000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.267488 ignition[855]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:39:27.267488 ignition[855]: DEBUG : parsing config with SHA512: 865c03baa79b8c74023d13a0b3666474fa06a165421a1e05731b76e0f557d42c5c89d4870a0b9c4182ad7d4d8209de20dca9c9da63d637e0410fbd60314cac6c Feb 12 19:39:27.271831 ignition[855]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/digitalocean" Feb 12 19:39:27.273959 ignition[855]: INFO : umount: umount passed Feb 12 19:39:27.274805 ignition[855]: INFO : Ignition finished successfully Feb 12 19:39:27.276138 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:39:27.279295 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:39:27.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.279448 systemd[1]: Stopped ignition-mount.service. Feb 12 19:39:27.280901 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:39:27.281000 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:39:27.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.283763 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:39:27.284000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.283849 systemd[1]: Stopped ignition-disks.service. Feb 12 19:39:27.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.284603 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:39:27.284651 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:39:27.298000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.285599 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:39:27.285667 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:39:27.286456 systemd[1]: Stopped target network.target. Feb 12 19:39:27.287595 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:39:27.287704 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:39:27.298871 systemd[1]: Stopped target paths.target. Feb 12 19:39:27.299830 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:39:27.303488 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:39:27.304588 systemd[1]: Stopped target slices.target. Feb 12 19:39:27.305794 systemd[1]: Stopped target sockets.target. Feb 12 19:39:27.307051 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:39:27.307120 systemd[1]: Closed iscsid.socket. Feb 12 19:39:27.309000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.308079 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:39:27.310000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.308120 systemd[1]: Closed iscsiuio.socket. Feb 12 19:39:27.309167 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:39:27.309235 systemd[1]: Stopped ignition-setup.service. Feb 12 19:39:27.310353 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:39:27.310404 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:39:27.311625 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:39:27.313039 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:39:27.316603 systemd-networkd[691]: eth1: DHCPv6 lease lost Feb 12 19:39:27.320000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.319741 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:39:27.319871 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:39:27.321684 systemd-networkd[691]: eth0: DHCPv6 lease lost Feb 12 19:39:27.322000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:39:27.323604 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:39:27.323733 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:39:27.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.325517 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:39:27.326000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:39:27.325569 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:39:27.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.327485 systemd[1]: Stopping network-cleanup.service... Feb 12 19:39:27.329000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.328064 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:39:27.328142 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:39:27.328861 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:39:27.328911 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:39:27.329583 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:39:27.329645 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:39:27.341000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.330620 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:39:27.339230 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:39:27.340958 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:39:27.341157 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:39:27.348000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.342744 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:39:27.349000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.342810 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:39:27.350000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.343908 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:39:27.343980 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:39:27.347461 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:39:27.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.347571 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:39:27.348674 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:39:27.348742 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:39:27.363000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.349659 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:39:27.364000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.349720 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:39:27.352254 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:39:27.352934 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:39:27.367000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.353072 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:39:27.368000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.368000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.354550 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:39:27.354615 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:39:27.364086 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:39:27.364185 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:39:27.366466 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:39:27.367161 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:39:27.367282 systemd[1]: Stopped network-cleanup.service. Feb 12 19:39:27.368248 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:39:27.368355 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:39:27.369266 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:39:27.371224 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:39:27.386902 systemd[1]: Switching root. Feb 12 19:39:27.408539 systemd-journald[185]: Journal stopped Feb 12 19:39:31.278549 systemd-journald[185]: Received SIGTERM from PID 1 (systemd). Feb 12 19:39:31.278690 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:39:31.278715 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:39:31.278732 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:39:31.278745 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:39:31.278757 kernel: SELinux: policy capability open_perms=1 Feb 12 19:39:31.278775 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:39:31.278786 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:39:31.278799 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:39:31.278821 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:39:31.278834 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:39:31.278852 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:39:31.278865 systemd[1]: Successfully loaded SELinux policy in 51.611ms. Feb 12 19:39:31.278892 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 9.323ms. Feb 12 19:39:31.278912 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:39:31.278926 systemd[1]: Detected virtualization kvm. Feb 12 19:39:31.278940 systemd[1]: Detected architecture x86-64. Feb 12 19:39:31.278954 systemd[1]: Detected first boot. Feb 12 19:39:31.278967 systemd[1]: Hostname set to . Feb 12 19:39:31.278984 systemd[1]: Initializing machine ID from VM UUID. Feb 12 19:39:31.278997 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:39:31.279011 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:39:31.279027 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:39:31.279042 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:39:31.279058 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:39:31.279071 kernel: kauditd_printk_skb: 56 callbacks suppressed Feb 12 19:39:31.279083 kernel: audit: type=1334 audit(1707766771.026:92): prog-id=12 op=LOAD Feb 12 19:39:31.279095 kernel: audit: type=1334 audit(1707766771.028:93): prog-id=3 op=UNLOAD Feb 12 19:39:31.279107 kernel: audit: type=1334 audit(1707766771.030:94): prog-id=13 op=LOAD Feb 12 19:39:31.279119 kernel: audit: type=1334 audit(1707766771.031:95): prog-id=14 op=LOAD Feb 12 19:39:31.279133 kernel: audit: type=1334 audit(1707766771.031:96): prog-id=4 op=UNLOAD Feb 12 19:39:31.279144 kernel: audit: type=1334 audit(1707766771.031:97): prog-id=5 op=UNLOAD Feb 12 19:39:31.279158 kernel: audit: type=1334 audit(1707766771.034:98): prog-id=15 op=LOAD Feb 12 19:39:31.279171 kernel: audit: type=1334 audit(1707766771.034:99): prog-id=12 op=UNLOAD Feb 12 19:39:31.279184 kernel: audit: type=1334 audit(1707766771.036:100): prog-id=16 op=LOAD Feb 12 19:39:31.279196 kernel: audit: type=1334 audit(1707766771.038:101): prog-id=17 op=LOAD Feb 12 19:39:31.279209 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:39:31.279223 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:39:31.279238 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:39:31.279253 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:39:31.279269 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:39:31.279283 systemd[1]: Created slice system-coreos\x2dmetadata\x2dsshkeys.slice. Feb 12 19:39:31.279296 systemd[1]: Created slice system-getty.slice. Feb 12 19:39:31.279310 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:39:31.279324 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:39:31.279339 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:39:31.279352 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:39:31.279364 systemd[1]: Created slice user.slice. Feb 12 19:39:31.279378 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:39:31.279391 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:39:31.279404 systemd[1]: Set up automount boot.automount. Feb 12 19:39:31.279449 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:39:31.279468 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:39:31.279481 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:39:31.279501 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:39:31.279515 systemd[1]: Reached target integritysetup.target. Feb 12 19:39:31.279528 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:39:31.279540 systemd[1]: Reached target remote-fs.target. Feb 12 19:39:31.279553 systemd[1]: Reached target slices.target. Feb 12 19:39:31.279566 systemd[1]: Reached target swap.target. Feb 12 19:39:31.279580 systemd[1]: Reached target torcx.target. Feb 12 19:39:31.279594 systemd[1]: Reached target veritysetup.target. Feb 12 19:39:31.279606 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:39:31.279622 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:39:31.279635 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:39:31.279648 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:39:31.279660 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:39:31.279673 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:39:31.279689 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:39:31.279704 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:39:31.279717 systemd[1]: Mounting media.mount... Feb 12 19:39:31.279731 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:39:31.279743 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:39:31.279759 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:39:31.279771 systemd[1]: Mounting tmp.mount... Feb 12 19:39:31.279787 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:39:31.279801 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:39:31.279815 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:39:31.279827 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:39:31.279841 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:39:31.279854 systemd[1]: Starting modprobe@drm.service... Feb 12 19:39:31.279866 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:39:31.279882 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:39:31.279896 systemd[1]: Starting modprobe@loop.service... Feb 12 19:39:31.279915 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:39:31.279931 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:39:31.279944 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:39:31.279959 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:39:31.279973 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:39:31.279986 systemd[1]: Stopped systemd-journald.service. Feb 12 19:39:31.279998 systemd[1]: Starting systemd-journald.service... Feb 12 19:39:31.280011 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:39:31.280024 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:39:31.280037 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:39:31.280050 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:39:31.280064 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:39:31.280079 systemd[1]: Stopped verity-setup.service. Feb 12 19:39:31.280095 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:39:31.280108 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:39:31.280120 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:39:31.280133 systemd[1]: Mounted media.mount. Feb 12 19:39:31.280147 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:39:31.280160 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:39:31.280173 systemd[1]: Mounted tmp.mount. Feb 12 19:39:31.280186 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:39:31.280199 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:39:31.280215 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:39:31.280227 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:39:31.280241 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:39:31.280254 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:39:31.280270 systemd[1]: Finished modprobe@drm.service. Feb 12 19:39:31.280292 systemd-journald[956]: Journal started Feb 12 19:39:31.280376 systemd-journald[956]: Runtime Journal (/run/log/journal/b2e8e7cccdd84521a453285f7bdb0283) is 4.9M, max 39.5M, 34.5M free. Feb 12 19:39:31.285548 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:39:27.564000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:39:27.627000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:39:27.627000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:39:27.627000 audit: BPF prog-id=10 op=LOAD Feb 12 19:39:31.288247 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:39:31.288327 kernel: fuse: init (API version 7.34) Feb 12 19:39:27.627000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:39:27.627000 audit: BPF prog-id=11 op=LOAD Feb 12 19:39:31.290539 systemd[1]: Started systemd-journald.service. Feb 12 19:39:27.627000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:39:27.737000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:39:27.737000 audit[887]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00014d8a2 a1=c0000cedf8 a2=c0000d70c0 a3=32 items=0 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:27.737000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:39:27.741000 audit[887]: AVC avc: denied { associate } for pid=887 comm="torcx-generator" name="usr" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:39:27.741000 audit[887]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00014d979 a2=1ed a3=0 items=2 ppid=870 pid=887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:27.741000 audit: CWD cwd="/" Feb 12 19:39:27.741000 audit: PATH item=0 name=(null) inode=2 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:27.741000 audit: PATH item=1 name=(null) inode=3 dev=00:1a mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:27.741000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:39:31.026000 audit: BPF prog-id=12 op=LOAD Feb 12 19:39:31.028000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:39:31.030000 audit: BPF prog-id=13 op=LOAD Feb 12 19:39:31.031000 audit: BPF prog-id=14 op=LOAD Feb 12 19:39:31.031000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:39:31.031000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:39:31.034000 audit: BPF prog-id=15 op=LOAD Feb 12 19:39:31.034000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:39:31.036000 audit: BPF prog-id=16 op=LOAD Feb 12 19:39:31.038000 audit: BPF prog-id=17 op=LOAD Feb 12 19:39:31.038000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:39:31.038000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:39:31.044000 audit: BPF prog-id=18 op=LOAD Feb 12 19:39:31.044000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:39:31.044000 audit: BPF prog-id=19 op=LOAD Feb 12 19:39:31.044000 audit: BPF prog-id=20 op=LOAD Feb 12 19:39:31.044000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:39:31.044000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:39:31.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.048000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:39:31.049000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.049000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.195000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.199000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.201000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.201000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.202000 audit: BPF prog-id=21 op=LOAD Feb 12 19:39:31.203000 audit: BPF prog-id=22 op=LOAD Feb 12 19:39:31.203000 audit: BPF prog-id=23 op=LOAD Feb 12 19:39:31.203000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:39:31.203000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:39:31.238000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.261000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.273000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:39:31.273000 audit[956]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7fffecb4d370 a2=4000 a3=7fffecb4d40c items=0 ppid=1 pid=956 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:31.273000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:39:31.274000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.280000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.292000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.024219 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:39:31.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.295000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.295000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:27.735067 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:39:31.024246 systemd[1]: Unnecessary job was removed for dev-vda6.device. Feb 12 19:39:27.735692 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:39:31.045248 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:39:27.735716 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:39:31.291295 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:39:27.736013 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:39:31.292299 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:39:27.736025 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:39:31.293179 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:39:27.736074 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:39:31.295010 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:39:27.736090 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:39:31.295215 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:39:27.736423 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:39:31.296133 systemd[1]: Reached target network-pre.target. Feb 12 19:39:27.736495 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:39:31.298643 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:39:27.736514 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:39:27.737203 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:39:27.737245 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:39:27.737269 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:39:27.737287 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:39:27.737307 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:39:27.737322 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:27Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:39:30.596898 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:30.597209 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:30.597329 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:30.597568 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:39:30.597629 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:39:30.597710 /usr/lib/systemd/system-generators/torcx-generator[887]: time="2024-02-12T19:39:30Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:39:31.314578 kernel: loop: module loaded Feb 12 19:39:31.306698 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:39:31.307494 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:39:31.311474 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:39:31.326000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.327000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.334805 systemd-journald[956]: Time spent on flushing to /var/log/journal/b2e8e7cccdd84521a453285f7bdb0283 is 60.911ms for 1191 entries. Feb 12 19:39:31.334805 systemd-journald[956]: System Journal (/var/log/journal/b2e8e7cccdd84521a453285f7bdb0283) is 8.0M, max 195.6M, 187.6M free. Feb 12 19:39:31.413098 systemd-journald[956]: Received client request to flush runtime journal. Feb 12 19:39:31.338000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.365000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.313998 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:39:31.314874 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:39:31.316582 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:39:31.320796 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:39:31.326359 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:39:31.326687 systemd[1]: Finished modprobe@loop.service. Feb 12 19:39:31.330781 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:39:31.331686 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:39:31.332868 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:39:31.338690 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:39:31.339476 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:39:31.364946 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:39:31.414314 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:39:31.414000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.417046 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:39:31.417000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.419578 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:39:31.426662 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:39:31.429056 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:39:31.426000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.441561 udevadm[996]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Feb 12 19:39:31.451784 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:39:31.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.455095 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:39:31.493986 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:39:31.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.992445 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:39:31.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:31.993000 audit: BPF prog-id=24 op=LOAD Feb 12 19:39:31.993000 audit: BPF prog-id=25 op=LOAD Feb 12 19:39:31.993000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:39:31.993000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:39:31.994958 systemd[1]: Starting systemd-udevd.service... Feb 12 19:39:32.020593 systemd-udevd[999]: Using default interface naming scheme 'v252'. Feb 12 19:39:32.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.050000 audit: BPF prog-id=26 op=LOAD Feb 12 19:39:32.048629 systemd[1]: Started systemd-udevd.service. Feb 12 19:39:32.051646 systemd[1]: Starting systemd-networkd.service... Feb 12 19:39:32.063000 audit: BPF prog-id=27 op=LOAD Feb 12 19:39:32.063000 audit: BPF prog-id=28 op=LOAD Feb 12 19:39:32.063000 audit: BPF prog-id=29 op=LOAD Feb 12 19:39:32.064825 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:39:32.123000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.123451 systemd[1]: Started systemd-userdbd.service. Feb 12 19:39:32.153686 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:39:32.153863 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:39:32.155467 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:39:32.157678 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:39:32.161688 systemd[1]: Starting modprobe@loop.service... Feb 12 19:39:32.163550 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:39:32.163622 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:39:32.163709 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Feb 12 19:39:32.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.166000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.165304 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:39:32.165560 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:39:32.168000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.168000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.168565 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:39:32.168735 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:39:32.169696 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:39:32.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.180000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.179900 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:39:32.180062 systemd[1]: Finished modprobe@loop.service. Feb 12 19:39:32.180824 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:39:32.197829 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Feb 12 19:39:32.213354 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:39:32.244307 systemd-networkd[1005]: lo: Link UP Feb 12 19:39:32.244319 systemd-networkd[1005]: lo: Gained carrier Feb 12 19:39:32.245480 systemd-networkd[1005]: Enumeration completed Feb 12 19:39:32.246000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.245764 systemd[1]: Started systemd-networkd.service. Feb 12 19:39:32.247304 systemd-networkd[1005]: eth1: Configuring with /run/systemd/network/10-de:2b:e7:f0:4b:b1.network. Feb 12 19:39:32.248785 systemd-networkd[1005]: eth0: Configuring with /run/systemd/network/10-4e:cc:d1:45:89:80.network. Feb 12 19:39:32.249777 systemd-networkd[1005]: eth1: Link UP Feb 12 19:39:32.249873 systemd-networkd[1005]: eth1: Gained carrier Feb 12 19:39:32.254011 systemd-networkd[1005]: eth0: Link UP Feb 12 19:39:32.254033 systemd-networkd[1005]: eth0: Gained carrier Feb 12 19:39:32.285458 kernel: input: Power Button as /devices/LNXSYSTM:00/LNXPWRBN:00/input/input2 Feb 12 19:39:32.303000 audit[1008]: AVC avc: denied { confidentiality } for pid=1008 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:39:32.311452 kernel: ACPI: button: Power Button [PWRF] Feb 12 19:39:32.303000 audit[1008]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=55c518dc4170 a1=32194 a2=7f419baeabc5 a3=5 items=108 ppid=999 pid=1008 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:32.303000 audit: CWD cwd="/" Feb 12 19:39:32.303000 audit: PATH item=0 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=1 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=2 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=3 name=(null) inode=13851 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=4 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=5 name=(null) inode=13852 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=6 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=7 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=8 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=9 name=(null) inode=13854 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=10 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=11 name=(null) inode=13855 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=12 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=13 name=(null) inode=13856 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=14 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=15 name=(null) inode=13857 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=16 name=(null) inode=13853 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=17 name=(null) inode=13858 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=18 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=19 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=20 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=21 name=(null) inode=13860 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=22 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=23 name=(null) inode=13861 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=24 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=25 name=(null) inode=13862 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=26 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=27 name=(null) inode=13863 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=28 name=(null) inode=13859 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=29 name=(null) inode=13864 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=30 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=31 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=32 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=33 name=(null) inode=13866 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=34 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=35 name=(null) inode=13867 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=36 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=37 name=(null) inode=13868 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=38 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=39 name=(null) inode=13869 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=40 name=(null) inode=13865 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=41 name=(null) inode=13870 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=42 name=(null) inode=13850 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=43 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=44 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=45 name=(null) inode=13872 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=46 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=47 name=(null) inode=13873 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=48 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=49 name=(null) inode=13874 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=50 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=51 name=(null) inode=13875 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=52 name=(null) inode=13871 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=53 name=(null) inode=13876 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=54 name=(null) inode=45 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=55 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=56 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=57 name=(null) inode=13878 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=58 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=59 name=(null) inode=13879 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=60 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=61 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=62 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=63 name=(null) inode=13881 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=64 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=65 name=(null) inode=13882 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=66 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=67 name=(null) inode=13883 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=68 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=69 name=(null) inode=13884 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=70 name=(null) inode=13880 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=71 name=(null) inode=13885 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=72 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=73 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=74 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=75 name=(null) inode=13887 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=76 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=77 name=(null) inode=13888 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=78 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=79 name=(null) inode=13889 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=80 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=81 name=(null) inode=13890 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=82 name=(null) inode=13886 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=83 name=(null) inode=13891 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=84 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=85 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=86 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=87 name=(null) inode=13893 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=88 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=89 name=(null) inode=13894 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=90 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=91 name=(null) inode=13895 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=92 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=93 name=(null) inode=13896 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=94 name=(null) inode=13892 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=95 name=(null) inode=13897 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=96 name=(null) inode=13877 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=97 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=98 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=99 name=(null) inode=13899 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.332511 kernel: piix4_smbus 0000:00:01.3: SMBus Host Controller at 0x700, revision 0 Feb 12 19:39:32.303000 audit: PATH item=100 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=101 name=(null) inode=13900 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=102 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=103 name=(null) inode=13901 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=104 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=105 name=(null) inode=13902 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=106 name=(null) inode=13898 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PATH item=107 name=(null) inode=13903 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:39:32.303000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:39:32.372476 kernel: input: ImExPS/2 Generic Explorer Mouse as /devices/platform/i8042/serio1/input/input3 Feb 12 19:39:32.381516 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:39:32.542468 kernel: EDAC MC: Ver: 3.0.0 Feb 12 19:39:32.563154 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:39:32.563000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.565610 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:39:32.585847 lvm[1037]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:39:32.614374 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:39:32.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.615149 systemd[1]: Reached target cryptsetup.target. Feb 12 19:39:32.617223 systemd[1]: Starting lvm2-activation.service... Feb 12 19:39:32.624718 lvm[1038]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:39:32.654562 systemd[1]: Finished lvm2-activation.service. Feb 12 19:39:32.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.655543 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:39:32.657974 systemd[1]: Mounting media-configdrive.mount... Feb 12 19:39:32.658586 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:39:32.658640 systemd[1]: Reached target machines.target. Feb 12 19:39:32.661271 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:39:32.676157 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:39:32.676000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.678443 kernel: ISO 9660 Extensions: RRIP_1991A Feb 12 19:39:32.680029 systemd[1]: Mounted media-configdrive.mount. Feb 12 19:39:32.680760 systemd[1]: Reached target local-fs.target. Feb 12 19:39:32.682978 systemd[1]: Starting ldconfig.service... Feb 12 19:39:32.684234 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:39:32.684299 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:32.689625 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:39:32.692145 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:39:32.692991 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:39:32.693065 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:39:32.695458 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:39:32.702543 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1044 (bootctl) Feb 12 19:39:32.704431 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:39:32.726257 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:39:32.732286 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:39:32.738977 systemd-tmpfiles[1046]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:39:32.811403 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:39:32.813531 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:39:32.813000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.840579 systemd-fsck[1050]: fsck.fat 4.2 (2021-01-31) Feb 12 19:39:32.840579 systemd-fsck[1050]: /dev/vda1: 789 files, 115339/258078 clusters Feb 12 19:39:32.842357 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:39:32.842000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:32.844729 systemd[1]: Mounting boot.mount... Feb 12 19:39:32.858606 systemd[1]: Mounted boot.mount. Feb 12 19:39:32.881602 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:39:32.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.003332 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:39:33.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.005860 systemd[1]: Starting audit-rules.service... Feb 12 19:39:33.008010 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:39:33.010905 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:39:33.015000 audit: BPF prog-id=30 op=LOAD Feb 12 19:39:33.019000 audit: BPF prog-id=31 op=LOAD Feb 12 19:39:33.016890 systemd[1]: Starting systemd-resolved.service... Feb 12 19:39:33.022791 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:39:33.025654 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:39:33.044785 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:39:33.045000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.045583 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:39:33.049000 audit[1058]: SYSTEM_BOOT pid=1058 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.051199 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:39:33.051000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.083810 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:39:33.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.123332 ldconfig[1043]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:39:33.133022 systemd[1]: Finished ldconfig.service. Feb 12 19:39:33.136719 systemd[1]: Starting systemd-update-done.service... Feb 12 19:39:33.134000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ldconfig comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:33.147000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:39:33.147000 audit[1073]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffe91b2d2c0 a2=420 a3=0 items=0 ppid=1053 pid=1073 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:33.147000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:39:33.147969 augenrules[1073]: No rules Feb 12 19:39:33.148700 systemd[1]: Finished audit-rules.service. Feb 12 19:39:33.153207 systemd[1]: Finished systemd-update-done.service. Feb 12 19:39:33.162317 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:39:33.163090 systemd[1]: Reached target time-set.target. Feb 12 19:39:33.169355 systemd-resolved[1056]: Positive Trust Anchors: Feb 12 19:39:33.169381 systemd-resolved[1056]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:39:33.169440 systemd-resolved[1056]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:39:33.176754 systemd-resolved[1056]: Using system hostname 'ci-3510.3.2-f-2b8c436d32'. Feb 12 19:39:33.179151 systemd[1]: Started systemd-resolved.service. Feb 12 19:39:33.179837 systemd[1]: Reached target network.target. Feb 12 19:39:33.180293 systemd[1]: Reached target nss-lookup.target. Feb 12 19:39:33.180777 systemd[1]: Reached target sysinit.target. Feb 12 19:39:33.181306 systemd[1]: Started motdgen.path. Feb 12 19:39:33.181819 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:39:33.182623 systemd[1]: Started logrotate.timer. Feb 12 19:39:33.183165 systemd[1]: Started mdadm.timer. Feb 12 19:39:33.183579 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:39:33.184049 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:39:33.184090 systemd[1]: Reached target paths.target. Feb 12 19:39:33.184555 systemd[1]: Reached target timers.target. Feb 12 19:39:33.185758 systemd[1]: Listening on dbus.socket. Feb 12 19:39:33.187782 systemd[1]: Starting docker.socket... Feb 12 19:39:33.192519 systemd[1]: Listening on sshd.socket. Feb 12 19:39:33.193255 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:33.194029 systemd[1]: Listening on docker.socket. Feb 12 19:39:33.194711 systemd[1]: Reached target sockets.target. Feb 12 19:39:33.195209 systemd[1]: Reached target basic.target. Feb 12 19:39:33.195736 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:39:33.195767 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:39:33.197332 systemd[1]: Starting containerd.service... Feb 12 19:39:33.199198 systemd[1]: Starting coreos-metadata-sshkeys@core.service... Feb 12 19:39:33.202502 systemd[1]: Starting dbus.service... Feb 12 19:39:33.206641 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:39:33.213807 systemd[1]: Starting extend-filesystems.service... Feb 12 19:39:33.215103 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:39:33.220830 systemd[1]: Starting motdgen.service... Feb 12 19:39:33.224283 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:39:33.229131 systemd[1]: Starting prepare-critools.service... Feb 12 19:39:34.467335 systemd-timesyncd[1057]: Contacted time server 104.171.113.34:123 (0.flatcar.pool.ntp.org). Feb 12 19:39:34.467435 systemd-timesyncd[1057]: Initial clock synchronization to Mon 2024-02-12 19:39:34.467118 UTC. Feb 12 19:39:34.468350 systemd[1]: Starting prepare-helm.service... Feb 12 19:39:34.474585 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:39:34.477668 systemd[1]: Starting sshd-keygen.service... Feb 12 19:39:34.485080 jq[1087]: false Feb 12 19:39:34.485477 systemd[1]: Starting systemd-logind.service... Feb 12 19:39:34.486177 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:39:34.486297 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:39:34.490047 systemd-resolved[1056]: Clock change detected. Flushing caches. Feb 12 19:39:34.492941 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:39:34.499942 systemd[1]: Starting update-engine.service... Feb 12 19:39:34.503798 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:39:34.508814 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:39:34.509110 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:39:34.514175 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:39:34.514411 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:39:34.527334 jq[1102]: true Feb 12 19:39:34.530156 dbus-daemon[1084]: [system] SELinux support is enabled Feb 12 19:39:34.530558 systemd[1]: Started dbus.service. Feb 12 19:39:34.531993 tar[1104]: ./ Feb 12 19:39:34.531993 tar[1104]: ./loopback Feb 12 19:39:34.534044 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:39:34.534212 systemd[1]: Reached target system-config.target. Feb 12 19:39:34.534876 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:39:34.538356 systemd[1]: Starting user-configdrive.service... Feb 12 19:39:34.547525 tar[1105]: crictl Feb 12 19:39:34.564165 tar[1106]: linux-amd64/helm Feb 12 19:39:34.583502 jq[1111]: true Feb 12 19:39:34.611337 extend-filesystems[1088]: Found vda Feb 12 19:39:34.611337 extend-filesystems[1088]: Found vda1 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda2 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda3 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found usr Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda4 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda6 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda7 Feb 12 19:39:34.624813 extend-filesystems[1088]: Found vda9 Feb 12 19:39:34.624813 extend-filesystems[1088]: Checking size of /dev/vda9 Feb 12 19:39:34.682071 coreos-cloudinit[1112]: 2024/02/12 19:39:34 Checking availability of "cloud-drive" Feb 12 19:39:34.682071 coreos-cloudinit[1112]: 2024/02/12 19:39:34 Fetching user-data from datasource of type "cloud-drive" Feb 12 19:39:34.682071 coreos-cloudinit[1112]: 2024/02/12 19:39:34 Attempting to read from "/media/configdrive/openstack/latest/user_data" Feb 12 19:39:34.682071 coreos-cloudinit[1112]: 2024/02/12 19:39:34 Fetching meta-data from datasource of type "cloud-drive" Feb 12 19:39:34.682071 coreos-cloudinit[1112]: 2024/02/12 19:39:34 Attempting to read from "/media/configdrive/openstack/latest/meta_data.json" Feb 12 19:39:34.637458 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:39:34.683370 coreos-cloudinit[1112]: Detected an Ignition config. Exiting... Feb 12 19:39:34.637688 systemd[1]: Finished motdgen.service. Feb 12 19:39:34.644817 systemd[1]: Finished user-configdrive.service. Feb 12 19:39:34.646536 systemd[1]: Reached target user-config.target. Feb 12 19:39:34.689381 bash[1145]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:39:34.689240 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:39:34.735001 extend-filesystems[1088]: Resized partition /dev/vda9 Feb 12 19:39:34.753305 extend-filesystems[1149]: resize2fs 1.46.5 (30-Dec-2021) Feb 12 19:39:34.758102 kernel: EXT4-fs (vda9): resizing filesystem from 553472 to 15121403 blocks Feb 12 19:39:34.767522 update_engine[1100]: I0212 19:39:34.766858 1100 main.cc:92] Flatcar Update Engine starting Feb 12 19:39:34.779759 systemd[1]: Started update-engine.service. Feb 12 19:39:34.781200 update_engine[1100]: I0212 19:39:34.781157 1100 update_check_scheduler.cc:74] Next update check in 8m11s Feb 12 19:39:34.782746 systemd[1]: Started locksmithd.service. Feb 12 19:39:34.807196 systemd-networkd[1005]: eth1: Gained IPv6LL Feb 12 19:39:34.851581 tar[1104]: ./bandwidth Feb 12 19:39:34.865092 kernel: EXT4-fs (vda9): resized filesystem to 15121403 Feb 12 19:39:34.868547 systemd-networkd[1005]: eth0: Gained IPv6LL Feb 12 19:39:34.886175 extend-filesystems[1149]: Filesystem at /dev/vda9 is mounted on /; on-line resizing required Feb 12 19:39:34.886175 extend-filesystems[1149]: old_desc_blocks = 1, new_desc_blocks = 8 Feb 12 19:39:34.886175 extend-filesystems[1149]: The filesystem on /dev/vda9 is now 15121403 (4k) blocks long. Feb 12 19:39:34.890300 extend-filesystems[1088]: Resized filesystem in /dev/vda9 Feb 12 19:39:34.890300 extend-filesystems[1088]: Found vdb Feb 12 19:39:34.888385 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:39:34.888742 systemd[1]: Finished extend-filesystems.service. Feb 12 19:39:34.899161 coreos-metadata[1083]: Feb 12 19:39:34.897 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:39:34.911602 systemd-logind[1098]: Watching system buttons on /dev/input/event1 (Power Button) Feb 12 19:39:34.912152 systemd-logind[1098]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:39:34.912729 systemd-logind[1098]: New seat seat0. Feb 12 19:39:34.917888 coreos-metadata[1083]: Feb 12 19:39:34.917 INFO Fetch successful Feb 12 19:39:34.930021 systemd[1]: Started systemd-logind.service. Feb 12 19:39:34.932080 env[1109]: time="2024-02-12T19:39:34.931986926Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:39:34.933698 unknown[1083]: wrote ssh authorized keys file for user: core Feb 12 19:39:34.950617 update-ssh-keys[1153]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:39:34.951265 systemd[1]: Finished coreos-metadata-sshkeys@core.service. Feb 12 19:39:34.974886 tar[1104]: ./ptp Feb 12 19:39:35.033501 env[1109]: time="2024-02-12T19:39:35.033419609Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:39:35.033912 env[1109]: time="2024-02-12T19:39:35.033884632Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.037046 env[1109]: time="2024-02-12T19:39:35.036982545Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:35.037266 env[1109]: time="2024-02-12T19:39:35.037246085Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.038225 env[1109]: time="2024-02-12T19:39:35.038183784Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:35.038770 env[1109]: time="2024-02-12T19:39:35.038737352Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.038988 env[1109]: time="2024-02-12T19:39:35.038967236Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:39:35.039320 env[1109]: time="2024-02-12T19:39:35.039293737Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.040692 env[1109]: time="2024-02-12T19:39:35.040656051Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.044194 env[1109]: time="2024-02-12T19:39:35.044117849Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:39:35.044844 env[1109]: time="2024-02-12T19:39:35.044794914Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:39:35.044982 env[1109]: time="2024-02-12T19:39:35.044964023Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:39:35.045222 env[1109]: time="2024-02-12T19:39:35.045195963Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:39:35.045323 env[1109]: time="2024-02-12T19:39:35.045305639Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:39:35.055117 env[1109]: time="2024-02-12T19:39:35.054941048Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:39:35.055117 env[1109]: time="2024-02-12T19:39:35.055015463Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:39:35.055117 env[1109]: time="2024-02-12T19:39:35.055031887Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:39:35.055117 env[1109]: time="2024-02-12T19:39:35.055116676Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055117 env[1109]: time="2024-02-12T19:39:35.055134986Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055164966Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055179243Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055196208Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055209489Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055238728Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055251870Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.055444 env[1109]: time="2024-02-12T19:39:35.055266562Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.055811168Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.055989672Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056293163Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056329273Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056350233Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056412176Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056438433Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056458756Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056480010Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056501129Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056519641Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056536984Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056573510Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056600106Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:39:35.058088 env[1109]: time="2024-02-12T19:39:35.056860177Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.056891528Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.056913135Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.056933081Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.056959541Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.057009677Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.057072365Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:39:35.058628 env[1109]: time="2024-02-12T19:39:35.057129207Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:39:35.058809 env[1109]: time="2024-02-12T19:39:35.057454961Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:39:35.058809 env[1109]: time="2024-02-12T19:39:35.057551333Z" level=info msg="Connect containerd service" Feb 12 19:39:35.058809 env[1109]: time="2024-02-12T19:39:35.057610979Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:39:35.062885 env[1109]: time="2024-02-12T19:39:35.060012878Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:39:35.062885 env[1109]: time="2024-02-12T19:39:35.061270451Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:39:35.062885 env[1109]: time="2024-02-12T19:39:35.061347574Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:39:35.061592 systemd[1]: Started containerd.service. Feb 12 19:39:35.063131 tar[1104]: ./vlan Feb 12 19:39:35.083187 env[1109]: time="2024-02-12T19:39:35.083086173Z" level=info msg="containerd successfully booted in 0.157607s" Feb 12 19:39:35.091030 env[1109]: time="2024-02-12T19:39:35.090942998Z" level=info msg="Start subscribing containerd event" Feb 12 19:39:35.091381 env[1109]: time="2024-02-12T19:39:35.091358889Z" level=info msg="Start recovering state" Feb 12 19:39:35.091526 env[1109]: time="2024-02-12T19:39:35.091509462Z" level=info msg="Start event monitor" Feb 12 19:39:35.091614 env[1109]: time="2024-02-12T19:39:35.091596546Z" level=info msg="Start snapshots syncer" Feb 12 19:39:35.091679 env[1109]: time="2024-02-12T19:39:35.091664500Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:39:35.091740 env[1109]: time="2024-02-12T19:39:35.091725770Z" level=info msg="Start streaming server" Feb 12 19:39:35.141838 tar[1104]: ./host-device Feb 12 19:39:35.202706 tar[1104]: ./tuning Feb 12 19:39:35.257301 tar[1104]: ./vrf Feb 12 19:39:35.314154 tar[1104]: ./sbr Feb 12 19:39:35.367476 tar[1104]: ./tap Feb 12 19:39:35.451596 tar[1104]: ./dhcp Feb 12 19:39:35.744907 tar[1104]: ./static Feb 12 19:39:35.836275 tar[1104]: ./firewall Feb 12 19:39:35.967916 tar[1104]: ./macvlan Feb 12 19:39:36.080500 tar[1104]: ./dummy Feb 12 19:39:36.148624 tar[1106]: linux-amd64/LICENSE Feb 12 19:39:36.153361 tar[1106]: linux-amd64/README.md Feb 12 19:39:36.164861 systemd[1]: Finished prepare-helm.service. Feb 12 19:39:36.198726 tar[1104]: ./bridge Feb 12 19:39:36.259832 tar[1104]: ./ipvlan Feb 12 19:39:36.277173 systemd[1]: Finished prepare-critools.service. Feb 12 19:39:36.315176 tar[1104]: ./portmap Feb 12 19:39:36.361433 tar[1104]: ./host-local Feb 12 19:39:36.419831 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:39:36.457453 locksmithd[1150]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:39:36.529799 systemd[1]: Created slice system-sshd.slice. Feb 12 19:39:36.649467 sshd_keygen[1121]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:39:36.679536 systemd[1]: Finished sshd-keygen.service. Feb 12 19:39:36.682667 systemd[1]: Starting issuegen.service... Feb 12 19:39:36.684925 systemd[1]: Started sshd@0-164.90.149.146:22-139.178.68.195:32822.service. Feb 12 19:39:36.702325 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:39:36.702570 systemd[1]: Finished issuegen.service. Feb 12 19:39:36.705751 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:39:36.717037 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:39:36.719877 systemd[1]: Started getty@tty1.service. Feb 12 19:39:36.722975 systemd[1]: Started serial-getty@ttyS0.service. Feb 12 19:39:36.724092 systemd[1]: Reached target getty.target. Feb 12 19:39:36.724722 systemd[1]: Reached target multi-user.target. Feb 12 19:39:36.727307 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:39:36.738141 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:39:36.738403 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:39:36.739422 systemd[1]: Startup finished in 1.313s (kernel) + 7.658s (initrd) + 8.001s (userspace) = 16.974s. Feb 12 19:39:36.779307 sshd[1174]: Accepted publickey for core from 139.178.68.195 port 32822 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:36.782315 sshd[1174]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:36.797123 systemd[1]: Created slice user-500.slice. Feb 12 19:39:36.798830 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:39:36.806572 systemd-logind[1098]: New session 1 of user core. Feb 12 19:39:36.812734 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:39:36.814935 systemd[1]: Starting user@500.service... Feb 12 19:39:36.819884 (systemd)[1184]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:36.920854 systemd[1184]: Queued start job for default target default.target. Feb 12 19:39:36.921592 systemd[1184]: Reached target paths.target. Feb 12 19:39:36.921619 systemd[1184]: Reached target sockets.target. Feb 12 19:39:36.921633 systemd[1184]: Reached target timers.target. Feb 12 19:39:36.921647 systemd[1184]: Reached target basic.target. Feb 12 19:39:36.921707 systemd[1184]: Reached target default.target. Feb 12 19:39:36.921742 systemd[1184]: Startup finished in 91ms. Feb 12 19:39:36.921824 systemd[1]: Started user@500.service. Feb 12 19:39:36.923366 systemd[1]: Started session-1.scope. Feb 12 19:39:36.990688 systemd[1]: Started sshd@1-164.90.149.146:22-139.178.68.195:32836.service. Feb 12 19:39:37.040396 sshd[1193]: Accepted publickey for core from 139.178.68.195 port 32836 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:37.044931 sshd[1193]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:37.055736 systemd[1]: Started session-2.scope. Feb 12 19:39:37.056725 systemd-logind[1098]: New session 2 of user core. Feb 12 19:39:37.140915 sshd[1193]: pam_unix(sshd:session): session closed for user core Feb 12 19:39:37.148915 systemd-logind[1098]: Session 2 logged out. Waiting for processes to exit. Feb 12 19:39:37.149563 systemd[1]: sshd@1-164.90.149.146:22-139.178.68.195:32836.service: Deactivated successfully. Feb 12 19:39:37.151121 systemd[1]: session-2.scope: Deactivated successfully. Feb 12 19:39:37.155429 systemd[1]: Started sshd@2-164.90.149.146:22-139.178.68.195:32840.service. Feb 12 19:39:37.157493 systemd-logind[1098]: Removed session 2. Feb 12 19:39:37.209478 sshd[1199]: Accepted publickey for core from 139.178.68.195 port 32840 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:37.212472 sshd[1199]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:37.222143 systemd[1]: Started session-3.scope. Feb 12 19:39:37.223782 systemd-logind[1098]: New session 3 of user core. Feb 12 19:39:37.293106 sshd[1199]: pam_unix(sshd:session): session closed for user core Feb 12 19:39:37.300626 systemd[1]: sshd@2-164.90.149.146:22-139.178.68.195:32840.service: Deactivated successfully. Feb 12 19:39:37.302133 systemd[1]: session-3.scope: Deactivated successfully. Feb 12 19:39:37.304286 systemd-logind[1098]: Session 3 logged out. Waiting for processes to exit. Feb 12 19:39:37.307294 systemd[1]: Started sshd@3-164.90.149.146:22-139.178.68.195:32856.service. Feb 12 19:39:37.309808 systemd-logind[1098]: Removed session 3. Feb 12 19:39:37.361435 sshd[1205]: Accepted publickey for core from 139.178.68.195 port 32856 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:37.363526 sshd[1205]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:37.372113 systemd-logind[1098]: New session 4 of user core. Feb 12 19:39:37.372455 systemd[1]: Started session-4.scope. Feb 12 19:39:37.388441 systemd[1]: Started sshd@4-164.90.149.146:22-104.248.54.24:59970.service. Feb 12 19:39:37.452207 sshd[1205]: pam_unix(sshd:session): session closed for user core Feb 12 19:39:37.459342 systemd[1]: sshd@3-164.90.149.146:22-139.178.68.195:32856.service: Deactivated successfully. Feb 12 19:39:37.460342 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:39:37.462422 systemd-logind[1098]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:39:37.464414 systemd[1]: Started sshd@5-164.90.149.146:22-139.178.68.195:32868.service. Feb 12 19:39:37.468682 systemd-logind[1098]: Removed session 4. Feb 12 19:39:37.518248 sshd[1214]: Accepted publickey for core from 139.178.68.195 port 32868 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:37.522088 sshd[1214]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:37.531033 systemd[1]: Started session-5.scope. Feb 12 19:39:37.532154 systemd-logind[1098]: New session 5 of user core. Feb 12 19:39:37.629718 sudo[1217]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:39:37.630322 sudo[1217]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:39:37.642608 dbus-daemon[1084]: \xd0]՚\xadU: received setenforce notice (enforcing=256312704) Feb 12 19:39:37.646110 sudo[1217]: pam_unix(sudo:session): session closed for user root Feb 12 19:39:37.653409 sshd[1214]: pam_unix(sshd:session): session closed for user core Feb 12 19:39:37.671519 systemd[1]: Started sshd@6-164.90.149.146:22-139.178.68.195:32874.service. Feb 12 19:39:37.672742 systemd[1]: sshd@5-164.90.149.146:22-139.178.68.195:32868.service: Deactivated successfully. Feb 12 19:39:37.674871 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:39:37.682781 systemd-logind[1098]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:39:37.684954 systemd-logind[1098]: Removed session 5. Feb 12 19:39:37.759391 sshd[1220]: Accepted publickey for core from 139.178.68.195 port 32874 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:37.763648 sshd[1220]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:37.775304 systemd-logind[1098]: New session 6 of user core. Feb 12 19:39:37.777349 systemd[1]: Started session-6.scope. Feb 12 19:39:37.854233 sudo[1225]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:39:37.854804 sudo[1225]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:39:37.861623 sudo[1225]: pam_unix(sudo:session): session closed for user root Feb 12 19:39:37.872126 sudo[1224]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:39:37.873153 sudo[1224]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:39:37.883409 sshd[1209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.54.24 user=root Feb 12 19:39:37.897582 systemd[1]: Stopping audit-rules.service... Feb 12 19:39:37.899000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:39:37.901161 auditctl[1228]: No rules Feb 12 19:39:37.901992 kernel: kauditd_printk_skb: 197 callbacks suppressed Feb 12 19:39:37.902120 kernel: audit: type=1305 audit(1707766777.899:184): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:39:37.899000 audit[1228]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc5c24e510 a2=420 a3=0 items=0 ppid=1 pid=1228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:37.903727 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:39:37.904020 systemd[1]: Stopped audit-rules.service. Feb 12 19:39:37.911456 systemd[1]: Starting audit-rules.service... Feb 12 19:39:37.913845 kernel: audit: type=1300 audit(1707766777.899:184): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc5c24e510 a2=420 a3=0 items=0 ppid=1 pid=1228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:37.916572 kernel: audit: type=1327 audit(1707766777.899:184): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:39:37.899000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:39:37.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.922425 kernel: audit: type=1131 audit(1707766777.901:185): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.951010 augenrules[1245]: No rules Feb 12 19:39:37.952000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.952886 systemd[1]: Finished audit-rules.service. Feb 12 19:39:37.960130 kernel: audit: type=1130 audit(1707766777.952:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.960414 sudo[1224]: pam_unix(sudo:session): session closed for user root Feb 12 19:39:37.959000 audit[1224]: USER_END pid=1224 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.968325 kernel: audit: type=1106 audit(1707766777.959:187): pid=1224 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.968109 sshd[1220]: pam_unix(sshd:session): session closed for user core Feb 12 19:39:37.959000 audit[1224]: CRED_DISP pid=1224 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.976224 kernel: audit: type=1104 audit(1707766777.959:188): pid=1224 uid=500 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.982295 systemd[1]: Started sshd@7-164.90.149.146:22-139.178.68.195:32876.service. Feb 12 19:39:37.983645 systemd[1]: sshd@6-164.90.149.146:22-139.178.68.195:32874.service: Deactivated successfully. Feb 12 19:39:37.976000 audit[1220]: USER_END pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:37.987469 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:39:37.997235 kernel: audit: type=1106 audit(1707766777.976:189): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:37.997431 kernel: audit: type=1104 audit(1707766777.977:190): pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:37.977000 audit[1220]: CRED_DISP pid=1220 uid=0 auid=500 ses=6 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:38.004569 systemd-logind[1098]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:39:37.981000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.90.149.146:22-139.178.68.195:32876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:37.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-164.90.149.146:22-139.178.68.195:32874 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.012117 kernel: audit: type=1130 audit(1707766777.981:191): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.90.149.146:22-139.178.68.195:32876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.013824 systemd-logind[1098]: Removed session 6. Feb 12 19:39:38.049000 audit[1250]: USER_ACCT pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:38.051678 sshd[1250]: Accepted publickey for core from 139.178.68.195 port 32876 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:39:38.053000 audit[1250]: CRED_ACQ pid=1250 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:38.053000 audit[1250]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8e63bcd0 a2=3 a3=0 items=0 ppid=1 pid=1250 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=7 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:38.053000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:39:38.054870 sshd[1250]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:39:38.065669 systemd-logind[1098]: New session 7 of user core. Feb 12 19:39:38.066731 systemd[1]: Started session-7.scope. Feb 12 19:39:38.078000 audit[1250]: USER_START pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:38.082000 audit[1253]: CRED_ACQ pid=1253 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:39:38.143000 audit[1254]: USER_ACCT pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.144945 sudo[1254]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:39:38.144000 audit[1254]: CRED_REFR pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.146448 sudo[1254]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:39:38.150000 audit[1254]: USER_START pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.821802 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:39:38.834103 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:39:38.834759 systemd[1]: Reached target network-online.target. Feb 12 19:39:38.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:38.837902 systemd[1]: Starting docker.service... Feb 12 19:39:38.914491 env[1270]: time="2024-02-12T19:39:38.914386367Z" level=info msg="Starting up" Feb 12 19:39:38.918838 env[1270]: time="2024-02-12T19:39:38.918710952Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:39:38.918838 env[1270]: time="2024-02-12T19:39:38.918781683Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:39:38.918838 env[1270]: time="2024-02-12T19:39:38.918838768Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:39:38.919196 env[1270]: time="2024-02-12T19:39:38.918865511Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:39:38.927845 env[1270]: time="2024-02-12T19:39:38.927722961Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:39:38.927845 env[1270]: time="2024-02-12T19:39:38.927781990Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:39:38.927845 env[1270]: time="2024-02-12T19:39:38.927813022Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:39:38.927845 env[1270]: time="2024-02-12T19:39:38.927829726Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:39:38.944563 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport159541035-merged.mount: Deactivated successfully. Feb 12 19:39:39.186893 env[1270]: time="2024-02-12T19:39:39.186818902Z" level=info msg="Loading containers: start." Feb 12 19:39:39.286000 audit[1302]: NETFILTER_CFG table=nat:2 family=2 entries=2 op=nft_register_chain pid=1302 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.286000 audit[1302]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffd8f74e7a0 a2=0 a3=7ffd8f74e78c items=0 ppid=1270 pid=1302 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.286000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:39:39.291000 audit[1304]: NETFILTER_CFG table=filter:3 family=2 entries=2 op=nft_register_chain pid=1304 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.291000 audit[1304]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd6e2aa0e0 a2=0 a3=7ffd6e2aa0cc items=0 ppid=1270 pid=1304 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.291000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:39:39.297000 audit[1306]: NETFILTER_CFG table=filter:4 family=2 entries=1 op=nft_register_chain pid=1306 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.297000 audit[1306]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffda5613d80 a2=0 a3=7ffda5613d6c items=0 ppid=1270 pid=1306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:39:39.302000 audit[1308]: NETFILTER_CFG table=filter:5 family=2 entries=1 op=nft_register_chain pid=1308 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.302000 audit[1308]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffdf62647a0 a2=0 a3=7ffdf626478c items=0 ppid=1270 pid=1308 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.302000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:39:39.314000 audit[1310]: NETFILTER_CFG table=filter:6 family=2 entries=1 op=nft_register_rule pid=1310 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.314000 audit[1310]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffeab0da500 a2=0 a3=7ffeab0da4ec items=0 ppid=1270 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.314000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:39:39.336000 audit[1315]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_rule pid=1315 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.336000 audit[1315]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff41337840 a2=0 a3=7fff4133782c items=0 ppid=1270 pid=1315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.336000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:39:39.355000 audit[1317]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1317 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.355000 audit[1317]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffccad99b30 a2=0 a3=7ffccad99b1c items=0 ppid=1270 pid=1317 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.355000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:39:39.363000 audit[1319]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1319 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.363000 audit[1319]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fff6b70b520 a2=0 a3=7fff6b70b50c items=0 ppid=1270 pid=1319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.363000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:39:39.370000 audit[1321]: NETFILTER_CFG table=filter:10 family=2 entries=2 op=nft_register_chain pid=1321 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.370000 audit[1321]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdf22e6d10 a2=0 a3=7ffdf22e6cfc items=0 ppid=1270 pid=1321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.370000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:39:39.397000 audit[1325]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_unregister_rule pid=1325 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.397000 audit[1325]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7fffac563590 a2=0 a3=7fffac56357c items=0 ppid=1270 pid=1325 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.397000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:39:39.409000 audit[1326]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1326 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.409000 audit[1326]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffd4d740010 a2=0 a3=7ffd4d73fffc items=0 ppid=1270 pid=1326 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.409000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:39:39.429158 kernel: Initializing XFRM netlink socket Feb 12 19:39:39.491732 env[1270]: time="2024-02-12T19:39:39.489831908Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:39:39.538000 audit[1334]: NETFILTER_CFG table=nat:13 family=2 entries=2 op=nft_register_chain pid=1334 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.538000 audit[1334]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffcb1291a00 a2=0 a3=7ffcb12919ec items=0 ppid=1270 pid=1334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.538000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:39:39.555000 audit[1337]: NETFILTER_CFG table=nat:14 family=2 entries=1 op=nft_register_rule pid=1337 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.555000 audit[1337]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff5783c160 a2=0 a3=7fff5783c14c items=0 ppid=1270 pid=1337 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.555000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:39:39.563000 audit[1340]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1340 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.563000 audit[1340]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fff99287480 a2=0 a3=7fff9928746c items=0 ppid=1270 pid=1340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.563000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:39:39.577000 audit[1342]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1342 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.577000 audit[1342]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc42a3fbc0 a2=0 a3=7ffc42a3fbac items=0 ppid=1270 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.577000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:39:39.583000 audit[1344]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1344 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.583000 audit[1344]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7fffbdfdb500 a2=0 a3=7fffbdfdb4ec items=0 ppid=1270 pid=1344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.583000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:39:39.589000 audit[1346]: NETFILTER_CFG table=nat:18 family=2 entries=2 op=nft_register_chain pid=1346 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.589000 audit[1346]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffbb473820 a2=0 a3=7fffbb47380c items=0 ppid=1270 pid=1346 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.589000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:39:39.593000 audit[1348]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1348 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.593000 audit[1348]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffff194ddc0 a2=0 a3=7ffff194ddac items=0 ppid=1270 pid=1348 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.593000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:39:39.610000 audit[1351]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1351 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.610000 audit[1351]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc5b8d6010 a2=0 a3=7ffc5b8d5ffc items=0 ppid=1270 pid=1351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.610000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:39:39.616000 audit[1353]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1353 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.616000 audit[1353]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc1543e090 a2=0 a3=7ffc1543e07c items=0 ppid=1270 pid=1353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.616000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:39:39.622000 audit[1355]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1355 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.622000 audit[1355]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffef18ea740 a2=0 a3=7ffef18ea72c items=0 ppid=1270 pid=1355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.622000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:39:39.624000 audit[1357]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1357 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.624000 audit[1357]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffd1af77b70 a2=0 a3=7ffd1af77b5c items=0 ppid=1270 pid=1357 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.624000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:39:39.633762 systemd-networkd[1005]: docker0: Link UP Feb 12 19:39:39.655000 audit[1362]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_unregister_rule pid=1362 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.655000 audit[1362]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc09ea9980 a2=0 a3=7ffc09ea996c items=0 ppid=1270 pid=1362 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.655000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:39:39.660000 audit[1363]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1363 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:39:39.660000 audit[1363]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffee4c18f80 a2=0 a3=7ffee4c18f6c items=0 ppid=1270 pid=1363 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.660000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:39:39.661942 env[1270]: time="2024-02-12T19:39:39.661866187Z" level=info msg="Loading containers: done." Feb 12 19:39:39.684811 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1210303201-merged.mount: Deactivated successfully. Feb 12 19:39:39.701884 env[1270]: time="2024-02-12T19:39:39.701758493Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:39:39.702337 env[1270]: time="2024-02-12T19:39:39.702186498Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:39:39.702434 env[1270]: time="2024-02-12T19:39:39.702375007Z" level=info msg="Daemon has completed initialization" Feb 12 19:39:39.747000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:39.748339 systemd[1]: Started docker.service. Feb 12 19:39:39.761500 env[1270]: time="2024-02-12T19:39:39.761338194Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:39:39.813508 systemd[1]: Starting coreos-metadata.service... Feb 12 19:39:39.890708 coreos-metadata[1388]: Feb 12 19:39:39.890 INFO Fetching http://169.254.169.254/metadata/v1.json: Attempt #1 Feb 12 19:39:39.906611 coreos-metadata[1388]: Feb 12 19:39:39.906 INFO Fetch successful Feb 12 19:39:39.940140 systemd[1]: Finished coreos-metadata.service. Feb 12 19:39:39.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=coreos-metadata comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:39.968792 systemd[1]: Reloading. Feb 12 19:39:40.086402 sshd[1209]: Failed password for root from 104.248.54.24 port 59970 ssh2 Feb 12 19:39:40.150316 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-02-12T19:39:40Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:39:40.151078 /usr/lib/systemd/system-generators/torcx-generator[1423]: time="2024-02-12T19:39:40Z" level=info msg="torcx already run" Feb 12 19:39:40.270511 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:39:40.270944 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:39:40.313787 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:39:40.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit: BPF prog-id=37 op=LOAD Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.444000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.445000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.445000 audit: BPF prog-id=38 op=LOAD Feb 12 19:39:40.445000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:39:40.445000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:39:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.450000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.451000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.452000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.452000 audit: BPF prog-id=39 op=LOAD Feb 12 19:39:40.452000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.456000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.458000 audit: BPF prog-id=40 op=LOAD Feb 12 19:39:40.458000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.459000 audit: BPF prog-id=41 op=LOAD Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.461000 audit: BPF prog-id=42 op=LOAD Feb 12 19:39:40.461000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:39:40.461000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit: BPF prog-id=43 op=LOAD Feb 12 19:39:40.464000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit: BPF prog-id=44 op=LOAD Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.466000 audit: BPF prog-id=45 op=LOAD Feb 12 19:39:40.466000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:39:40.466000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.468000 audit: BPF prog-id=46 op=LOAD Feb 12 19:39:40.468000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit: BPF prog-id=47 op=LOAD Feb 12 19:39:40.472000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit: BPF prog-id=48 op=LOAD Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.473000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.474000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.474000 audit: BPF prog-id=49 op=LOAD Feb 12 19:39:40.474000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:39:40.474000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.475000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.476000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.476000 audit: BPF prog-id=50 op=LOAD Feb 12 19:39:40.476000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.478000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.479000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:40.479000 audit: BPF prog-id=51 op=LOAD Feb 12 19:39:40.479000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:39:40.509819 systemd[1]: Started kubelet.service. Feb 12 19:39:40.509000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:40.664340 kubelet[1468]: E0212 19:39:40.664163 1468 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:39:40.668403 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:39:40.669157 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:39:40.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:39:41.408453 env[1109]: time="2024-02-12T19:39:41.408377061Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 19:39:41.863778 sshd[1209]: Received disconnect from 104.248.54.24 port 59970:11: Bye Bye [preauth] Feb 12 19:39:41.863778 sshd[1209]: Disconnected from authenticating user root 104.248.54.24 port 59970 [preauth] Feb 12 19:39:41.868965 systemd[1]: sshd@4-164.90.149.146:22-104.248.54.24:59970.service: Deactivated successfully. Feb 12 19:39:41.868000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@4-164.90.149.146:22-104.248.54.24:59970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:42.184796 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1577819213.mount: Deactivated successfully. Feb 12 19:39:45.848049 env[1109]: time="2024-02-12T19:39:45.847835613Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:45.851849 env[1109]: time="2024-02-12T19:39:45.851756334Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:45.855960 env[1109]: time="2024-02-12T19:39:45.855898776Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:45.859155 env[1109]: time="2024-02-12T19:39:45.859102441Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:45.861185 env[1109]: time="2024-02-12T19:39:45.860637126Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:7968fc5c824ed95404f421a90882835f250220c0fd799b4fceef340dd5585ed5\"" Feb 12 19:39:45.885185 env[1109]: time="2024-02-12T19:39:45.885138934Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 19:39:49.206740 env[1109]: time="2024-02-12T19:39:49.206628083Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:49.210713 env[1109]: time="2024-02-12T19:39:49.209339222Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:49.212872 env[1109]: time="2024-02-12T19:39:49.211489332Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:49.213739 env[1109]: time="2024-02-12T19:39:49.213696402Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:49.215161 env[1109]: time="2024-02-12T19:39:49.215082519Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:c8134be729ba23c6e0c3e5dd52c393fc8d3cfc688bcec33540f64bb0137b67e0\"" Feb 12 19:39:49.235786 env[1109]: time="2024-02-12T19:39:49.235713721Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 19:39:50.896625 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:39:50.906543 kernel: kauditd_printk_skb: 261 callbacks suppressed Feb 12 19:39:50.906688 kernel: audit: type=1130 audit(1707766790.896:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.906718 kernel: audit: type=1131 audit(1707766790.896:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.897071 systemd[1]: Stopped kubelet.service. Feb 12 19:39:50.900546 systemd[1]: Started kubelet.service. Feb 12 19:39:50.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.914074 kernel: audit: type=1130 audit(1707766790.898:405): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.985534 systemd[1]: Started sshd@8-164.90.149.146:22-165.227.101.226:45118.service. Feb 12 19:39:50.984000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.90.149.146:22-165.227.101.226:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:50.991174 kernel: audit: type=1130 audit(1707766790.984:406): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.90.149.146:22-165.227.101.226:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:51.036510 kubelet[1499]: E0212 19:39:51.036405 1499 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:39:51.040015 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:39:51.040207 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:39:51.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:39:51.045121 kernel: audit: type=1131 audit(1707766791.039:407): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:39:51.098249 env[1109]: time="2024-02-12T19:39:51.098154091Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:51.101096 env[1109]: time="2024-02-12T19:39:51.100932933Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:51.103784 env[1109]: time="2024-02-12T19:39:51.103712075Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:51.106198 env[1109]: time="2024-02-12T19:39:51.106141400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:51.107084 env[1109]: time="2024-02-12T19:39:51.107022212Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:5eed9876e7181341b7015e3486dfd234f8e0d0d7d3d19b1bb971d720cd320975\"" Feb 12 19:39:51.123373 env[1109]: time="2024-02-12T19:39:51.123311664Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:39:51.467741 sshd[1506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.101.226 user=root Feb 12 19:39:51.466000 audit[1506]: USER_AUTH pid=1506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:39:51.474081 kernel: audit: type=1100 audit(1707766791.466:408): pid=1506 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:39:52.217920 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2959224072.mount: Deactivated successfully. Feb 12 19:39:52.973821 env[1109]: time="2024-02-12T19:39:52.973699057Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:52.977695 env[1109]: time="2024-02-12T19:39:52.977630289Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:52.980204 env[1109]: time="2024-02-12T19:39:52.980155334Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:52.981948 env[1109]: time="2024-02-12T19:39:52.981905509Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:52.982669 env[1109]: time="2024-02-12T19:39:52.982621361Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:db7b01e105753475c198490cf875df1314fd1a599f67ea1b184586cb399e1cae\"" Feb 12 19:39:52.999529 env[1109]: time="2024-02-12T19:39:52.999473674Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:39:53.259231 sshd[1506]: Failed password for root from 165.227.101.226 port 45118 ssh2 Feb 12 19:39:53.497000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.90.149.146:22-165.227.101.226:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:53.499343 sshd[1506]: Received disconnect from 165.227.101.226 port 45118:11: Bye Bye [preauth] Feb 12 19:39:53.499343 sshd[1506]: Disconnected from authenticating user root 165.227.101.226 port 45118 [preauth] Feb 12 19:39:53.497901 systemd[1]: sshd@8-164.90.149.146:22-165.227.101.226:45118.service: Deactivated successfully. Feb 12 19:39:53.503147 kernel: audit: type=1131 audit(1707766793.497:409): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-164.90.149.146:22-165.227.101.226:45118 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:39:53.513871 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1084926725.mount: Deactivated successfully. Feb 12 19:39:53.520883 env[1109]: time="2024-02-12T19:39:53.520812678Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:53.523547 env[1109]: time="2024-02-12T19:39:53.523497900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:53.526105 env[1109]: time="2024-02-12T19:39:53.526041028Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:53.528228 env[1109]: time="2024-02-12T19:39:53.528191538Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:53.529504 env[1109]: time="2024-02-12T19:39:53.529042037Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Feb 12 19:39:53.545181 env[1109]: time="2024-02-12T19:39:53.545138779Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 19:39:54.467961 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3448689874.mount: Deactivated successfully. Feb 12 19:39:59.203986 env[1109]: time="2024-02-12T19:39:59.203879588Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:59.206405 env[1109]: time="2024-02-12T19:39:59.206339380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:59.208670 env[1109]: time="2024-02-12T19:39:59.208608429Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:59.210626 env[1109]: time="2024-02-12T19:39:59.210575804Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:59.211399 env[1109]: time="2024-02-12T19:39:59.211349969Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:86b6af7dd652c1b38118be1c338e9354b33469e69a218f7e290a0ca5304ad681\"" Feb 12 19:39:59.234682 env[1109]: time="2024-02-12T19:39:59.234627605Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:39:59.830495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount131254583.mount: Deactivated successfully. Feb 12 19:40:00.687230 env[1109]: time="2024-02-12T19:40:00.687169125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:00.689270 env[1109]: time="2024-02-12T19:40:00.689224135Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:00.691444 env[1109]: time="2024-02-12T19:40:00.691397247Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:00.693149 env[1109]: time="2024-02-12T19:40:00.693096209Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:00.693699 env[1109]: time="2024-02-12T19:40:00.693653516Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:ead0a4a53df89fd173874b46093b6e62d8c72967bbf606d672c9e8c9b601a4fc\"" Feb 12 19:40:01.084395 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:40:01.084000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.085562 systemd[1]: Stopped kubelet.service. Feb 12 19:40:01.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.091126 systemd[1]: Started kubelet.service. Feb 12 19:40:01.095113 kernel: audit: type=1130 audit(1707766801.084:410): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.097234 kernel: audit: type=1131 audit(1707766801.085:411): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.097306 kernel: audit: type=1130 audit(1707766801.092:412): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:01.200594 kubelet[1537]: E0212 19:40:01.200518 1537 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:40:01.203000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:01.203654 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:40:01.203867 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:40:01.210121 kernel: audit: type=1131 audit(1707766801.203:413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:40:06.949607 systemd[1]: Stopped kubelet.service. Feb 12 19:40:06.949000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:06.949000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:06.959009 kernel: audit: type=1130 audit(1707766806.949:414): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:06.959193 kernel: audit: type=1131 audit(1707766806.949:415): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:06.983110 systemd[1]: Reloading. Feb 12 19:40:07.152245 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2024-02-12T19:40:07Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:07.152865 /usr/lib/systemd/system-generators/torcx-generator[1624]: time="2024-02-12T19:40:07Z" level=info msg="torcx already run" Feb 12 19:40:07.212960 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:07.213443 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:07.243206 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:07.319000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.328550 kernel: audit: type=1400 audit(1707766807.319:416): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.328714 kernel: audit: type=1400 audit(1707766807.324:417): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.328743 kernel: audit: type=1400 audit(1707766807.324:418): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.336310 kernel: audit: type=1400 audit(1707766807.324:419): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.336488 kernel: audit: type=1400 audit(1707766807.324:420): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.344069 kernel: audit: type=1400 audit(1707766807.324:421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.344281 kernel: audit: type=1400 audit(1707766807.324:422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.324000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.351782 kernel: audit: type=1400 audit(1707766807.324:423): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit: BPF prog-id=52 op=LOAD Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.332000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit: BPF prog-id=53 op=LOAD Feb 12 19:40:07.340000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:40:07.340000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.340000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit: BPF prog-id=54 op=LOAD Feb 12 19:40:07.347000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.352000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.352000 audit: BPF prog-id=55 op=LOAD Feb 12 19:40:07.352000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit: BPF prog-id=56 op=LOAD Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.354000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.354000 audit: BPF prog-id=57 op=LOAD Feb 12 19:40:07.354000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:40:07.354000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.356000 audit: BPF prog-id=58 op=LOAD Feb 12 19:40:07.357000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.357000 audit: BPF prog-id=59 op=LOAD Feb 12 19:40:07.357000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.358000 audit: BPF prog-id=60 op=LOAD Feb 12 19:40:07.358000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:40:07.358000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.360000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.360000 audit: BPF prog-id=61 op=LOAD Feb 12 19:40:07.360000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.362000 audit: BPF prog-id=62 op=LOAD Feb 12 19:40:07.362000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit: BPF prog-id=63 op=LOAD Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.364000 audit: BPF prog-id=64 op=LOAD Feb 12 19:40:07.364000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:40:07.364000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.365000 audit: BPF prog-id=65 op=LOAD Feb 12 19:40:07.366000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.367000 audit: BPF prog-id=66 op=LOAD Feb 12 19:40:07.367000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:40:07.401210 systemd[1]: Started kubelet.service. Feb 12 19:40:07.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:07.482284 kubelet[1668]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:07.482284 kubelet[1668]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:07.482284 kubelet[1668]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:07.482284 kubelet[1668]: I0212 19:40:07.478213 1668 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:40:07.912175 kubelet[1668]: I0212 19:40:07.912129 1668 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:40:07.912586 kubelet[1668]: I0212 19:40:07.912562 1668 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:40:07.913040 kubelet[1668]: I0212 19:40:07.913018 1668 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:40:07.919713 kubelet[1668]: E0212 19:40:07.919668 1668 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://164.90.149.146:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.921434 kubelet[1668]: I0212 19:40:07.919744 1668 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:07.927394 kubelet[1668]: I0212 19:40:07.927347 1668 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:40:07.928008 kubelet[1668]: I0212 19:40:07.927975 1668 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:40:07.928330 kubelet[1668]: I0212 19:40:07.928309 1668 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:40:07.928785 kubelet[1668]: I0212 19:40:07.928764 1668 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:40:07.928900 kubelet[1668]: I0212 19:40:07.928885 1668 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:40:07.929281 kubelet[1668]: I0212 19:40:07.929262 1668 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:07.934162 kubelet[1668]: I0212 19:40:07.934134 1668 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:40:07.934531 kubelet[1668]: I0212 19:40:07.934349 1668 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:40:07.934531 kubelet[1668]: I0212 19:40:07.934397 1668 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:40:07.934531 kubelet[1668]: I0212 19:40:07.934420 1668 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:40:07.935832 kubelet[1668]: W0212 19:40:07.935773 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://164.90.149.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-f-2b8c436d32&limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.936809 kubelet[1668]: E0212 19:40:07.936103 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://164.90.149.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-f-2b8c436d32&limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.936809 kubelet[1668]: W0212 19:40:07.936216 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://164.90.149.146:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.936809 kubelet[1668]: E0212 19:40:07.936400 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://164.90.149.146:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.937715 kubelet[1668]: I0212 19:40:07.937110 1668 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:40:07.937808 kubelet[1668]: W0212 19:40:07.937785 1668 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:40:07.938715 kubelet[1668]: I0212 19:40:07.938694 1668 server.go:1168] "Started kubelet" Feb 12 19:40:07.941000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.941000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:07.941000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000985860 a1=c0008230c8 a2=c000985830 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.941000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:07.943091 kubelet[1668]: I0212 19:40:07.943048 1668 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:40:07.942000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:07.942000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:07.943412 kubelet[1668]: E0212 19:40:07.943222 1668 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:40:07.943412 kubelet[1668]: E0212 19:40:07.943265 1668 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:40:07.942000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000cd28a0 a1=c0008230e0 a2=c0009858f0 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.942000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:07.943827 kubelet[1668]: I0212 19:40:07.943753 1668 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:40:07.944073 kubelet[1668]: I0212 19:40:07.944030 1668 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:40:07.951304 kubelet[1668]: I0212 19:40:07.951261 1668 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:40:07.953663 kubelet[1668]: I0212 19:40:07.953613 1668 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:40:07.956376 kubelet[1668]: I0212 19:40:07.956309 1668 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:40:07.957303 kubelet[1668]: E0212 19:40:07.956693 1668 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-f-2b8c436d32.17b334dd1a630572", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-f-2b8c436d32", UID:"ci-3510.3.2-f-2b8c436d32", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-f-2b8c436d32"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 938663794, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 938663794, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://164.90.149.146:6443/api/v1/namespaces/default/events": dial tcp 164.90.149.146:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:40:07.959736 kubelet[1668]: E0212 19:40:07.959709 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://164.90.149.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-f-2b8c436d32?timeout=10s\": dial tcp 164.90.149.146:6443: connect: connection refused" interval="200ms" Feb 12 19:40:07.963319 kubelet[1668]: I0212 19:40:07.963276 1668 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:40:07.963539 kubelet[1668]: I0212 19:40:07.963424 1668 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:40:07.964467 kubelet[1668]: W0212 19:40:07.964395 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://164.90.149.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.964632 kubelet[1668]: E0212 19:40:07.964495 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://164.90.149.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:07.982000 audit[1679]: NETFILTER_CFG table=mangle:26 family=2 entries=2 op=nft_register_chain pid=1679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:07.982000 audit[1679]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc26145890 a2=0 a3=7ffc2614587c items=0 ppid=1668 pid=1679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.982000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:07.985000 audit[1681]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_chain pid=1681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:07.985000 audit[1681]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe78bb4d30 a2=0 a3=7ffe78bb4d1c items=0 ppid=1668 pid=1681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.985000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:07.989000 audit[1683]: NETFILTER_CFG table=filter:28 family=2 entries=2 op=nft_register_chain pid=1683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:07.989000 audit[1683]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe126c5980 a2=0 a3=7ffe126c596c items=0 ppid=1668 pid=1683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.989000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:07.992796 kubelet[1668]: I0212 19:40:07.992750 1668 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:40:07.992796 kubelet[1668]: I0212 19:40:07.992775 1668 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:40:07.992796 kubelet[1668]: I0212 19:40:07.992811 1668 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:07.994000 audit[1686]: NETFILTER_CFG table=filter:29 family=2 entries=2 op=nft_register_chain pid=1686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:07.994000 audit[1686]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff46521f30 a2=0 a3=7fff46521f1c items=0 ppid=1668 pid=1686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:07.994000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:07.997576 kubelet[1668]: I0212 19:40:07.997519 1668 policy_none.go:49] "None policy: Start" Feb 12 19:40:07.999111 kubelet[1668]: I0212 19:40:07.999078 1668 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:40:07.999238 kubelet[1668]: I0212 19:40:07.999125 1668 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:40:08.013208 systemd[1]: Created slice kubepods.slice. Feb 12 19:40:08.021765 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:40:08.029578 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:40:08.029000 audit[1691]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_rule pid=1691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:08.029000 audit[1691]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffeff34a850 a2=0 a3=7ffeff34a83c items=0 ppid=1668 pid=1691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.029000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:40:08.036255 kubelet[1668]: I0212 19:40:08.036178 1668 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:40:08.036000 audit[1692]: NETFILTER_CFG table=mangle:31 family=10 entries=2 op=nft_register_chain pid=1692 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:08.036000 audit[1692]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7fff19d08ef0 a2=0 a3=7fff19d08edc items=0 ppid=1668 pid=1692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.036000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:40:08.038199 kubelet[1668]: I0212 19:40:08.038047 1668 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:40:08.038199 kubelet[1668]: I0212 19:40:08.038164 1668 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:40:08.038199 kubelet[1668]: I0212 19:40:08.038199 1668 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:40:08.038350 kubelet[1668]: E0212 19:40:08.038273 1668 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:40:08.040404 kubelet[1668]: W0212 19:40:08.040307 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://164.90.149.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:08.040404 kubelet[1668]: E0212 19:40:08.040386 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://164.90.149.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:08.040000 audit[1693]: NETFILTER_CFG table=mangle:32 family=2 entries=1 op=nft_register_chain pid=1693 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:08.040000 audit[1693]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff90d46660 a2=0 a3=7fff90d4664c items=0 ppid=1668 pid=1693 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.040000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:08.041000 audit[1668]: AVC avc: denied { mac_admin } for pid=1668 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:08.041000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:08.041000 audit[1668]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000be2450 a1=c000bd4f30 a2=c000be2420 a3=25 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.041000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:08.043231 kubelet[1668]: I0212 19:40:08.042508 1668 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:40:08.043231 kubelet[1668]: I0212 19:40:08.042574 1668 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:40:08.043231 kubelet[1668]: I0212 19:40:08.042851 1668 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:40:08.045000 audit[1694]: NETFILTER_CFG table=mangle:33 family=10 entries=1 op=nft_register_chain pid=1694 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:08.045000 audit[1694]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffef221c030 a2=0 a3=7ffef221c01c items=0 ppid=1668 pid=1694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.045000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:40:08.047485 kubelet[1668]: E0212 19:40:08.044157 1668 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-f-2b8c436d32\" not found" Feb 12 19:40:08.049000 audit[1695]: NETFILTER_CFG table=nat:34 family=10 entries=2 op=nft_register_chain pid=1695 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:08.049000 audit[1695]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffe4f7ceee0 a2=0 a3=7ffe4f7ceecc items=0 ppid=1668 pid=1695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.049000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:08.051000 audit[1696]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_chain pid=1696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:08.051000 audit[1696]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd9a6d7d50 a2=0 a3=7ffd9a6d7d3c items=0 ppid=1668 pid=1696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.051000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:40:08.052000 audit[1697]: NETFILTER_CFG table=filter:36 family=10 entries=2 op=nft_register_chain pid=1697 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:08.052000 audit[1697]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffdfe82bcc0 a2=0 a3=7ffdfe82bcac items=0 ppid=1668 pid=1697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.052000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:08.053000 audit[1698]: NETFILTER_CFG table=filter:37 family=2 entries=1 op=nft_register_chain pid=1698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:08.053000 audit[1698]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd3006ba10 a2=0 a3=7ffd3006b9fc items=0 ppid=1668 pid=1698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:08.053000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:40:08.058634 kubelet[1668]: I0212 19:40:08.058594 1668 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.059248 kubelet[1668]: E0212 19:40:08.059221 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.90.149.146:6443/api/v1/nodes\": dial tcp 164.90.149.146:6443: connect: connection refused" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.139423 kubelet[1668]: I0212 19:40:08.139348 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:08.141094 kubelet[1668]: I0212 19:40:08.140998 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:08.143603 kubelet[1668]: I0212 19:40:08.143282 1668 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:08.150430 systemd[1]: Created slice kubepods-burstable-pod66c82eb03f65533253fa1218177b5575.slice. Feb 12 19:40:08.162582 kubelet[1668]: E0212 19:40:08.162431 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://164.90.149.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-f-2b8c436d32?timeout=10s\": dial tcp 164.90.149.146:6443: connect: connection refused" interval="400ms" Feb 12 19:40:08.164858 systemd[1]: Created slice kubepods-burstable-pod04c86ead1141e6c69fe3f05dffa09778.slice. Feb 12 19:40:08.181344 systemd[1]: Created slice kubepods-burstable-pod59c1eca76618a5178bf530ece398aa56.slice. Feb 12 19:40:08.261689 kubelet[1668]: I0212 19:40:08.261622 1668 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.262316 kubelet[1668]: E0212 19:40:08.262285 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.90.149.146:6443/api/v1/nodes\": dial tcp 164.90.149.146:6443: connect: connection refused" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.267407 kubelet[1668]: I0212 19:40:08.267346 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.267708 kubelet[1668]: I0212 19:40:08.267692 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.267837 kubelet[1668]: I0212 19:40:08.267823 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.267967 kubelet[1668]: I0212 19:40:08.267952 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.268117 kubelet[1668]: I0212 19:40:08.268102 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.268402 kubelet[1668]: I0212 19:40:08.268380 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.268611 kubelet[1668]: I0212 19:40:08.268592 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.268785 kubelet[1668]: I0212 19:40:08.268765 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.268929 kubelet[1668]: I0212 19:40:08.268912 1668 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/59c1eca76618a5178bf530ece398aa56-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-f-2b8c436d32\" (UID: \"59c1eca76618a5178bf530ece398aa56\") " pod="kube-system/kube-scheduler-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.460195 kubelet[1668]: E0212 19:40:08.459970 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:08.462689 env[1109]: time="2024-02-12T19:40:08.462024321Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-f-2b8c436d32,Uid:66c82eb03f65533253fa1218177b5575,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:08.471474 kubelet[1668]: E0212 19:40:08.471387 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:08.472895 env[1109]: time="2024-02-12T19:40:08.472811537Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-f-2b8c436d32,Uid:04c86ead1141e6c69fe3f05dffa09778,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:08.484172 kubelet[1668]: E0212 19:40:08.484135 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:08.485837 env[1109]: time="2024-02-12T19:40:08.485734762Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-f-2b8c436d32,Uid:59c1eca76618a5178bf530ece398aa56,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:08.563583 kubelet[1668]: E0212 19:40:08.563455 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://164.90.149.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-f-2b8c436d32?timeout=10s\": dial tcp 164.90.149.146:6443: connect: connection refused" interval="800ms" Feb 12 19:40:08.664549 kubelet[1668]: I0212 19:40:08.664482 1668 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.664886 kubelet[1668]: E0212 19:40:08.664863 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.90.149.146:6443/api/v1/nodes\": dial tcp 164.90.149.146:6443: connect: connection refused" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:08.783842 kubelet[1668]: W0212 19:40:08.783644 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://164.90.149.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-f-2b8c436d32&limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:08.783842 kubelet[1668]: E0212 19:40:08.783728 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://164.90.149.146:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-f-2b8c436d32&limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:08.932580 kubelet[1668]: W0212 19:40:08.932454 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://164.90.149.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:08.932580 kubelet[1668]: E0212 19:40:08.932530 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://164.90.149.146:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:09.027665 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1123662750.mount: Deactivated successfully. Feb 12 19:40:09.037825 env[1109]: time="2024-02-12T19:40:09.037676372Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.043964 env[1109]: time="2024-02-12T19:40:09.043729078Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.045657 env[1109]: time="2024-02-12T19:40:09.045597415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.048851 env[1109]: time="2024-02-12T19:40:09.048787413Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.050025 env[1109]: time="2024-02-12T19:40:09.049973369Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.051202 env[1109]: time="2024-02-12T19:40:09.051159024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.054262 env[1109]: time="2024-02-12T19:40:09.054182746Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.058937 env[1109]: time="2024-02-12T19:40:09.058877125Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.061243 env[1109]: time="2024-02-12T19:40:09.061182908Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.063455 env[1109]: time="2024-02-12T19:40:09.063399078Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.072917 env[1109]: time="2024-02-12T19:40:09.072840150Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.103438 env[1109]: time="2024-02-12T19:40:09.103369860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:09.111247 kubelet[1668]: W0212 19:40:09.111159 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://164.90.149.146:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:09.111247 kubelet[1668]: E0212 19:40:09.111250 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://164.90.149.146:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:09.123868 env[1109]: time="2024-02-12T19:40:09.123728134Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:09.124078 env[1109]: time="2024-02-12T19:40:09.123916865Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:09.124078 env[1109]: time="2024-02-12T19:40:09.123939368Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:09.129563 env[1109]: time="2024-02-12T19:40:09.128932121Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/3774db089bec85c4aeae794c6ee19c988e214c7e4bc8e83c6f469ea2879a189b pid=1707 runtime=io.containerd.runc.v2 Feb 12 19:40:09.158854 env[1109]: time="2024-02-12T19:40:09.158768306Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:09.159206 env[1109]: time="2024-02-12T19:40:09.159174238Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:09.159327 env[1109]: time="2024-02-12T19:40:09.159302571Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:09.159654 env[1109]: time="2024-02-12T19:40:09.159615880Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1c3dc85d2041560e06bd70573af661978d801c08f764ceed489f2a8946df7e49 pid=1725 runtime=io.containerd.runc.v2 Feb 12 19:40:09.165278 systemd[1]: Started cri-containerd-3774db089bec85c4aeae794c6ee19c988e214c7e4bc8e83c6f469ea2879a189b.scope. Feb 12 19:40:09.180024 env[1109]: time="2024-02-12T19:40:09.179096737Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:09.180024 env[1109]: time="2024-02-12T19:40:09.179167214Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:09.180024 env[1109]: time="2024-02-12T19:40:09.179181891Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:09.180024 env[1109]: time="2024-02-12T19:40:09.179384353Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/242e18f954e49cd703c3f43670b10a4eb3de1ca44cade05cd621a0e00c2c458f pid=1747 runtime=io.containerd.runc.v2 Feb 12 19:40:09.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit: BPF prog-id=67 op=LOAD Feb 12 19:40:09.191000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373464623038396265633835633461656165373934633665653139 Feb 12 19:40:09.191000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.191000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373464623038396265633835633461656165373934633665653139 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit: BPF prog-id=68 op=LOAD Feb 12 19:40:09.192000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000228de0 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373464623038396265633835633461656165373934633665653139 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit: BPF prog-id=69 op=LOAD Feb 12 19:40:09.192000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000228e28 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373464623038396265633835633461656165373934633665653139 Feb 12 19:40:09.192000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:40:09.192000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { perfmon } for pid=1717 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit[1717]: AVC avc: denied { bpf } for pid=1717 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.192000 audit: BPF prog-id=70 op=LOAD Feb 12 19:40:09.192000 audit[1717]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000229238 items=0 ppid=1707 pid=1717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.192000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337373464623038396265633835633461656165373934633665653139 Feb 12 19:40:09.199466 systemd[1]: Started cri-containerd-242e18f954e49cd703c3f43670b10a4eb3de1ca44cade05cd621a0e00c2c458f.scope. Feb 12 19:40:09.236029 systemd[1]: Started cri-containerd-1c3dc85d2041560e06bd70573af661978d801c08f764ceed489f2a8946df7e49.scope. Feb 12 19:40:09.266341 env[1109]: time="2024-02-12T19:40:09.266290246Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-f-2b8c436d32,Uid:66c82eb03f65533253fa1218177b5575,Namespace:kube-system,Attempt:0,} returns sandbox id \"3774db089bec85c4aeae794c6ee19c988e214c7e4bc8e83c6f469ea2879a189b\"" Feb 12 19:40:09.267917 kubelet[1668]: E0212 19:40:09.267883 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.273000 audit: BPF prog-id=71 op=LOAD Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336463383564323034313536306530366264373035373361663636 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336463383564323034313536306530366264373035373361663636 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit: BPF prog-id=72 op=LOAD Feb 12 19:40:09.274000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000388340 items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336463383564323034313536306530366264373035373361663636 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit: BPF prog-id=73 op=LOAD Feb 12 19:40:09.274000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000388388 items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336463383564323034313536306530366264373035373361663636 Feb 12 19:40:09.274000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:40:09.274000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { perfmon } for pid=1756 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit[1756]: AVC avc: denied { bpf } for pid=1756 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.274000 audit: BPF prog-id=74 op=LOAD Feb 12 19:40:09.274000 audit[1756]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000388798 items=0 ppid=1725 pid=1756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.274000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3163336463383564323034313536306530366264373035373361663636 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.275000 audit: BPF prog-id=75 op=LOAD Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1747 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234326531386639353465343963643730336333663433363730623130 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=1747 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234326531386639353465343963643730336333663433363730623130 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit: BPF prog-id=76 op=LOAD Feb 12 19:40:09.276000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00035e9c0 items=0 ppid=1747 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234326531386639353465343963643730336333663433363730623130 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit: BPF prog-id=77 op=LOAD Feb 12 19:40:09.276000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00035ea08 items=0 ppid=1747 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234326531386639353465343963643730336333663433363730623130 Feb 12 19:40:09.276000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:40:09.276000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { perfmon } for pid=1770 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit[1770]: AVC avc: denied { bpf } for pid=1770 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.276000 audit: BPF prog-id=78 op=LOAD Feb 12 19:40:09.276000 audit[1770]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c00035ee18 items=0 ppid=1747 pid=1770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.276000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234326531386639353465343963643730336333663433363730623130 Feb 12 19:40:09.283180 env[1109]: time="2024-02-12T19:40:09.281990450Z" level=info msg="CreateContainer within sandbox \"3774db089bec85c4aeae794c6ee19c988e214c7e4bc8e83c6f469ea2879a189b\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:40:09.305301 env[1109]: time="2024-02-12T19:40:09.305113800Z" level=info msg="CreateContainer within sandbox \"3774db089bec85c4aeae794c6ee19c988e214c7e4bc8e83c6f469ea2879a189b\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"fbfceaa90796f530d4d90182947071ba91b760c9a2255f320e08af49139db95b\"" Feb 12 19:40:09.311615 env[1109]: time="2024-02-12T19:40:09.311540549Z" level=info msg="StartContainer for \"fbfceaa90796f530d4d90182947071ba91b760c9a2255f320e08af49139db95b\"" Feb 12 19:40:09.351720 env[1109]: time="2024-02-12T19:40:09.351666681Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-f-2b8c436d32,Uid:59c1eca76618a5178bf530ece398aa56,Namespace:kube-system,Attempt:0,} returns sandbox id \"242e18f954e49cd703c3f43670b10a4eb3de1ca44cade05cd621a0e00c2c458f\"" Feb 12 19:40:09.353454 kubelet[1668]: E0212 19:40:09.353383 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:09.354698 env[1109]: time="2024-02-12T19:40:09.354650606Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-f-2b8c436d32,Uid:04c86ead1141e6c69fe3f05dffa09778,Namespace:kube-system,Attempt:0,} returns sandbox id \"1c3dc85d2041560e06bd70573af661978d801c08f764ceed489f2a8946df7e49\"" Feb 12 19:40:09.356604 env[1109]: time="2024-02-12T19:40:09.356546120Z" level=info msg="CreateContainer within sandbox \"242e18f954e49cd703c3f43670b10a4eb3de1ca44cade05cd621a0e00c2c458f\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:40:09.356755 kubelet[1668]: E0212 19:40:09.356662 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:09.360005 env[1109]: time="2024-02-12T19:40:09.359936601Z" level=info msg="CreateContainer within sandbox \"1c3dc85d2041560e06bd70573af661978d801c08f764ceed489f2a8946df7e49\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:40:09.365203 kubelet[1668]: E0212 19:40:09.364782 1668 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://164.90.149.146:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-f-2b8c436d32?timeout=10s\": dial tcp 164.90.149.146:6443: connect: connection refused" interval="1.6s" Feb 12 19:40:09.365560 systemd[1]: Started cri-containerd-fbfceaa90796f530d4d90182947071ba91b760c9a2255f320e08af49139db95b.scope. Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.391000 audit: BPF prog-id=79 op=LOAD Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=1707 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666365616139303739366635333064346439303138323934373037 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=1707 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666365616139303739366635333064346439303138323934373037 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit: BPF prog-id=80 op=LOAD Feb 12 19:40:09.392000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0002d2a90 items=0 ppid=1707 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666365616139303739366635333064346439303138323934373037 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit: BPF prog-id=81 op=LOAD Feb 12 19:40:09.392000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0002d2ad8 items=0 ppid=1707 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666365616139303739366635333064346439303138323934373037 Feb 12 19:40:09.392000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:40:09.392000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { perfmon } for pid=1818 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit[1818]: AVC avc: denied { bpf } for pid=1818 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.392000 audit: BPF prog-id=82 op=LOAD Feb 12 19:40:09.392000 audit[1818]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002d2ee8 items=0 ppid=1707 pid=1818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.392000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6662666365616139303739366635333064346439303138323934373037 Feb 12 19:40:09.402460 env[1109]: time="2024-02-12T19:40:09.398248464Z" level=info msg="CreateContainer within sandbox \"1c3dc85d2041560e06bd70573af661978d801c08f764ceed489f2a8946df7e49\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"15de28cb3a7afb10bb3b2d8907b011afb91f9c266ee1a227b534010a16d07f56\"" Feb 12 19:40:09.402460 env[1109]: time="2024-02-12T19:40:09.399042951Z" level=info msg="StartContainer for \"15de28cb3a7afb10bb3b2d8907b011afb91f9c266ee1a227b534010a16d07f56\"" Feb 12 19:40:09.418334 env[1109]: time="2024-02-12T19:40:09.418258332Z" level=info msg="CreateContainer within sandbox \"242e18f954e49cd703c3f43670b10a4eb3de1ca44cade05cd621a0e00c2c458f\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"b9fa678c4607cb2907fcf985620e14a28a63777387dd98c7400ba94f44796f03\"" Feb 12 19:40:09.420819 env[1109]: time="2024-02-12T19:40:09.420760114Z" level=info msg="StartContainer for \"b9fa678c4607cb2907fcf985620e14a28a63777387dd98c7400ba94f44796f03\"" Feb 12 19:40:09.430274 systemd[1]: Started cri-containerd-15de28cb3a7afb10bb3b2d8907b011afb91f9c266ee1a227b534010a16d07f56.scope. Feb 12 19:40:09.448492 kubelet[1668]: W0212 19:40:09.448433 1668 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://164.90.149.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:09.448707 kubelet[1668]: E0212 19:40:09.448512 1668 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://164.90.149.146:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 164.90.149.146:6443: connect: connection refused Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.467000 audit: BPF prog-id=83 op=LOAD Feb 12 19:40:09.473906 kubelet[1668]: I0212 19:40:09.469484 1668 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:09.475348 kubelet[1668]: E0212 19:40:09.475301 1668 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://164.90.149.146:6443/api/v1/nodes\": dial tcp 164.90.149.146:6443: connect: connection refused" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:09.475744 env[1109]: time="2024-02-12T19:40:09.475692229Z" level=info msg="StartContainer for \"fbfceaa90796f530d4d90182947071ba91b760c9a2255f320e08af49139db95b\" returns successfully" Feb 12 19:40:09.475000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.475000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.475000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646532386362336137616662313062623362326438393037623031 Feb 12 19:40:09.476000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.476000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.476000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646532386362336137616662313062623362326438393037623031 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.477000 audit: BPF prog-id=84 op=LOAD Feb 12 19:40:09.477000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000219310 items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646532386362336137616662313062623362326438393037623031 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.478000 audit: BPF prog-id=85 op=LOAD Feb 12 19:40:09.478000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219358 items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.478000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646532386362336137616662313062623362326438393037623031 Feb 12 19:40:09.480000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:40:09.482436 systemd[1]: Started cri-containerd-b9fa678c4607cb2907fcf985620e14a28a63777387dd98c7400ba94f44796f03.scope. Feb 12 19:40:09.487000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { perfmon } for pid=1857 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit[1857]: AVC avc: denied { bpf } for pid=1857 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.488000 audit: BPF prog-id=86 op=LOAD Feb 12 19:40:09.488000 audit[1857]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219768 items=0 ppid=1725 pid=1857 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.488000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3135646532386362336137616662313062623362326438393037623031 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.533000 audit: BPF prog-id=87 op=LOAD Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=1747 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666136373863343630376362323930376663663938353632306531 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=1747 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666136373863343630376362323930376663663938353632306531 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit: BPF prog-id=88 op=LOAD Feb 12 19:40:09.534000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000256a0 items=0 ppid=1747 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666136373863343630376362323930376663663938353632306531 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit: BPF prog-id=89 op=LOAD Feb 12 19:40:09.534000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000256e8 items=0 ppid=1747 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666136373863343630376362323930376663663938353632306531 Feb 12 19:40:09.534000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:40:09.534000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { perfmon } for pid=1879 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit[1879]: AVC avc: denied { bpf } for pid=1879 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:09.534000 audit: BPF prog-id=90 op=LOAD Feb 12 19:40:09.534000 audit[1879]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000025af8 items=0 ppid=1747 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:09.534000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239666136373863343630376362323930376663663938353632306531 Feb 12 19:40:09.563862 env[1109]: time="2024-02-12T19:40:09.563676559Z" level=info msg="StartContainer for \"15de28cb3a7afb10bb3b2d8907b011afb91f9c266ee1a227b534010a16d07f56\" returns successfully" Feb 12 19:40:09.598786 env[1109]: time="2024-02-12T19:40:09.598694960Z" level=info msg="StartContainer for \"b9fa678c4607cb2907fcf985620e14a28a63777387dd98c7400ba94f44796f03\" returns successfully" Feb 12 19:40:10.048954 kubelet[1668]: E0212 19:40:10.048913 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:10.054251 kubelet[1668]: E0212 19:40:10.054200 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:10.057253 kubelet[1668]: E0212 19:40:10.057214 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:10.879086 systemd[1]: Started sshd@9-164.90.149.146:22-167.99.70.20:42836.service. Feb 12 19:40:10.881000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-164.90.149.146:22-167.99.70.20:42836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:11.059288 kubelet[1668]: E0212 19:40:11.059246 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:11.076996 kubelet[1668]: I0212 19:40:11.076948 1668 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:11.132000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:11.132000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000a08000 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:11.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:11.132000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:11.132000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000268c80 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:11.132000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:11.876638 sshd[1933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.70.20 user=root Feb 12 19:40:11.875000 audit[1933]: USER_AUTH pid=1933 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=167.99.70.20 addr=167.99.70.20 terminal=ssh res=failed' Feb 12 19:40:12.309000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.311442 kernel: kauditd_printk_skb: 563 callbacks suppressed Feb 12 19:40:12.311563 kernel: audit: type=1400 audit(1707766812.309:716): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.309000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0040f6090 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.321592 kernel: audit: type=1300 audit(1707766812.309:716): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0040f6090 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.323047 kernel: audit: type=1327 audit(1707766812.309:716): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.309000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.332091 kernel: audit: type=1400 audit(1707766812.309:717): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.332254 kernel: audit: type=1300 audit(1707766812.309:717): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005c84080 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.309000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c005c84080 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.309000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.348069 kernel: audit: type=1327 audit(1707766812.309:717): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.348247 kernel: audit: type=1400 audit(1707766812.309:718): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.348280 kernel: audit: type=1300 audit(1707766812.309:718): arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0040f61b0 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.309000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c0040f61b0 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.309000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.360723 kernel: audit: type=1327 audit(1707766812.309:718): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.360969 kernel: audit: type=1400 audit(1707766812.332:719): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.332000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.332000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4c a1=c000e9e990 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.372000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.372000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c004669220 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.372000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.373000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:12.373000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003a5e450 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:40:12.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:40:12.479288 kubelet[1668]: E0212 19:40:12.479249 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:12.511072 kubelet[1668]: E0212 19:40:12.511005 1668 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-f-2b8c436d32\" not found" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:12.551989 kubelet[1668]: I0212 19:40:12.551928 1668 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:12.601721 kubelet[1668]: E0212 19:40:12.601542 1668 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-f-2b8c436d32.17b334dd1a630572", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-f-2b8c436d32", UID:"ci-3510.3.2-f-2b8c436d32", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-f-2b8c436d32"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 938663794, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 938663794, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 19:40:12.665211 kubelet[1668]: E0212 19:40:12.665108 1668 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-f-2b8c436d32.17b334dd1aa8f238", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-f-2b8c436d32", UID:"ci-3510.3.2-f-2b8c436d32", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"InvalidDiskCapacity", Message:"invalid capacity 0 on image filesystem", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-f-2b8c436d32"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 943246392, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 40, 7, 943246392, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'namespaces "default" not found' (will not retry!) Feb 12 19:40:12.938233 kubelet[1668]: I0212 19:40:12.938174 1668 apiserver.go:52] "Watching apiserver" Feb 12 19:40:12.964211 kubelet[1668]: I0212 19:40:12.964140 1668 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:40:13.011966 kubelet[1668]: I0212 19:40:13.011897 1668 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:40:13.746245 sshd[1933]: Failed password for root from 167.99.70.20 port 42836 ssh2 Feb 12 19:40:14.004820 sshd[1933]: Received disconnect from 167.99.70.20 port 42836:11: Bye Bye [preauth] Feb 12 19:40:14.004820 sshd[1933]: Disconnected from authenticating user root 167.99.70.20 port 42836 [preauth] Feb 12 19:40:14.006439 systemd[1]: sshd@9-164.90.149.146:22-167.99.70.20:42836.service: Deactivated successfully. Feb 12 19:40:14.005000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-164.90.149.146:22-167.99.70.20:42836 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:14.414940 kubelet[1668]: W0212 19:40:14.414892 1668 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:40:14.415666 kubelet[1668]: E0212 19:40:14.415641 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:15.067121 kubelet[1668]: E0212 19:40:15.067020 1668 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:15.178000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="vda9" ino=524848 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:40:15.178000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0007af9c0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:15.178000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:15.990903 systemd[1]: Started sshd@10-164.90.149.146:22-119.202.128.28:52952.service. Feb 12 19:40:15.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.90.149.146:22-119.202.128.28:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:16.614352 systemd[1]: Reloading. Feb 12 19:40:16.710231 /usr/lib/systemd/system-generators/torcx-generator[1962]: time="2024-02-12T19:40:16Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:40:16.710925 /usr/lib/systemd/system-generators/torcx-generator[1962]: time="2024-02-12T19:40:16Z" level=info msg="torcx already run" Feb 12 19:40:16.729481 sshd[1938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.128.28 user=root Feb 12 19:40:16.728000 audit[1938]: USER_AUTH pid=1938 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.202.128.28 addr=119.202.128.28 terminal=ssh res=failed' Feb 12 19:40:16.821487 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:40:16.821513 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:40:16.843578 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit: BPF prog-id=91 op=LOAD Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.942000 audit: BPF prog-id=92 op=LOAD Feb 12 19:40:16.942000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:40:16.942000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.943000 audit: BPF prog-id=93 op=LOAD Feb 12 19:40:16.943000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.944000 audit: BPF prog-id=94 op=LOAD Feb 12 19:40:16.944000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:40:16.947000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.948000 audit: BPF prog-id=95 op=LOAD Feb 12 19:40:16.948000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.949000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.950000 audit: BPF prog-id=96 op=LOAD Feb 12 19:40:16.950000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.953000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit: BPF prog-id=97 op=LOAD Feb 12 19:40:16.954000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit: BPF prog-id=98 op=LOAD Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.954000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.955000 audit: BPF prog-id=99 op=LOAD Feb 12 19:40:16.955000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:40:16.955000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit: BPF prog-id=100 op=LOAD Feb 12 19:40:16.956000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit: BPF prog-id=101 op=LOAD Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit: BPF prog-id=102 op=LOAD Feb 12 19:40:16.957000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:40:16.957000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.957000 audit: BPF prog-id=103 op=LOAD Feb 12 19:40:16.957000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.958000 audit: BPF prog-id=104 op=LOAD Feb 12 19:40:16.958000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit: BPF prog-id=105 op=LOAD Feb 12 19:40:16.960000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit: BPF prog-id=106 op=LOAD Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.960000 audit: BPF prog-id=107 op=LOAD Feb 12 19:40:16.960000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:40:16.960000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.961000 audit: BPF prog-id=108 op=LOAD Feb 12 19:40:16.961000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.962000 audit: BPF prog-id=109 op=LOAD Feb 12 19:40:16.962000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.963000 audit: BPF prog-id=110 op=LOAD Feb 12 19:40:16.963000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.966000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:16.966000 audit: BPF prog-id=111 op=LOAD Feb 12 19:40:16.966000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:40:16.985246 systemd[1]: Stopping kubelet.service... Feb 12 19:40:16.989018 kubelet[1668]: I0212 19:40:16.985796 1668 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:17.003629 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:40:17.003933 systemd[1]: Stopped kubelet.service. Feb 12 19:40:17.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:17.008865 systemd[1]: Started kubelet.service. Feb 12 19:40:17.008000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:17.096376 kubelet[2009]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:17.096376 kubelet[2009]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:40:17.096376 kubelet[2009]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:40:17.096796 kubelet[2009]: I0212 19:40:17.096430 2009 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:40:17.104097 kubelet[2009]: I0212 19:40:17.103987 2009 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:40:17.104097 kubelet[2009]: I0212 19:40:17.104034 2009 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:40:17.104439 kubelet[2009]: I0212 19:40:17.104408 2009 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:40:17.107348 kubelet[2009]: I0212 19:40:17.107282 2009 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:40:17.115457 kubelet[2009]: I0212 19:40:17.115404 2009 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:40:17.122278 kubelet[2009]: I0212 19:40:17.121868 2009 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:40:17.122278 kubelet[2009]: I0212 19:40:17.122154 2009 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:40:17.122512 kubelet[2009]: I0212 19:40:17.122376 2009 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:40:17.122512 kubelet[2009]: I0212 19:40:17.122405 2009 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:40:17.122512 kubelet[2009]: I0212 19:40:17.122454 2009 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:40:17.122690 kubelet[2009]: I0212 19:40:17.122527 2009 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:17.135376 kubelet[2009]: I0212 19:40:17.135335 2009 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:40:17.135376 kubelet[2009]: I0212 19:40:17.135379 2009 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:40:17.135587 kubelet[2009]: I0212 19:40:17.135404 2009 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:40:17.135587 kubelet[2009]: I0212 19:40:17.135420 2009 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:40:17.138681 kubelet[2009]: I0212 19:40:17.138652 2009 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:40:17.139590 kubelet[2009]: I0212 19:40:17.139517 2009 server.go:1168] "Started kubelet" Feb 12 19:40:17.142000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:17.142000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:17.142000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008f2c90 a1=c000823cf8 a2=c0008f2c60 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:17.142000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:17.142000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:17.142000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:17.142000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0008ea580 a1=c000823d10 a2=c0008f2d20 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:17.142000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:17.146399 kubelet[2009]: I0212 19:40:17.143359 2009 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:40:17.146399 kubelet[2009]: I0212 19:40:17.143400 2009 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:40:17.146399 kubelet[2009]: I0212 19:40:17.143424 2009 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:40:17.155380 kubelet[2009]: I0212 19:40:17.152659 2009 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:40:17.155664 kubelet[2009]: I0212 19:40:17.155521 2009 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:40:17.159130 kubelet[2009]: I0212 19:40:17.156783 2009 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:40:17.160758 kubelet[2009]: I0212 19:40:17.160212 2009 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:40:17.162712 kubelet[2009]: I0212 19:40:17.162554 2009 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:40:17.169730 kubelet[2009]: I0212 19:40:17.157827 2009 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:40:17.172153 kubelet[2009]: E0212 19:40:17.170995 2009 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:40:17.172153 kubelet[2009]: E0212 19:40:17.171029 2009 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:40:17.183718 kubelet[2009]: I0212 19:40:17.183671 2009 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:40:17.183718 kubelet[2009]: I0212 19:40:17.183712 2009 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:40:17.183718 kubelet[2009]: I0212 19:40:17.183732 2009 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:40:17.183933 kubelet[2009]: E0212 19:40:17.183819 2009 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:40:17.264978 kubelet[2009]: I0212 19:40:17.264707 2009 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.284375 kubelet[2009]: E0212 19:40:17.284337 2009 kubelet.go:2281] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 19:40:17.284881 kubelet[2009]: I0212 19:40:17.284851 2009 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.285210 kubelet[2009]: I0212 19:40:17.285194 2009 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.324688 kubelet[2009]: I0212 19:40:17.324638 2009 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:40:17.324688 kubelet[2009]: I0212 19:40:17.324674 2009 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:40:17.324688 kubelet[2009]: I0212 19:40:17.324706 2009 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:40:17.325141 kubelet[2009]: I0212 19:40:17.325118 2009 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:40:17.325141 kubelet[2009]: I0212 19:40:17.325142 2009 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:40:17.325239 kubelet[2009]: I0212 19:40:17.325150 2009 policy_none.go:49] "None policy: Start" Feb 12 19:40:17.326209 kubelet[2009]: I0212 19:40:17.326172 2009 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:40:17.326209 kubelet[2009]: I0212 19:40:17.326205 2009 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:40:17.326408 kubelet[2009]: I0212 19:40:17.326353 2009 state_mem.go:75] "Updated machine memory state" Feb 12 19:40:17.331244 kubelet[2009]: I0212 19:40:17.331191 2009 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:40:17.331389 kubelet[2009]: I0212 19:40:17.331290 2009 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:40:17.336149 kernel: kauditd_printk_skb: 268 callbacks suppressed Feb 12 19:40:17.336297 kernel: audit: type=1400 audit(1707766817.330:974): avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:17.330000 audit[2009]: AVC avc: denied { mac_admin } for pid=2009 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:17.336397 kubelet[2009]: I0212 19:40:17.332740 2009 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:40:17.330000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:17.340412 kernel: audit: type=1401 audit(1707766817.330:974): op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:40:17.330000 audit[2009]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000058e10 a1=c000823860 a2=c000058de0 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:17.347143 kernel: audit: type=1300 audit(1707766817.330:974): arch=c000003e syscall=188 success=no exit=-22 a0=c000058e10 a1=c000823860 a2=c000058de0 a3=25 items=0 ppid=1 pid=2009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:17.330000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:17.355083 kernel: audit: type=1327 audit(1707766817.330:974): proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:40:17.486192 kubelet[2009]: I0212 19:40:17.485715 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:17.486192 kubelet[2009]: I0212 19:40:17.485875 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:17.486192 kubelet[2009]: I0212 19:40:17.485926 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:17.495828 kubelet[2009]: W0212 19:40:17.495795 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:40:17.502217 kubelet[2009]: W0212 19:40:17.502178 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:40:17.505568 kubelet[2009]: W0212 19:40:17.505529 2009 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:40:17.505746 kubelet[2009]: E0212 19:40:17.505686 2009 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557155 kubelet[2009]: I0212 19:40:17.557013 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557363 kubelet[2009]: I0212 19:40:17.557348 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557471 kubelet[2009]: I0212 19:40:17.557460 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557571 kubelet[2009]: I0212 19:40:17.557557 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557681 kubelet[2009]: I0212 19:40:17.557665 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557792 kubelet[2009]: I0212 19:40:17.557776 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/04c86ead1141e6c69fe3f05dffa09778-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-f-2b8c436d32\" (UID: \"04c86ead1141e6c69fe3f05dffa09778\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.557914 kubelet[2009]: I0212 19:40:17.557899 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/59c1eca76618a5178bf530ece398aa56-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-f-2b8c436d32\" (UID: \"59c1eca76618a5178bf530ece398aa56\") " pod="kube-system/kube-scheduler-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.558012 kubelet[2009]: I0212 19:40:17.558000 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.558166 kubelet[2009]: I0212 19:40:17.558149 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/66c82eb03f65533253fa1218177b5575-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-f-2b8c436d32\" (UID: \"66c82eb03f65533253fa1218177b5575\") " pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" Feb 12 19:40:17.798697 kubelet[2009]: E0212 19:40:17.798646 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:17.803467 kubelet[2009]: E0212 19:40:17.803422 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:17.807255 kubelet[2009]: E0212 19:40:17.807119 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:18.141965 kubelet[2009]: I0212 19:40:18.141830 2009 apiserver.go:52] "Watching apiserver" Feb 12 19:40:18.155672 kubelet[2009]: I0212 19:40:18.155618 2009 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:40:18.163357 kubelet[2009]: I0212 19:40:18.163302 2009 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:40:18.244390 kubelet[2009]: E0212 19:40:18.244350 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:18.245560 kubelet[2009]: E0212 19:40:18.245521 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:18.245976 kubelet[2009]: E0212 19:40:18.245956 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:18.284264 sshd[1938]: Failed password for root from 119.202.128.28 port 52952 ssh2 Feb 12 19:40:18.426732 kubelet[2009]: I0212 19:40:18.426684 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-f-2b8c436d32" podStartSLOduration=4.426253565 podCreationTimestamp="2024-02-12 19:40:14 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:18.343347425 +0000 UTC m=+1.328163178" watchObservedRunningTime="2024-02-12 19:40:18.426253565 +0000 UTC m=+1.411069309" Feb 12 19:40:18.474074 kubelet[2009]: I0212 19:40:18.474023 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-f-2b8c436d32" podStartSLOduration=1.473956437 podCreationTimestamp="2024-02-12 19:40:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:18.446864042 +0000 UTC m=+1.431679795" watchObservedRunningTime="2024-02-12 19:40:18.473956437 +0000 UTC m=+1.458772194" Feb 12 19:40:18.808305 sshd[1938]: Received disconnect from 119.202.128.28 port 52952:11: Bye Bye [preauth] Feb 12 19:40:18.808305 sshd[1938]: Disconnected from authenticating user root 119.202.128.28 port 52952 [preauth] Feb 12 19:40:18.809488 systemd[1]: sshd@10-164.90.149.146:22-119.202.128.28:52952.service: Deactivated successfully. Feb 12 19:40:18.808000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.90.149.146:22-119.202.128.28:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:18.815094 kernel: audit: type=1131 audit(1707766818.808:975): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-164.90.149.146:22-119.202.128.28:52952 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:19.246644 kubelet[2009]: E0212 19:40:19.246606 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:19.768258 update_engine[1100]: I0212 19:40:19.768153 1100 update_attempter.cc:509] Updating boot flags... Feb 12 19:40:20.250194 kubelet[2009]: E0212 19:40:20.250152 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:21.462920 sudo[1254]: pam_unix(sudo:session): session closed for user root Feb 12 19:40:21.461000 audit[1254]: USER_END pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.468150 kernel: audit: type=1106 audit(1707766821.461:976): pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.462000 audit[1254]: CRED_DISP pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.473134 kernel: audit: type=1104 audit(1707766821.462:977): pid=1254 uid=500 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.477597 sshd[1250]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:21.478000 audit[1250]: USER_END pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:40:21.481982 systemd[1]: sshd@7-164.90.149.146:22-139.178.68.195:32876.service: Deactivated successfully. Feb 12 19:40:21.482781 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:40:21.482939 systemd[1]: session-7.scope: Consumed 8.275s CPU time. Feb 12 19:40:21.488166 kernel: audit: type=1106 audit(1707766821.478:978): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:40:21.478000 audit[1250]: CRED_DISP pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:40:21.488745 systemd-logind[1098]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:40:21.481000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.90.149.146:22-139.178.68.195:32876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.499922 kernel: audit: type=1104 audit(1707766821.478:979): pid=1250 uid=0 auid=500 ses=7 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:40:21.500150 kernel: audit: type=1131 audit(1707766821.481:980): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-164.90.149.146:22-139.178.68.195:32876 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.500755 systemd-logind[1098]: Removed session 7. Feb 12 19:40:23.176910 kubelet[2009]: E0212 19:40:23.176833 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:23.200455 kubelet[2009]: I0212 19:40:23.200419 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-f-2b8c436d32" podStartSLOduration=6.200377821 podCreationTimestamp="2024-02-12 19:40:17 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:18.477274801 +0000 UTC m=+1.462090549" watchObservedRunningTime="2024-02-12 19:40:23.200377821 +0000 UTC m=+6.185193573" Feb 12 19:40:23.255524 kubelet[2009]: E0212 19:40:23.255489 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:23.526275 kubelet[2009]: E0212 19:40:23.526110 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:24.258550 kubelet[2009]: E0212 19:40:24.258504 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:24.840770 systemd[1]: Started sshd@11-164.90.149.146:22-104.248.54.24:47916.service. Feb 12 19:40:24.839000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.90.149.146:22-104.248.54.24:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:24.856140 kernel: audit: type=1130 audit(1707766824.839:981): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.90.149.146:22-104.248.54.24:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:25.319744 sshd[2098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.54.24 user=root Feb 12 19:40:25.319000 audit[2098]: ANOM_LOGIN_FAILURES pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:25.320563 sshd[2098]: pam_faillock(sshd:auth): Consecutive login failures for user root account temporarily locked Feb 12 19:40:25.319000 audit[2098]: USER_AUTH pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.248.54.24 addr=104.248.54.24 terminal=ssh res=failed' Feb 12 19:40:25.328628 kernel: audit: type=2100 audit(1707766825.319:982): pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='pam_faillock uid=0 exe="/usr/sbin/sshd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:25.328809 kernel: audit: type=1100 audit(1707766825.319:983): pid=2098 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.248.54.24 addr=104.248.54.24 terminal=ssh res=failed' Feb 12 19:40:27.207000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.211000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.220322 kernel: audit: type=1400 audit(1707766827.207:984): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.220508 kernel: audit: type=1400 audit(1707766827.211:985): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.211000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001140fc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.231102 kernel: audit: type=1300 audit(1707766827.211:985): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001140fc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.231295 kernel: audit: type=1327 audit(1707766827.211:985): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.211000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.245196 kernel: audit: type=1400 audit(1707766827.211:986): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.211000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001141000 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.255125 kernel: audit: type=1300 audit(1707766827.211:986): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001141000 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.211000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.265196 kernel: audit: type=1327 audit(1707766827.211:986): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.212000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:27.212000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001141040 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.207000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0010be1a0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:40:27.207000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:27.446341 sshd[2098]: Failed password for root from 104.248.54.24 port 47916 ssh2 Feb 12 19:40:28.141634 kubelet[2009]: I0212 19:40:28.141596 2009 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:40:28.142663 env[1109]: time="2024-02-12T19:40:28.142571689Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:40:28.143155 kubelet[2009]: I0212 19:40:28.142921 2009 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:40:28.815477 kubelet[2009]: I0212 19:40:28.815410 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:28.824075 systemd[1]: Created slice kubepods-besteffort-pod8eaa3ab2_dafa_41c4_bcd7_ec6c734faf6f.slice. Feb 12 19:40:28.837668 kubelet[2009]: I0212 19:40:28.837606 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f-kube-proxy\") pod \"kube-proxy-sjlr8\" (UID: \"8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f\") " pod="kube-system/kube-proxy-sjlr8" Feb 12 19:40:28.838031 kubelet[2009]: I0212 19:40:28.837987 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f-lib-modules\") pod \"kube-proxy-sjlr8\" (UID: \"8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f\") " pod="kube-system/kube-proxy-sjlr8" Feb 12 19:40:28.838235 kubelet[2009]: I0212 19:40:28.838199 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-75ctg\" (UniqueName: \"kubernetes.io/projected/8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f-kube-api-access-75ctg\") pod \"kube-proxy-sjlr8\" (UID: \"8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f\") " pod="kube-system/kube-proxy-sjlr8" Feb 12 19:40:28.838399 kubelet[2009]: I0212 19:40:28.838386 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f-xtables-lock\") pod \"kube-proxy-sjlr8\" (UID: \"8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f\") " pod="kube-system/kube-proxy-sjlr8" Feb 12 19:40:28.953726 kubelet[2009]: E0212 19:40:28.953683 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:29.088563 kubelet[2009]: I0212 19:40:29.088410 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:29.096441 systemd[1]: Created slice kubepods-besteffort-pod7d8b1108_2ffd_4305_a5be_3ca58dc39f18.slice. Feb 12 19:40:29.132889 kubelet[2009]: E0212 19:40:29.132835 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:29.134984 env[1109]: time="2024-02-12T19:40:29.134396126Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sjlr8,Uid:8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:29.141119 kubelet[2009]: I0212 19:40:29.140741 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7d8b1108-2ffd-4305-a5be-3ca58dc39f18-var-lib-calico\") pod \"tigera-operator-7ff8dc855-lp787\" (UID: \"7d8b1108-2ffd-4305-a5be-3ca58dc39f18\") " pod="tigera-operator/tigera-operator-7ff8dc855-lp787" Feb 12 19:40:29.141119 kubelet[2009]: I0212 19:40:29.140864 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-j4qvw\" (UniqueName: \"kubernetes.io/projected/7d8b1108-2ffd-4305-a5be-3ca58dc39f18-kube-api-access-j4qvw\") pod \"tigera-operator-7ff8dc855-lp787\" (UID: \"7d8b1108-2ffd-4305-a5be-3ca58dc39f18\") " pod="tigera-operator/tigera-operator-7ff8dc855-lp787" Feb 12 19:40:29.167512 env[1109]: time="2024-02-12T19:40:29.167412736Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:29.168132 env[1109]: time="2024-02-12T19:40:29.168086378Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:29.168334 env[1109]: time="2024-02-12T19:40:29.168296626Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:29.168808 env[1109]: time="2024-02-12T19:40:29.168717526Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd pid=2108 runtime=io.containerd.runc.v2 Feb 12 19:40:29.205383 systemd[1]: Started cri-containerd-55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd.scope. Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.222000 audit: BPF prog-id=112 op=LOAD Feb 12 19:40:29.223000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.223000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623134363965656138306265623435306534386165306165653366 Feb 12 19:40:29.223000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.223000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623134363965656138306265623435306534386165306165653366 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.224000 audit: BPF prog-id=113 op=LOAD Feb 12 19:40:29.224000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000220f00 items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623134363965656138306265623435306534386165306165653366 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.225000 audit: BPF prog-id=114 op=LOAD Feb 12 19:40:29.225000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000220f48 items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623134363965656138306265623435306534386165306165653366 Feb 12 19:40:29.227000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:40:29.227000 audit: BPF prog-id=113 op=UNLOAD Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { perfmon } for pid=2118 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit[2118]: AVC avc: denied { bpf } for pid=2118 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.227000 audit: BPF prog-id=115 op=LOAD Feb 12 19:40:29.227000 audit[2118]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221358 items=0 ppid=2108 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535623134363965656138306265623435306534386165306165653366 Feb 12 19:40:29.263698 env[1109]: time="2024-02-12T19:40:29.263627391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-sjlr8,Uid:8eaa3ab2-dafa-41c4-bcd7-ec6c734faf6f,Namespace:kube-system,Attempt:0,} returns sandbox id \"55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd\"" Feb 12 19:40:29.268175 kubelet[2009]: E0212 19:40:29.268004 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:29.273904 env[1109]: time="2024-02-12T19:40:29.273827492Z" level=info msg="CreateContainer within sandbox \"55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:40:29.300370 sshd[2098]: Received disconnect from 104.248.54.24 port 47916:11: Bye Bye [preauth] Feb 12 19:40:29.300370 sshd[2098]: Disconnected from authenticating user root 104.248.54.24 port 47916 [preauth] Feb 12 19:40:29.302676 systemd[1]: sshd@11-164.90.149.146:22-104.248.54.24:47916.service: Deactivated successfully. Feb 12 19:40:29.301000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-164.90.149.146:22-104.248.54.24:47916 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:29.322624 kubelet[2009]: E0212 19:40:29.322579 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:29.339389 env[1109]: time="2024-02-12T19:40:29.339208995Z" level=info msg="CreateContainer within sandbox \"55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d7d0828f57d141e8e7c4fdbeab5edef303249280af5bf6e0e0ac64302db5c4ed\"" Feb 12 19:40:29.341287 env[1109]: time="2024-02-12T19:40:29.341229707Z" level=info msg="StartContainer for \"d7d0828f57d141e8e7c4fdbeab5edef303249280af5bf6e0e0ac64302db5c4ed\"" Feb 12 19:40:29.369155 systemd[1]: Started cri-containerd-d7d0828f57d141e8e7c4fdbeab5edef303249280af5bf6e0e0ac64302db5c4ed.scope. Feb 12 19:40:29.395000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.395000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2108 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643038323866353764313431653865376334666462656162356564 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit: BPF prog-id=116 op=LOAD Feb 12 19:40:29.396000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00009a330 items=0 ppid=2108 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643038323866353764313431653865376334666462656162356564 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit: BPF prog-id=117 op=LOAD Feb 12 19:40:29.396000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00009a378 items=0 ppid=2108 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643038323866353764313431653865376334666462656162356564 Feb 12 19:40:29.396000 audit: BPF prog-id=117 op=UNLOAD Feb 12 19:40:29.396000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { perfmon } for pid=2155 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit[2155]: AVC avc: denied { bpf } for pid=2155 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.396000 audit: BPF prog-id=118 op=LOAD Feb 12 19:40:29.396000 audit[2155]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00009a408 items=0 ppid=2108 pid=2155 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.396000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6437643038323866353764313431653865376334666462656162356564 Feb 12 19:40:29.403216 env[1109]: time="2024-02-12T19:40:29.403163975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-lp787,Uid:7d8b1108-2ffd-4305-a5be-3ca58dc39f18,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:40:29.436731 env[1109]: time="2024-02-12T19:40:29.436642022Z" level=info msg="StartContainer for \"d7d0828f57d141e8e7c4fdbeab5edef303249280af5bf6e0e0ac64302db5c4ed\" returns successfully" Feb 12 19:40:29.450411 env[1109]: time="2024-02-12T19:40:29.450096973Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:29.450411 env[1109]: time="2024-02-12T19:40:29.450160735Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:29.450411 env[1109]: time="2024-02-12T19:40:29.450179407Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:29.450752 env[1109]: time="2024-02-12T19:40:29.450511922Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/61aba0113d0b008135737e8ec86231840eba0b8710eead77ae644b48b93b26e8 pid=2188 runtime=io.containerd.runc.v2 Feb 12 19:40:29.469559 systemd[1]: Started cri-containerd-61aba0113d0b008135737e8ec86231840eba0b8710eead77ae644b48b93b26e8.scope. Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.494000 audit: BPF prog-id=119 op=LOAD Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616261303131336430623030383133353733376538656338363233 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616261303131336430623030383133353733376538656338363233 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit: BPF prog-id=120 op=LOAD Feb 12 19:40:29.495000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0000a07e0 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616261303131336430623030383133353733376538656338363233 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.495000 audit: BPF prog-id=121 op=LOAD Feb 12 19:40:29.495000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c0000a0828 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616261303131336430623030383133353733376538656338363233 Feb 12 19:40:29.495000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:40:29.495000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { perfmon } for pid=2199 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit[2199]: AVC avc: denied { bpf } for pid=2199 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:29.496000 audit: BPF prog-id=122 op=LOAD Feb 12 19:40:29.496000 audit[2199]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0000a0c38 items=0 ppid=2188 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3631616261303131336430623030383133353733376538656338363233 Feb 12 19:40:29.547275 env[1109]: time="2024-02-12T19:40:29.547182717Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-lp787,Uid:7d8b1108-2ffd-4305-a5be-3ca58dc39f18,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"61aba0113d0b008135737e8ec86231840eba0b8710eead77ae644b48b93b26e8\"" Feb 12 19:40:29.553831 env[1109]: time="2024-02-12T19:40:29.553761814Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:40:29.786000 audit[2248]: NETFILTER_CFG table=mangle:38 family=2 entries=1 op=nft_register_chain pid=2248 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.786000 audit[2248]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffea44c4c10 a2=0 a3=7ffea44c4bfc items=0 ppid=2166 pid=2248 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.786000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:29.789000 audit[2249]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2249 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.789000 audit[2249]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd8a26e3f0 a2=0 a3=7ffd8a26e3dc items=0 ppid=2166 pid=2249 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.789000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:29.791000 audit[2250]: NETFILTER_CFG table=mangle:40 family=10 entries=1 op=nft_register_chain pid=2250 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:29.791000 audit[2250]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc4c7994c0 a2=0 a3=7ffc4c7994ac items=0 ppid=2166 pid=2250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.791000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:40:29.791000 audit[2251]: NETFILTER_CFG table=filter:41 family=2 entries=1 op=nft_register_chain pid=2251 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.791000 audit[2251]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd9341d630 a2=0 a3=7ffd9341d61c items=0 ppid=2166 pid=2251 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.791000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:29.794000 audit[2252]: NETFILTER_CFG table=nat:42 family=10 entries=1 op=nft_register_chain pid=2252 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:29.794000 audit[2252]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffda7285df0 a2=0 a3=7ffda7285ddc items=0 ppid=2166 pid=2252 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.794000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:40:29.800000 audit[2253]: NETFILTER_CFG table=filter:43 family=10 entries=1 op=nft_register_chain pid=2253 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:29.800000 audit[2253]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe22e50cd0 a2=0 a3=7ffe22e50cbc items=0 ppid=2166 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.800000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:40:29.895000 audit[2254]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.897576 kernel: kauditd_printk_skb: 181 callbacks suppressed Feb 12 19:40:29.897702 kernel: audit: type=1325 audit(1707766829.895:1037): table=filter:44 family=2 entries=1 op=nft_register_chain pid=2254 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.895000 audit[2254]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeb1a2ca90 a2=0 a3=7ffeb1a2ca7c items=0 ppid=2166 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.907112 kernel: audit: type=1300 audit(1707766829.895:1037): arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffeb1a2ca90 a2=0 a3=7ffeb1a2ca7c items=0 ppid=2166 pid=2254 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.907286 kernel: audit: type=1327 audit(1707766829.895:1037): proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:29.895000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:29.911000 audit[2256]: NETFILTER_CFG table=filter:45 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.911000 audit[2256]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe28ab7570 a2=0 a3=7ffe28ab755c items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.923660 kernel: audit: type=1325 audit(1707766829.911:1038): table=filter:45 family=2 entries=1 op=nft_register_rule pid=2256 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.923815 kernel: audit: type=1300 audit(1707766829.911:1038): arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe28ab7570 a2=0 a3=7ffe28ab755c items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.923872 kernel: audit: type=1327 audit(1707766829.911:1038): proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:40:29.911000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:40:29.916000 audit[2259]: NETFILTER_CFG table=filter:46 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.933734 kernel: audit: type=1325 audit(1707766829.916:1039): table=filter:46 family=2 entries=1 op=nft_register_rule pid=2259 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.933894 kernel: audit: type=1300 audit(1707766829.916:1039): arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff82afd0f0 a2=0 a3=7fff82afd0dc items=0 ppid=2166 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.916000 audit[2259]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7fff82afd0f0 a2=0 a3=7fff82afd0dc items=0 ppid=2166 pid=2259 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:40:29.946968 kernel: audit: type=1327 audit(1707766829.916:1039): proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:40:29.947214 kernel: audit: type=1325 audit(1707766829.916:1040): table=filter:47 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.916000 audit[2260]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2260 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.916000 audit[2260]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdbabc3e80 a2=0 a3=7ffdbabc3e6c items=0 ppid=2166 pid=2260 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.916000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:29.923000 audit[2262]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2262 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.923000 audit[2262]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc92de6110 a2=0 a3=7ffc92de60fc items=0 ppid=2166 pid=2262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:29.923000 audit[2263]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_chain pid=2263 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.923000 audit[2263]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff3f8f0890 a2=0 a3=7fff3f8f087c items=0 ppid=2166 pid=2263 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.923000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:29.929000 audit[2265]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2265 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.929000 audit[2265]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fff016bbd10 a2=0 a3=7fff016bbcfc items=0 ppid=2166 pid=2265 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.929000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:29.940000 audit[2268]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2268 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.940000 audit[2268]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd6a2a9930 a2=0 a3=7ffd6a2a991c items=0 ppid=2166 pid=2268 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:40:29.940000 audit[2269]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2269 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.940000 audit[2269]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe44c6c670 a2=0 a3=7ffe44c6c65c items=0 ppid=2166 pid=2269 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.940000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:29.945000 audit[2271]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2271 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.945000 audit[2271]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc037bdad0 a2=0 a3=7ffc037bdabc items=0 ppid=2166 pid=2271 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:29.945000 audit[2272]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_chain pid=2272 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.945000 audit[2272]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc215defd0 a2=0 a3=7ffc215defbc items=0 ppid=2166 pid=2272 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.945000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:29.953000 audit[2274]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2274 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.953000 audit[2274]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fffc295be90 a2=0 a3=7fffc295be7c items=0 ppid=2166 pid=2274 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.953000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:29.960000 audit[2277]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2277 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.960000 audit[2277]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffee4393620 a2=0 a3=7ffee439360c items=0 ppid=2166 pid=2277 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.960000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:29.967000 audit[2280]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2280 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.967000 audit[2280]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4b04a5d0 a2=0 a3=7ffe4b04a5bc items=0 ppid=2166 pid=2280 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.967000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:29.969000 audit[2281]: NETFILTER_CFG table=nat:58 family=2 entries=1 op=nft_register_chain pid=2281 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.969000 audit[2281]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffde4c507b0 a2=0 a3=7ffde4c5079c items=0 ppid=2166 pid=2281 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.969000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:29.974000 audit[2283]: NETFILTER_CFG table=nat:59 family=2 entries=1 op=nft_register_rule pid=2283 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.974000 audit[2283]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffe01013d20 a2=0 a3=7ffe01013d0c items=0 ppid=2166 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.974000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:29.980000 audit[2286]: NETFILTER_CFG table=nat:60 family=2 entries=1 op=nft_register_rule pid=2286 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:29.980000 audit[2286]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff6cd6c660 a2=0 a3=7fff6cd6c64c items=0 ppid=2166 pid=2286 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:29.980000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:29.991866 systemd[1]: run-containerd-runc-k8s.io-55b1469eea80beb450e48ae0aee3f46338aac3aca19a2131e08dcddd95ca39fd-runc.HFyuu0.mount: Deactivated successfully. Feb 12 19:40:30.001000 audit[2291]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2291 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:30.001000 audit[2291]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdd99cd2a0 a2=0 a3=7ffdd99cd28c items=0 ppid=2166 pid=2291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.001000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:30.007000 audit[2293]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2293 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:40:30.007000 audit[2293]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffcce0c1380 a2=0 a3=7ffcce0c136c items=0 ppid=2166 pid=2293 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.007000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:30.040000 audit[2295]: NETFILTER_CFG table=filter:63 family=2 entries=8 op=nft_register_rule pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:30.040000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffdb16eb520 a2=0 a3=7ffdb16eb50c items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.040000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:30.054000 audit[2295]: NETFILTER_CFG table=nat:64 family=2 entries=14 op=nft_register_chain pid=2295 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:30.054000 audit[2295]: SYSCALL arch=c000003e syscall=46 success=yes exit=5340 a0=3 a1=7ffdb16eb520 a2=0 a3=7ffdb16eb50c items=0 ppid=2166 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:30.057000 audit[2301]: NETFILTER_CFG table=filter:65 family=10 entries=1 op=nft_register_chain pid=2301 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.057000 audit[2301]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe443ce290 a2=0 a3=7ffe443ce27c items=0 ppid=2166 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.057000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:40:30.063000 audit[2303]: NETFILTER_CFG table=filter:66 family=10 entries=2 op=nft_register_chain pid=2303 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.063000 audit[2303]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff053b5120 a2=0 a3=7fff053b510c items=0 ppid=2166 pid=2303 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.063000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:40:30.071000 audit[2306]: NETFILTER_CFG table=filter:67 family=10 entries=2 op=nft_register_chain pid=2306 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.071000 audit[2306]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc75a8b880 a2=0 a3=7ffc75a8b86c items=0 ppid=2166 pid=2306 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.071000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:40:30.074000 audit[2307]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2307 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.074000 audit[2307]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe0fc45220 a2=0 a3=7ffe0fc4520c items=0 ppid=2166 pid=2307 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.074000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:40:30.079000 audit[2309]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_rule pid=2309 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.079000 audit[2309]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc39764d20 a2=0 a3=7ffc39764d0c items=0 ppid=2166 pid=2309 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.079000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:40:30.081000 audit[2310]: NETFILTER_CFG table=filter:70 family=10 entries=1 op=nft_register_chain pid=2310 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.081000 audit[2310]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd660de4e0 a2=0 a3=7ffd660de4cc items=0 ppid=2166 pid=2310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.081000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:40:30.086000 audit[2312]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_rule pid=2312 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.086000 audit[2312]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffeef5bd210 a2=0 a3=7ffeef5bd1fc items=0 ppid=2166 pid=2312 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.086000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:40:30.096000 audit[2315]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2315 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.096000 audit[2315]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffde7bba070 a2=0 a3=7ffde7bba05c items=0 ppid=2166 pid=2315 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.096000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:40:30.099000 audit[2316]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2316 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.099000 audit[2316]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd1ac514d0 a2=0 a3=7ffd1ac514bc items=0 ppid=2166 pid=2316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.099000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:40:30.103000 audit[2318]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2318 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.103000 audit[2318]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd0068e3e0 a2=0 a3=7ffd0068e3cc items=0 ppid=2166 pid=2318 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.103000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:40:30.108000 audit[2319]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_chain pid=2319 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.108000 audit[2319]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffea1fab10 a2=0 a3=7fffea1faafc items=0 ppid=2166 pid=2319 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.108000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:40:30.113000 audit[2321]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_rule pid=2321 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.113000 audit[2321]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff512e2ff0 a2=0 a3=7fff512e2fdc items=0 ppid=2166 pid=2321 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.113000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:40:30.123000 audit[2324]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2324 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.123000 audit[2324]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc5fdd77d0 a2=0 a3=7ffc5fdd77bc items=0 ppid=2166 pid=2324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.123000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:40:30.133000 audit[2327]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2327 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.133000 audit[2327]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdfd645050 a2=0 a3=7ffdfd64503c items=0 ppid=2166 pid=2327 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.133000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:40:30.136000 audit[2328]: NETFILTER_CFG table=nat:79 family=10 entries=1 op=nft_register_chain pid=2328 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.136000 audit[2328]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff6f79b220 a2=0 a3=7fff6f79b20c items=0 ppid=2166 pid=2328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.136000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:40:30.141000 audit[2330]: NETFILTER_CFG table=nat:80 family=10 entries=2 op=nft_register_chain pid=2330 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.141000 audit[2330]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff52ffffa0 a2=0 a3=7fff52ffff8c items=0 ppid=2166 pid=2330 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.141000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:30.149000 audit[2333]: NETFILTER_CFG table=nat:81 family=10 entries=2 op=nft_register_chain pid=2333 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.149000 audit[2333]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffc03c93a10 a2=0 a3=7ffc03c939fc items=0 ppid=2166 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.149000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:40:30.153000 audit[2334]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_chain pid=2334 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.153000 audit[2334]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff4e1a5000 a2=0 a3=7fff4e1a4fec items=0 ppid=2166 pid=2334 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.153000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:40:30.158000 audit[2336]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2336 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.158000 audit[2336]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffd33fb8b0 a2=0 a3=7fffd33fb89c items=0 ppid=2166 pid=2336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.158000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:30.166000 audit[2339]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2339 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.166000 audit[2339]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffa44a46a0 a2=0 a3=7fffa44a468c items=0 ppid=2166 pid=2339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:40:30.169000 audit[2340]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2340 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.169000 audit[2340]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffedbb20160 a2=0 a3=7ffedbb2014c items=0 ppid=2166 pid=2340 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.169000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:40:30.173000 audit[2342]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2342 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:40:30.173000 audit[2342]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe2e76a6a0 a2=0 a3=7ffe2e76a68c items=0 ppid=2166 pid=2342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.173000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:40:30.179000 audit[2344]: NETFILTER_CFG table=filter:87 family=10 entries=3 op=nft_register_rule pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:30.179000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=1916 a0=3 a1=7ffd439d2280 a2=0 a3=7ffd439d226c items=0 ppid=2166 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.179000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:30.181000 audit[2344]: NETFILTER_CFG table=nat:88 family=10 entries=7 op=nft_register_chain pid=2344 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:40:30.181000 audit[2344]: SYSCALL arch=c000003e syscall=46 success=yes exit=1968 a0=3 a1=7ffd439d2280 a2=0 a3=7ffd439d226c items=0 ppid=2166 pid=2344 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:30.181000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:30.328128 kubelet[2009]: E0212 19:40:30.327199 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:31.011495 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3093380401.mount: Deactivated successfully. Feb 12 19:40:31.335168 kubelet[2009]: E0212 19:40:31.334988 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:32.443252 env[1109]: time="2024-02-12T19:40:32.443173890Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:32.446735 env[1109]: time="2024-02-12T19:40:32.446687140Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:32.450283 env[1109]: time="2024-02-12T19:40:32.450226544Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:32.453485 env[1109]: time="2024-02-12T19:40:32.453418811Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:32.456104 env[1109]: time="2024-02-12T19:40:32.456018262Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:7bc79e0d3be4fa8c35133127424f9b1ec775af43145b7dd58637905c76084827\"" Feb 12 19:40:32.460918 env[1109]: time="2024-02-12T19:40:32.460853274Z" level=info msg="CreateContainer within sandbox \"61aba0113d0b008135737e8ec86231840eba0b8710eead77ae644b48b93b26e8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:40:32.477732 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount256166901.mount: Deactivated successfully. Feb 12 19:40:32.486392 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1697331260.mount: Deactivated successfully. Feb 12 19:40:32.493843 env[1109]: time="2024-02-12T19:40:32.493747188Z" level=info msg="CreateContainer within sandbox \"61aba0113d0b008135737e8ec86231840eba0b8710eead77ae644b48b93b26e8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"870a70b02fbd89244062e7ac76448c56da9e9ce9b04a5c92ed7a41ee4593d65f\"" Feb 12 19:40:32.494950 env[1109]: time="2024-02-12T19:40:32.494895350Z" level=info msg="StartContainer for \"870a70b02fbd89244062e7ac76448c56da9e9ce9b04a5c92ed7a41ee4593d65f\"" Feb 12 19:40:32.522168 systemd[1]: Started cri-containerd-870a70b02fbd89244062e7ac76448c56da9e9ce9b04a5c92ed7a41ee4593d65f.scope. Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.575000 audit: BPF prog-id=123 op=LOAD Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2188 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:32.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306137306230326662643839323434303632653761633736343438 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2188 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:32.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306137306230326662643839323434303632653761633736343438 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit: BPF prog-id=124 op=LOAD Feb 12 19:40:32.578000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003be120 items=0 ppid=2188 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:32.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306137306230326662643839323434303632653761633736343438 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.578000 audit: BPF prog-id=125 op=LOAD Feb 12 19:40:32.578000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003be168 items=0 ppid=2188 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:32.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306137306230326662643839323434303632653761633736343438 Feb 12 19:40:32.580000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:40:32.580000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { perfmon } for pid=2353 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit[2353]: AVC avc: denied { bpf } for pid=2353 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:32.580000 audit: BPF prog-id=126 op=LOAD Feb 12 19:40:32.580000 audit[2353]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003be578 items=0 ppid=2188 pid=2353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:32.580000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837306137306230326662643839323434303632653761633736343438 Feb 12 19:40:32.607451 env[1109]: time="2024-02-12T19:40:32.607279085Z" level=info msg="StartContainer for \"870a70b02fbd89244062e7ac76448c56da9e9ce9b04a5c92ed7a41ee4593d65f\" returns successfully" Feb 12 19:40:33.355197 kubelet[2009]: I0212 19:40:33.355128 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-sjlr8" podStartSLOduration=5.35504529 podCreationTimestamp="2024-02-12 19:40:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:40:30.346453268 +0000 UTC m=+13.331269021" watchObservedRunningTime="2024-02-12 19:40:33.35504529 +0000 UTC m=+16.339861047" Feb 12 19:40:34.758000 audit[2387]: NETFILTER_CFG table=filter:89 family=2 entries=15 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:34.758000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7ffea05f2a10 a2=0 a3=7ffea05f29fc items=0 ppid=2166 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:34.758000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:34.760000 audit[2387]: NETFILTER_CFG table=nat:90 family=2 entries=12 op=nft_register_rule pid=2387 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:34.760000 audit[2387]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7ffea05f2a10 a2=0 a3=31030 items=0 ppid=2166 pid=2387 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:34.760000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:34.771000 audit[2389]: NETFILTER_CFG table=filter:91 family=2 entries=16 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:34.771000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff6a37f4c0 a2=0 a3=7fff6a37f4ac items=0 ppid=2166 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:34.771000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:34.772000 audit[2389]: NETFILTER_CFG table=nat:92 family=2 entries=12 op=nft_register_rule pid=2389 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:34.772000 audit[2389]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff6a37f4c0 a2=0 a3=31030 items=0 ppid=2166 pid=2389 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:34.772000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:34.909083 kubelet[2009]: I0212 19:40:34.909021 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-lp787" podStartSLOduration=3.002187217 podCreationTimestamp="2024-02-12 19:40:29 +0000 UTC" firstStartedPulling="2024-02-12 19:40:29.549944029 +0000 UTC m=+12.534759758" lastFinishedPulling="2024-02-12 19:40:32.456732614 +0000 UTC m=+15.441548350" observedRunningTime="2024-02-12 19:40:33.357556314 +0000 UTC m=+16.342372090" watchObservedRunningTime="2024-02-12 19:40:34.908975809 +0000 UTC m=+17.893791563" Feb 12 19:40:34.909950 kubelet[2009]: I0212 19:40:34.909915 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:34.918339 systemd[1]: Created slice kubepods-besteffort-pod7dfb1dfa_4fce_43d0_bc9a_429e21f72f58.slice. Feb 12 19:40:34.984148 kubelet[2009]: I0212 19:40:34.984107 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/7dfb1dfa-4fce-43d0-bc9a-429e21f72f58-tigera-ca-bundle\") pod \"calico-typha-7d8b9b7485-lczrk\" (UID: \"7dfb1dfa-4fce-43d0-bc9a-429e21f72f58\") " pod="calico-system/calico-typha-7d8b9b7485-lczrk" Feb 12 19:40:34.984451 kubelet[2009]: I0212 19:40:34.984434 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v8qml\" (UniqueName: \"kubernetes.io/projected/7dfb1dfa-4fce-43d0-bc9a-429e21f72f58-kube-api-access-v8qml\") pod \"calico-typha-7d8b9b7485-lczrk\" (UID: \"7dfb1dfa-4fce-43d0-bc9a-429e21f72f58\") " pod="calico-system/calico-typha-7d8b9b7485-lczrk" Feb 12 19:40:34.984641 kubelet[2009]: I0212 19:40:34.984627 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/7dfb1dfa-4fce-43d0-bc9a-429e21f72f58-typha-certs\") pod \"calico-typha-7d8b9b7485-lczrk\" (UID: \"7dfb1dfa-4fce-43d0-bc9a-429e21f72f58\") " pod="calico-system/calico-typha-7d8b9b7485-lczrk" Feb 12 19:40:35.050031 kubelet[2009]: I0212 19:40:35.049849 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:35.060699 systemd[1]: Created slice kubepods-besteffort-podc49e8511_231f_4ad2_a0c5_1e9834aca337.slice. Feb 12 19:40:35.087664 kubelet[2009]: I0212 19:40:35.087604 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-policysync\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087664 kubelet[2009]: I0212 19:40:35.087677 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-cni-log-dir\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087945 kubelet[2009]: I0212 19:40:35.087700 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/c49e8511-231f-4ad2-a0c5-1e9834aca337-node-certs\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087945 kubelet[2009]: I0212 19:40:35.087751 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-cni-bin-dir\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087945 kubelet[2009]: I0212 19:40:35.087784 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-var-lib-calico\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087945 kubelet[2009]: I0212 19:40:35.087820 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-lib-modules\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.087945 kubelet[2009]: I0212 19:40:35.087841 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-xtables-lock\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.088328 kubelet[2009]: I0212 19:40:35.087868 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-flexvol-driver-host\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.088328 kubelet[2009]: I0212 19:40:35.087906 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/c49e8511-231f-4ad2-a0c5-1e9834aca337-tigera-ca-bundle\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.088328 kubelet[2009]: I0212 19:40:35.087936 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-var-run-calico\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.088328 kubelet[2009]: I0212 19:40:35.087989 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/c49e8511-231f-4ad2-a0c5-1e9834aca337-cni-net-dir\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.088328 kubelet[2009]: I0212 19:40:35.088067 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kgglw\" (UniqueName: \"kubernetes.io/projected/c49e8511-231f-4ad2-a0c5-1e9834aca337-kube-api-access-kgglw\") pod \"calico-node-pmwvt\" (UID: \"c49e8511-231f-4ad2-a0c5-1e9834aca337\") " pod="calico-system/calico-node-pmwvt" Feb 12 19:40:35.190632 kubelet[2009]: E0212 19:40:35.190579 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.190632 kubelet[2009]: W0212 19:40:35.190617 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.190859 kubelet[2009]: E0212 19:40:35.190667 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.191079 kubelet[2009]: E0212 19:40:35.191040 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.191079 kubelet[2009]: W0212 19:40:35.191076 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.191173 kubelet[2009]: E0212 19:40:35.191098 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.191387 kubelet[2009]: E0212 19:40:35.191372 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.191387 kubelet[2009]: W0212 19:40:35.191385 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.191478 kubelet[2009]: E0212 19:40:35.191471 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.191673 kubelet[2009]: E0212 19:40:35.191654 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.191673 kubelet[2009]: W0212 19:40:35.191671 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.191784 kubelet[2009]: E0212 19:40:35.191774 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.192113 kubelet[2009]: E0212 19:40:35.192089 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.192113 kubelet[2009]: W0212 19:40:35.192109 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.192270 kubelet[2009]: E0212 19:40:35.192228 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.193369 kubelet[2009]: E0212 19:40:35.193340 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.193556 kubelet[2009]: W0212 19:40:35.193534 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.193722 kubelet[2009]: E0212 19:40:35.193693 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.197397 kubelet[2009]: E0212 19:40:35.197352 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.197397 kubelet[2009]: W0212 19:40:35.197382 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.197694 kubelet[2009]: E0212 19:40:35.197518 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.198028 kubelet[2009]: E0212 19:40:35.197999 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.198028 kubelet[2009]: W0212 19:40:35.198021 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.198227 kubelet[2009]: E0212 19:40:35.198083 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.198479 kubelet[2009]: E0212 19:40:35.198457 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.198479 kubelet[2009]: W0212 19:40:35.198475 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.198626 kubelet[2009]: E0212 19:40:35.198566 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.198853 kubelet[2009]: E0212 19:40:35.198833 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.198853 kubelet[2009]: W0212 19:40:35.198849 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.198976 kubelet[2009]: E0212 19:40:35.198940 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.199543 kubelet[2009]: E0212 19:40:35.199518 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.199543 kubelet[2009]: W0212 19:40:35.199534 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.199773 kubelet[2009]: E0212 19:40:35.199748 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.200076 kubelet[2009]: E0212 19:40:35.200027 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.200076 kubelet[2009]: W0212 19:40:35.200044 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.200218 kubelet[2009]: E0212 19:40:35.200151 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.200552 kubelet[2009]: E0212 19:40:35.200525 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.200552 kubelet[2009]: W0212 19:40:35.200547 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.200686 kubelet[2009]: E0212 19:40:35.200640 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.200919 kubelet[2009]: E0212 19:40:35.200899 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.200919 kubelet[2009]: W0212 19:40:35.200912 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.201043 kubelet[2009]: E0212 19:40:35.200998 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.201349 kubelet[2009]: E0212 19:40:35.201325 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.201349 kubelet[2009]: W0212 19:40:35.201343 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.201498 kubelet[2009]: E0212 19:40:35.201432 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.201736 kubelet[2009]: E0212 19:40:35.201712 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.201736 kubelet[2009]: W0212 19:40:35.201731 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.201853 kubelet[2009]: E0212 19:40:35.201817 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.202242 kubelet[2009]: E0212 19:40:35.202086 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.202242 kubelet[2009]: W0212 19:40:35.202099 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.202242 kubelet[2009]: E0212 19:40:35.202184 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.202765 kubelet[2009]: E0212 19:40:35.202626 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.202765 kubelet[2009]: W0212 19:40:35.202641 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.202765 kubelet[2009]: E0212 19:40:35.202730 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.203376 kubelet[2009]: E0212 19:40:35.203164 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.203376 kubelet[2009]: W0212 19:40:35.203184 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.203376 kubelet[2009]: E0212 19:40:35.203278 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.204011 kubelet[2009]: E0212 19:40:35.203768 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.204011 kubelet[2009]: W0212 19:40:35.203785 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.204011 kubelet[2009]: E0212 19:40:35.203875 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.204416 kubelet[2009]: E0212 19:40:35.204395 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.204416 kubelet[2009]: W0212 19:40:35.204410 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.204548 kubelet[2009]: E0212 19:40:35.204492 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.205907 kubelet[2009]: E0212 19:40:35.204767 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.205907 kubelet[2009]: W0212 19:40:35.204781 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.205907 kubelet[2009]: E0212 19:40:35.204866 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.206451 kubelet[2009]: E0212 19:40:35.206417 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.206451 kubelet[2009]: W0212 19:40:35.206444 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.206653 kubelet[2009]: E0212 19:40:35.206548 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.207538 kubelet[2009]: E0212 19:40:35.207511 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.207685 kubelet[2009]: W0212 19:40:35.207663 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.208120 kubelet[2009]: E0212 19:40:35.208101 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.208253 kubelet[2009]: W0212 19:40:35.208233 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.208376 kubelet[2009]: E0212 19:40:35.208359 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.208504 kubelet[2009]: E0212 19:40:35.208486 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.220270 kubelet[2009]: E0212 19:40:35.220218 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.220270 kubelet[2009]: W0212 19:40:35.220252 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.220270 kubelet[2009]: E0212 19:40:35.220287 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.227518 kubelet[2009]: E0212 19:40:35.227477 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:35.228722 env[1109]: time="2024-02-12T19:40:35.228631820Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d8b9b7485-lczrk,Uid:7dfb1dfa-4fce-43d0-bc9a-429e21f72f58,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:35.236590 kubelet[2009]: I0212 19:40:35.236506 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:35.236902 kubelet[2009]: E0212 19:40:35.236873 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:35.245170 kubelet[2009]: E0212 19:40:35.245041 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.245170 kubelet[2009]: W0212 19:40:35.245144 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.245427 kubelet[2009]: E0212 19:40:35.245178 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.262875 env[1109]: time="2024-02-12T19:40:35.262781172Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:35.263189 env[1109]: time="2024-02-12T19:40:35.263158213Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:35.263298 env[1109]: time="2024-02-12T19:40:35.263268799Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:35.263564 env[1109]: time="2024-02-12T19:40:35.263533348Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a20ad465e7d3c23b9cce4ebe2936d8f81e69d7bc22a96011182b4bc2f9bf60a3 pid=2427 runtime=io.containerd.runc.v2 Feb 12 19:40:35.280768 kubelet[2009]: E0212 19:40:35.280721 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.280768 kubelet[2009]: W0212 19:40:35.280754 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.281349 kubelet[2009]: E0212 19:40:35.280788 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.281349 kubelet[2009]: E0212 19:40:35.281041 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.281349 kubelet[2009]: W0212 19:40:35.281091 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.281349 kubelet[2009]: E0212 19:40:35.281307 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.281617 kubelet[2009]: E0212 19:40:35.281595 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.281617 kubelet[2009]: W0212 19:40:35.281614 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.281708 kubelet[2009]: E0212 19:40:35.281633 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.281966 kubelet[2009]: E0212 19:40:35.281930 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.281966 kubelet[2009]: W0212 19:40:35.281959 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.282138 kubelet[2009]: E0212 19:40:35.281978 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.282228 kubelet[2009]: E0212 19:40:35.282209 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.282228 kubelet[2009]: W0212 19:40:35.282227 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.282314 kubelet[2009]: E0212 19:40:35.282254 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.282486 kubelet[2009]: E0212 19:40:35.282465 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.282486 kubelet[2009]: W0212 19:40:35.282481 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.282558 kubelet[2009]: E0212 19:40:35.282510 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.282792 kubelet[2009]: E0212 19:40:35.282771 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.282839 kubelet[2009]: W0212 19:40:35.282788 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.282839 kubelet[2009]: E0212 19:40:35.282815 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.283014 kubelet[2009]: E0212 19:40:35.282995 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.283014 kubelet[2009]: W0212 19:40:35.283007 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.283146 kubelet[2009]: E0212 19:40:35.283022 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.286979 kubelet[2009]: E0212 19:40:35.286556 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.286979 kubelet[2009]: W0212 19:40:35.286583 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.286979 kubelet[2009]: E0212 19:40:35.286612 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.287274 kubelet[2009]: E0212 19:40:35.287022 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.287274 kubelet[2009]: W0212 19:40:35.287044 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.287274 kubelet[2009]: E0212 19:40:35.287095 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.287416 kubelet[2009]: E0212 19:40:35.287278 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.287416 kubelet[2009]: W0212 19:40:35.287285 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.287416 kubelet[2009]: E0212 19:40:35.287295 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.287559 kubelet[2009]: E0212 19:40:35.287458 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.287559 kubelet[2009]: W0212 19:40:35.287465 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.287559 kubelet[2009]: E0212 19:40:35.287478 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.287809 kubelet[2009]: E0212 19:40:35.287799 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.287856 kubelet[2009]: W0212 19:40:35.287812 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.287856 kubelet[2009]: E0212 19:40:35.287831 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.288099 kubelet[2009]: E0212 19:40:35.288070 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.288099 kubelet[2009]: W0212 19:40:35.288088 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.288099 kubelet[2009]: E0212 19:40:35.288100 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.288287 kubelet[2009]: E0212 19:40:35.288260 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.288287 kubelet[2009]: W0212 19:40:35.288267 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.288287 kubelet[2009]: E0212 19:40:35.288276 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.292762 kubelet[2009]: E0212 19:40:35.292706 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.292762 kubelet[2009]: W0212 19:40:35.292745 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.292762 kubelet[2009]: E0212 19:40:35.292783 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.293143 kubelet[2009]: I0212 19:40:35.292850 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-74d4z\" (UniqueName: \"kubernetes.io/projected/508a2b03-867c-4864-94af-91620ebe7ae2-kube-api-access-74d4z\") pod \"csi-node-driver-xmcqd\" (UID: \"508a2b03-867c-4864-94af-91620ebe7ae2\") " pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:35.294853 kubelet[2009]: E0212 19:40:35.294811 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.294853 kubelet[2009]: W0212 19:40:35.294842 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.294853 kubelet[2009]: E0212 19:40:35.294881 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.295166 kubelet[2009]: I0212 19:40:35.294931 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/508a2b03-867c-4864-94af-91620ebe7ae2-kubelet-dir\") pod \"csi-node-driver-xmcqd\" (UID: \"508a2b03-867c-4864-94af-91620ebe7ae2\") " pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:35.296439 kubelet[2009]: E0212 19:40:35.296402 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.296439 kubelet[2009]: W0212 19:40:35.296433 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.296611 kubelet[2009]: E0212 19:40:35.296465 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.296723 kubelet[2009]: E0212 19:40:35.296704 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.296723 kubelet[2009]: W0212 19:40:35.296722 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.296828 kubelet[2009]: E0212 19:40:35.296749 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.297141 kubelet[2009]: E0212 19:40:35.296947 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.297141 kubelet[2009]: W0212 19:40:35.296960 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.297141 kubelet[2009]: E0212 19:40:35.296970 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.297141 kubelet[2009]: I0212 19:40:35.297005 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/508a2b03-867c-4864-94af-91620ebe7ae2-socket-dir\") pod \"csi-node-driver-xmcqd\" (UID: \"508a2b03-867c-4864-94af-91620ebe7ae2\") " pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:35.297700 kubelet[2009]: E0212 19:40:35.297515 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.297700 kubelet[2009]: W0212 19:40:35.297538 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.297700 kubelet[2009]: E0212 19:40:35.297570 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.305045 kubelet[2009]: E0212 19:40:35.304618 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.305045 kubelet[2009]: W0212 19:40:35.304657 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.305045 kubelet[2009]: E0212 19:40:35.304694 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.310871 kubelet[2009]: E0212 19:40:35.310602 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.310871 kubelet[2009]: W0212 19:40:35.310639 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.310871 kubelet[2009]: E0212 19:40:35.310703 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.312889 kubelet[2009]: E0212 19:40:35.312607 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.312889 kubelet[2009]: W0212 19:40:35.312645 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.312889 kubelet[2009]: E0212 19:40:35.312677 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.320592 kubelet[2009]: E0212 19:40:35.320555 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.321913 kubelet[2009]: W0212 19:40:35.320964 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.321913 kubelet[2009]: E0212 19:40:35.321005 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.321913 kubelet[2009]: I0212 19:40:35.321160 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/508a2b03-867c-4864-94af-91620ebe7ae2-varrun\") pod \"csi-node-driver-xmcqd\" (UID: \"508a2b03-867c-4864-94af-91620ebe7ae2\") " pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:35.324561 kubelet[2009]: E0212 19:40:35.322866 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.324561 kubelet[2009]: W0212 19:40:35.322891 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.324561 kubelet[2009]: E0212 19:40:35.322955 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.324561 kubelet[2009]: I0212 19:40:35.323205 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/508a2b03-867c-4864-94af-91620ebe7ae2-registration-dir\") pod \"csi-node-driver-xmcqd\" (UID: \"508a2b03-867c-4864-94af-91620ebe7ae2\") " pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:35.325711 systemd[1]: Started cri-containerd-a20ad465e7d3c23b9cce4ebe2936d8f81e69d7bc22a96011182b4bc2f9bf60a3.scope. Feb 12 19:40:35.328568 kubelet[2009]: E0212 19:40:35.328535 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.328916 kubelet[2009]: W0212 19:40:35.328884 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.329384 kubelet[2009]: E0212 19:40:35.329364 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.330833 kubelet[2009]: E0212 19:40:35.330806 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.331436 kubelet[2009]: W0212 19:40:35.331011 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.331436 kubelet[2009]: E0212 19:40:35.331046 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.333503 kubelet[2009]: E0212 19:40:35.331921 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.333503 kubelet[2009]: W0212 19:40:35.331947 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.333503 kubelet[2009]: E0212 19:40:35.332424 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.334499 kubelet[2009]: E0212 19:40:35.334481 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.335099 kubelet[2009]: W0212 19:40:35.334783 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.335099 kubelet[2009]: E0212 19:40:35.334817 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.365760 kubelet[2009]: E0212 19:40:35.365700 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:35.367159 env[1109]: time="2024-02-12T19:40:35.367087215Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pmwvt,Uid:c49e8511-231f-4ad2-a0c5-1e9834aca337,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:35.388826 env[1109]: time="2024-02-12T19:40:35.388662170Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:40:35.391283 env[1109]: time="2024-02-12T19:40:35.388795101Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:40:35.391503 env[1109]: time="2024-02-12T19:40:35.391319802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:40:35.391785 env[1109]: time="2024-02-12T19:40:35.391683655Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46 pid=2487 runtime=io.containerd.runc.v2 Feb 12 19:40:35.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.430824 kernel: kauditd_printk_skb: 194 callbacks suppressed Feb 12 19:40:35.430971 kernel: audit: type=1400 audit(1707766835.427:1104): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.438645 kernel: audit: type=1400 audit(1707766835.428:1105): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.439173 kubelet[2009]: E0212 19:40:35.438918 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.439173 kubelet[2009]: W0212 19:40:35.438947 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.439173 kubelet[2009]: E0212 19:40:35.438977 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.439719 kubelet[2009]: E0212 19:40:35.439508 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.439719 kubelet[2009]: W0212 19:40:35.439529 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.439719 kubelet[2009]: E0212 19:40:35.439566 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.440303 kubelet[2009]: E0212 19:40:35.440092 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.440303 kubelet[2009]: W0212 19:40:35.440110 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.440303 kubelet[2009]: E0212 19:40:35.440138 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.447104 kernel: audit: type=1400 audit(1707766835.428:1106): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.447632 kubelet[2009]: E0212 19:40:35.447412 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.447632 kubelet[2009]: W0212 19:40:35.447447 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.450410 kubelet[2009]: E0212 19:40:35.448369 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.450789 kubelet[2009]: E0212 19:40:35.450585 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.450789 kubelet[2009]: W0212 19:40:35.450606 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.450789 kubelet[2009]: E0212 19:40:35.450753 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.456469 kernel: audit: type=1400 audit(1707766835.428:1107): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.456623 kernel: audit: type=1400 audit(1707766835.428:1108): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.457072 kubelet[2009]: E0212 19:40:35.456835 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.457072 kubelet[2009]: W0212 19:40:35.456863 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.457072 kubelet[2009]: E0212 19:40:35.457019 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.462909 kubelet[2009]: E0212 19:40:35.462682 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.462909 kubelet[2009]: W0212 19:40:35.462706 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.462909 kubelet[2009]: E0212 19:40:35.462864 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.464321 kubelet[2009]: E0212 19:40:35.463698 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.464321 kubelet[2009]: W0212 19:40:35.463716 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.464321 kubelet[2009]: E0212 19:40:35.463868 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.464321 kubelet[2009]: E0212 19:40:35.464004 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.464321 kubelet[2009]: W0212 19:40:35.464015 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.475169 kernel: audit: type=1400 audit(1707766835.428:1109): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.475350 kernel: audit: type=1400 audit(1707766835.428:1110): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.475454 kubelet[2009]: E0212 19:40:35.467678 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.475844 kubelet[2009]: E0212 19:40:35.475649 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.475844 kubelet[2009]: W0212 19:40:35.475675 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.475844 kubelet[2009]: E0212 19:40:35.475723 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.476903 kubelet[2009]: E0212 19:40:35.476120 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.476903 kubelet[2009]: W0212 19:40:35.476136 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.476903 kubelet[2009]: E0212 19:40:35.476735 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.476903 kubelet[2009]: E0212 19:40:35.476798 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.476903 kubelet[2009]: W0212 19:40:35.476804 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.476903 kubelet[2009]: E0212 19:40:35.476846 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.477467 kubelet[2009]: E0212 19:40:35.477359 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.477467 kubelet[2009]: W0212 19:40:35.477372 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.484739 kernel: audit: type=1400 audit(1707766835.428:1111): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.484894 kernel: audit: type=1400 audit(1707766835.428:1112): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.484996 kubelet[2009]: E0212 19:40:35.481001 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.485471 kubelet[2009]: E0212 19:40:35.485236 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.485471 kubelet[2009]: W0212 19:40:35.485268 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.485471 kubelet[2009]: E0212 19:40:35.485437 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.492105 kernel: audit: type=1400 audit(1707766835.428:1113): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.493484 kubelet[2009]: E0212 19:40:35.492927 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.493484 kubelet[2009]: W0212 19:40:35.492952 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.493484 kubelet[2009]: E0212 19:40:35.493169 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.494761 systemd[1]: Started cri-containerd-70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46.scope. Feb 12 19:40:35.497521 kubelet[2009]: E0212 19:40:35.497303 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.497521 kubelet[2009]: W0212 19:40:35.497337 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.498002 kubelet[2009]: E0212 19:40:35.497859 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.498002 kubelet[2009]: W0212 19:40:35.497882 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.498370 kubelet[2009]: E0212 19:40:35.498275 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.498370 kubelet[2009]: W0212 19:40:35.498287 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.428000 audit: BPF prog-id=127 op=LOAD Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2427 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306164343635653764336332336239636365346562653239333664 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2427 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306164343635653764336332336239636365346562653239333664 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.433000 audit: BPF prog-id=128 op=LOAD Feb 12 19:40:35.433000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00009cc30 items=0 ppid=2427 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.433000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306164343635653764336332336239636365346562653239333664 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.462000 audit: BPF prog-id=129 op=LOAD Feb 12 19:40:35.462000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00009cc78 items=0 ppid=2427 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306164343635653764336332336239636365346562653239333664 Feb 12 19:40:35.492000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:40:35.492000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { perfmon } for pid=2439 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit[2439]: AVC avc: denied { bpf } for pid=2439 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.492000 audit: BPF prog-id=130 op=LOAD Feb 12 19:40:35.492000 audit[2439]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00009d088 items=0 ppid=2427 pid=2439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.492000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132306164343635653764336332336239636365346562653239333664 Feb 12 19:40:35.509037 kubelet[2009]: E0212 19:40:35.503544 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.509037 kubelet[2009]: W0212 19:40:35.503579 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.509037 kubelet[2009]: E0212 19:40:35.508544 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.509037 kubelet[2009]: E0212 19:40:35.508923 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.509037 kubelet[2009]: W0212 19:40:35.508944 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.509037 kubelet[2009]: E0212 19:40:35.508973 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.509746 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510486 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.511463 kubelet[2009]: W0212 19:40:35.510505 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510539 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510819 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.511463 kubelet[2009]: W0212 19:40:35.510832 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510872 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510901 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.510986 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.511463 kubelet[2009]: E0212 19:40:35.511135 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.512984 kubelet[2009]: W0212 19:40:35.511148 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.512984 kubelet[2009]: E0212 19:40:35.511174 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.512984 kubelet[2009]: E0212 19:40:35.511773 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.512984 kubelet[2009]: W0212 19:40:35.511790 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.512984 kubelet[2009]: E0212 19:40:35.511820 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.518282 kubelet[2009]: E0212 19:40:35.518231 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.520216 kubelet[2009]: W0212 19:40:35.520088 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.520216 kubelet[2009]: E0212 19:40:35.520152 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.526000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit: BPF prog-id=131 op=LOAD Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2487 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626538656664366362633662386339366233383866623265316263 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2487 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626538656664366362633662386339366233383866623265316263 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit: BPF prog-id=132 op=LOAD Feb 12 19:40:35.527000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001e9bc0 items=0 ppid=2487 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626538656664366362633662386339366233383866623265316263 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.527000 audit: BPF prog-id=133 op=LOAD Feb 12 19:40:35.527000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001e9c08 items=0 ppid=2487 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.527000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626538656664366362633662386339366233383866623265316263 Feb 12 19:40:35.528000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:40:35.528000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { perfmon } for pid=2502 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit[2502]: AVC avc: denied { bpf } for pid=2502 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:35.528000 audit: BPF prog-id=134 op=LOAD Feb 12 19:40:35.528000 audit[2502]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0003c0018 items=0 ppid=2487 pid=2502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.528000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626538656664366362633662386339366233383866623265316263 Feb 12 19:40:35.541535 kubelet[2009]: E0212 19:40:35.541440 2009 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:40:35.541535 kubelet[2009]: W0212 19:40:35.541460 2009 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:40:35.541535 kubelet[2009]: E0212 19:40:35.541486 2009 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:40:35.562433 env[1109]: time="2024-02-12T19:40:35.562282015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-pmwvt,Uid:c49e8511-231f-4ad2-a0c5-1e9834aca337,Namespace:calico-system,Attempt:0,} returns sandbox id \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\"" Feb 12 19:40:35.567383 kubelet[2009]: E0212 19:40:35.566824 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:35.570502 env[1109]: time="2024-02-12T19:40:35.570429209Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:40:35.612355 env[1109]: time="2024-02-12T19:40:35.612297520Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7d8b9b7485-lczrk,Uid:7dfb1dfa-4fce-43d0-bc9a-429e21f72f58,Namespace:calico-system,Attempt:0,} returns sandbox id \"a20ad465e7d3c23b9cce4ebe2936d8f81e69d7bc22a96011182b4bc2f9bf60a3\"" Feb 12 19:40:35.614386 kubelet[2009]: E0212 19:40:35.613622 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:35.788000 audit[2559]: NETFILTER_CFG table=filter:93 family=2 entries=16 op=nft_register_rule pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:35.788000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=5660 a0=3 a1=7fff230e1e10 a2=0 a3=7fff230e1dfc items=0 ppid=2166 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.788000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:35.789000 audit[2559]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2559 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:35.789000 audit[2559]: SYSCALL arch=c000003e syscall=46 success=yes exit=2572 a0=3 a1=7fff230e1e10 a2=0 a3=31030 items=0 ppid=2166 pid=2559 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:37.186768 kubelet[2009]: E0212 19:40:37.186389 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:38.076251 env[1109]: time="2024-02-12T19:40:38.076178928Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:38.081047 env[1109]: time="2024-02-12T19:40:38.080983173Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:38.089013 env[1109]: time="2024-02-12T19:40:38.088918743Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:38.093553 env[1109]: time="2024-02-12T19:40:38.093487582Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:38.095076 env[1109]: time="2024-02-12T19:40:38.094996084Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:6506d2e0be2d5ec9cb8dbe00c4b4f037c67b6ab4ec14a1f0c83333ac51f4da9a\"" Feb 12 19:40:38.096371 env[1109]: time="2024-02-12T19:40:38.096328789Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:40:38.102375 env[1109]: time="2024-02-12T19:40:38.102332033Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:40:38.117537 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2088359082.mount: Deactivated successfully. Feb 12 19:40:38.129767 env[1109]: time="2024-02-12T19:40:38.129687028Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f\"" Feb 12 19:40:38.130897 env[1109]: time="2024-02-12T19:40:38.130847398Z" level=info msg="StartContainer for \"b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f\"" Feb 12 19:40:38.180516 systemd[1]: Started cri-containerd-b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f.scope. Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2487 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:38.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623535333465376462326163303065346431356335396364366464 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit: BPF prog-id=135 op=LOAD Feb 12 19:40:38.222000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0002121f0 items=0 ppid=2487 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:38.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623535333465376462326163303065346431356335396364366464 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.222000 audit: BPF prog-id=136 op=LOAD Feb 12 19:40:38.222000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c000212238 items=0 ppid=2487 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:38.222000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623535333465376462326163303065346431356335396364366464 Feb 12 19:40:38.222000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:40:38.223000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { perfmon } for pid=2568 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit[2568]: AVC avc: denied { bpf } for pid=2568 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:38.223000 audit: BPF prog-id=137 op=LOAD Feb 12 19:40:38.223000 audit[2568]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0002122c8 items=0 ppid=2487 pid=2568 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:38.223000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237623535333465376462326163303065346431356335396364366464 Feb 12 19:40:38.260314 env[1109]: time="2024-02-12T19:40:38.259639705Z" level=info msg="StartContainer for \"b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f\" returns successfully" Feb 12 19:40:38.275484 systemd[1]: cri-containerd-b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f.scope: Deactivated successfully. Feb 12 19:40:38.279000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:40:38.322027 env[1109]: time="2024-02-12T19:40:38.321959452Z" level=info msg="shim disconnected" id=b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f Feb 12 19:40:38.322578 env[1109]: time="2024-02-12T19:40:38.322528936Z" level=warning msg="cleaning up after shim disconnected" id=b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f namespace=k8s.io Feb 12 19:40:38.322736 env[1109]: time="2024-02-12T19:40:38.322710922Z" level=info msg="cleaning up dead shim" Feb 12 19:40:38.332425 env[1109]: time="2024-02-12T19:40:38.332276692Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:40:38Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2605 runtime=io.containerd.runc.v2\n" Feb 12 19:40:38.354840 kubelet[2009]: E0212 19:40:38.354795 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:39.112961 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b7b5534e7db2ac00e4d15c59cd6ddd468a5bc37e68d684ba99d5a77306f10c4f-rootfs.mount: Deactivated successfully. Feb 12 19:40:39.186903 kubelet[2009]: E0212 19:40:39.185126 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:39.613906 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2776352360.mount: Deactivated successfully. Feb 12 19:40:41.185429 kubelet[2009]: E0212 19:40:41.185365 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:41.213172 env[1109]: time="2024-02-12T19:40:41.213090544Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:41.215812 env[1109]: time="2024-02-12T19:40:41.215760919Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:41.218687 env[1109]: time="2024-02-12T19:40:41.218632085Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:41.220846 env[1109]: time="2024-02-12T19:40:41.220789875Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:41.222379 env[1109]: time="2024-02-12T19:40:41.222315727Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:b33768e0da1f8a5788a6a5d8ac2dcf15292ea9f3717de450f946c0a055b3532c\"" Feb 12 19:40:41.224011 env[1109]: time="2024-02-12T19:40:41.223969955Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:40:41.246793 env[1109]: time="2024-02-12T19:40:41.246742379Z" level=info msg="CreateContainer within sandbox \"a20ad465e7d3c23b9cce4ebe2936d8f81e69d7bc22a96011182b4bc2f9bf60a3\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:40:41.340770 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount481618291.mount: Deactivated successfully. Feb 12 19:40:41.349158 env[1109]: time="2024-02-12T19:40:41.347763727Z" level=info msg="CreateContainer within sandbox \"a20ad465e7d3c23b9cce4ebe2936d8f81e69d7bc22a96011182b4bc2f9bf60a3\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7b9e10149ad3837fdd968631d85af019f68334bc5c8e4ccd20a4507957ed80b2\"" Feb 12 19:40:41.350179 env[1109]: time="2024-02-12T19:40:41.350133776Z" level=info msg="StartContainer for \"7b9e10149ad3837fdd968631d85af019f68334bc5c8e4ccd20a4507957ed80b2\"" Feb 12 19:40:41.389687 systemd[1]: Started cri-containerd-7b9e10149ad3837fdd968631d85af019f68334bc5c8e4ccd20a4507957ed80b2.scope. Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.417424 kernel: kauditd_printk_skb: 154 callbacks suppressed Feb 12 19:40:41.417536 kernel: audit: type=1400 audit(1707766841.414:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.424389 kernel: audit: type=1400 audit(1707766841.414:1150): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.424494 kernel: audit: type=1400 audit(1707766841.414:1151): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.433166 kernel: audit: type=1400 audit(1707766841.414:1152): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.443703 kernel: audit: type=1400 audit(1707766841.414:1153): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.443818 kernel: audit: type=1400 audit(1707766841.414:1154): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.443853 kernel: audit: type=1400 audit(1707766841.414:1155): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.449936 kernel: audit: type=1400 audit(1707766841.414:1156): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.458993 kernel: audit: type=1400 audit(1707766841.414:1157): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.459186 kernel: audit: type=1400 audit(1707766841.414:1158): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.414000 audit: BPF prog-id=138 op=LOAD Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2427 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396531303134396164333833376664643936383633316438356166 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2427 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396531303134396164333833376664643936383633316438356166 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.423000 audit: BPF prog-id=139 op=LOAD Feb 12 19:40:41.423000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003aa950 items=0 ppid=2427 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.423000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396531303134396164333833376664643936383633316438356166 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit: BPF prog-id=140 op=LOAD Feb 12 19:40:41.427000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0003aa998 items=0 ppid=2427 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396531303134396164333833376664643936383633316438356166 Feb 12 19:40:41.427000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:40:41.427000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { perfmon } for pid=2635 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit[2635]: AVC avc: denied { bpf } for pid=2635 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:41.427000 audit: BPF prog-id=141 op=LOAD Feb 12 19:40:41.427000 audit[2635]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003aada8 items=0 ppid=2427 pid=2635 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.427000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3762396531303134396164333833376664643936383633316438356166 Feb 12 19:40:41.497087 env[1109]: time="2024-02-12T19:40:41.496972030Z" level=info msg="StartContainer for \"7b9e10149ad3837fdd968631d85af019f68334bc5c8e4ccd20a4507957ed80b2\" returns successfully" Feb 12 19:40:42.380347 kubelet[2009]: E0212 19:40:42.380102 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:42.399136 kubelet[2009]: I0212 19:40:42.397570 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7d8b9b7485-lczrk" podStartSLOduration=2.789436324 podCreationTimestamp="2024-02-12 19:40:34 +0000 UTC" firstStartedPulling="2024-02-12 19:40:35.614767282 +0000 UTC m=+18.599583028" lastFinishedPulling="2024-02-12 19:40:41.222843995 +0000 UTC m=+24.207659738" observedRunningTime="2024-02-12 19:40:42.396209484 +0000 UTC m=+25.381025246" watchObservedRunningTime="2024-02-12 19:40:42.397513034 +0000 UTC m=+25.382328840" Feb 12 19:40:42.813655 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2835911707.mount: Deactivated successfully. Feb 12 19:40:43.184902 kubelet[2009]: E0212 19:40:43.184842 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:43.380681 kubelet[2009]: I0212 19:40:43.380616 2009 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:40:43.384176 kubelet[2009]: E0212 19:40:43.381993 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:44.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.90.149.146:22-165.227.101.226:35616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:44.218905 systemd[1]: Started sshd@12-164.90.149.146:22-165.227.101.226:35616.service. Feb 12 19:40:44.713730 sshd[2666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.101.226 user=root Feb 12 19:40:44.712000 audit[2666]: USER_AUTH pid=2666 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:40:45.186146 kubelet[2009]: E0212 19:40:45.186087 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:46.451454 sshd[2666]: Failed password for root from 165.227.101.226 port 35616 ssh2 Feb 12 19:40:46.740180 sshd[2666]: Received disconnect from 165.227.101.226 port 35616:11: Bye Bye [preauth] Feb 12 19:40:46.740180 sshd[2666]: Disconnected from authenticating user root 165.227.101.226 port 35616 [preauth] Feb 12 19:40:46.747110 kernel: kauditd_printk_skb: 49 callbacks suppressed Feb 12 19:40:46.747323 kernel: audit: type=1131 audit(1707766846.740:1169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.90.149.146:22-165.227.101.226:35616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:46.740000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-164.90.149.146:22-165.227.101.226:35616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:46.741309 systemd[1]: sshd@12-164.90.149.146:22-165.227.101.226:35616.service: Deactivated successfully. Feb 12 19:40:47.185934 kubelet[2009]: E0212 19:40:47.185885 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:47.330311 env[1109]: time="2024-02-12T19:40:47.330249522Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:47.337006 env[1109]: time="2024-02-12T19:40:47.336947900Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:47.340554 env[1109]: time="2024-02-12T19:40:47.340491848Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:47.343313 env[1109]: time="2024-02-12T19:40:47.343105697Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:47.348971 env[1109]: time="2024-02-12T19:40:47.348889768Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:8e8d96a874c0e2f137bc6e0ff4b9da4ac2341852e41d99ab81983d329bb87d93\"" Feb 12 19:40:47.354839 env[1109]: time="2024-02-12T19:40:47.354784433Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:40:47.370740 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4264949707.mount: Deactivated successfully. Feb 12 19:40:47.379703 env[1109]: time="2024-02-12T19:40:47.379637854Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121\"" Feb 12 19:40:47.384012 env[1109]: time="2024-02-12T19:40:47.383960557Z" level=info msg="StartContainer for \"c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121\"" Feb 12 19:40:47.416392 systemd[1]: Started cri-containerd-c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121.scope. Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.481108 kernel: audit: type=1400 audit(1707766847.473:1170): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.481353 kernel: audit: type=1300 audit(1707766847.473:1170): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2487 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.473000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=8 items=0 ppid=2487 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373136343465306431666665373136373464623035313263353531 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.495256 kernel: audit: type=1327 audit(1707766847.473:1170): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373136343465306431666665373136373464623035313263353531 Feb 12 19:40:47.495424 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.499174 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.499336 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.511777 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.511945 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.520217 kernel: audit: type=1400 audit(1707766847.473:1171): avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.473000 audit: BPF prog-id=142 op=LOAD Feb 12 19:40:47.473000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c000308c60 items=0 ppid=2487 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.473000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373136343465306431666665373136373464623035313263353531 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit: BPF prog-id=143 op=LOAD Feb 12 19:40:47.477000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c000308ca8 items=0 ppid=2487 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373136343465306431666665373136373464623035313263353531 Feb 12 19:40:47.477000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:40:47.477000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { perfmon } for pid=2678 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit[2678]: AVC avc: denied { bpf } for pid=2678 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:47.477000 audit: BPF prog-id=144 op=LOAD Feb 12 19:40:47.477000 audit[2678]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c000308d38 items=0 ppid=2487 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.477000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6338373136343465306431666665373136373464623035313263353531 Feb 12 19:40:47.539377 env[1109]: time="2024-02-12T19:40:47.539306709Z" level=info msg="StartContainer for \"c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121\" returns successfully" Feb 12 19:40:48.180066 systemd[1]: cri-containerd-c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121.scope: Deactivated successfully. Feb 12 19:40:48.182000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:40:48.216310 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121-rootfs.mount: Deactivated successfully. Feb 12 19:40:48.223708 env[1109]: time="2024-02-12T19:40:48.223609601Z" level=info msg="shim disconnected" id=c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121 Feb 12 19:40:48.223708 env[1109]: time="2024-02-12T19:40:48.223698429Z" level=warning msg="cleaning up after shim disconnected" id=c871644e0d1ffe71674db0512c551bf7a017b788184a289187a6d061f3285121 namespace=k8s.io Feb 12 19:40:48.223708 env[1109]: time="2024-02-12T19:40:48.223713972Z" level=info msg="cleaning up dead shim" Feb 12 19:40:48.235741 env[1109]: time="2024-02-12T19:40:48.235686076Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:40:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=2726 runtime=io.containerd.runc.v2\n" Feb 12 19:40:48.272756 kubelet[2009]: I0212 19:40:48.271521 2009 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:40:48.305758 kubelet[2009]: I0212 19:40:48.305702 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:48.313662 systemd[1]: Created slice kubepods-burstable-pod9fd1ac7c_4f77_412b_a363_5595ee418155.slice. Feb 12 19:40:48.314709 kubelet[2009]: I0212 19:40:48.313871 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:48.321827 kubelet[2009]: I0212 19:40:48.321618 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:40:48.323768 systemd[1]: Created slice kubepods-burstable-podc0f485f8_6be6_47fc_ac84_1f79b85db16a.slice. Feb 12 19:40:48.332216 systemd[1]: Created slice kubepods-besteffort-podd3faba48_7aa5_436b_9796_d5066850f4b6.slice. Feb 12 19:40:48.410882 kubelet[2009]: E0212 19:40:48.410844 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:48.412040 env[1109]: time="2024-02-12T19:40:48.411999671Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:40:48.459082 kubelet[2009]: I0212 19:40:48.457992 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hqrs8\" (UniqueName: \"kubernetes.io/projected/d3faba48-7aa5-436b-9796-d5066850f4b6-kube-api-access-hqrs8\") pod \"calico-kube-controllers-6ddbf76c88-fdgzv\" (UID: \"d3faba48-7aa5-436b-9796-d5066850f4b6\") " pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" Feb 12 19:40:48.459082 kubelet[2009]: I0212 19:40:48.458081 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/c0f485f8-6be6-47fc-ac84-1f79b85db16a-config-volume\") pod \"coredns-5d78c9869d-q92k9\" (UID: \"c0f485f8-6be6-47fc-ac84-1f79b85db16a\") " pod="kube-system/coredns-5d78c9869d-q92k9" Feb 12 19:40:48.459082 kubelet[2009]: I0212 19:40:48.458112 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fssks\" (UniqueName: \"kubernetes.io/projected/9fd1ac7c-4f77-412b-a363-5595ee418155-kube-api-access-fssks\") pod \"coredns-5d78c9869d-gslx9\" (UID: \"9fd1ac7c-4f77-412b-a363-5595ee418155\") " pod="kube-system/coredns-5d78c9869d-gslx9" Feb 12 19:40:48.459082 kubelet[2009]: I0212 19:40:48.458156 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9fd1ac7c-4f77-412b-a363-5595ee418155-config-volume\") pod \"coredns-5d78c9869d-gslx9\" (UID: \"9fd1ac7c-4f77-412b-a363-5595ee418155\") " pod="kube-system/coredns-5d78c9869d-gslx9" Feb 12 19:40:48.459082 kubelet[2009]: I0212 19:40:48.458179 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vmzxk\" (UniqueName: \"kubernetes.io/projected/c0f485f8-6be6-47fc-ac84-1f79b85db16a-kube-api-access-vmzxk\") pod \"coredns-5d78c9869d-q92k9\" (UID: \"c0f485f8-6be6-47fc-ac84-1f79b85db16a\") " pod="kube-system/coredns-5d78c9869d-q92k9" Feb 12 19:40:48.459454 kubelet[2009]: I0212 19:40:48.458203 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/d3faba48-7aa5-436b-9796-d5066850f4b6-tigera-ca-bundle\") pod \"calico-kube-controllers-6ddbf76c88-fdgzv\" (UID: \"d3faba48-7aa5-436b-9796-d5066850f4b6\") " pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" Feb 12 19:40:48.618491 kubelet[2009]: E0212 19:40:48.618440 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:48.620320 env[1109]: time="2024-02-12T19:40:48.619819236Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gslx9,Uid:9fd1ac7c-4f77-412b-a363-5595ee418155,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:48.628978 kubelet[2009]: E0212 19:40:48.628935 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:48.630458 env[1109]: time="2024-02-12T19:40:48.630320823Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-q92k9,Uid:c0f485f8-6be6-47fc-ac84-1f79b85db16a,Namespace:kube-system,Attempt:0,}" Feb 12 19:40:48.644888 env[1109]: time="2024-02-12T19:40:48.644840233Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6ddbf76c88-fdgzv,Uid:d3faba48-7aa5-436b-9796-d5066850f4b6,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:48.788703 env[1109]: time="2024-02-12T19:40:48.787746191Z" level=error msg="Failed to destroy network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.788703 env[1109]: time="2024-02-12T19:40:48.788336910Z" level=error msg="encountered an error cleaning up failed sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.788703 env[1109]: time="2024-02-12T19:40:48.788434126Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gslx9,Uid:9fd1ac7c-4f77-412b-a363-5595ee418155,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.792710 kubelet[2009]: E0212 19:40:48.790157 2009 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.792710 kubelet[2009]: E0212 19:40:48.790259 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gslx9" Feb 12 19:40:48.792710 kubelet[2009]: E0212 19:40:48.790289 2009 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-gslx9" Feb 12 19:40:48.793594 kubelet[2009]: E0212 19:40:48.790393 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-gslx9_kube-system(9fd1ac7c-4f77-412b-a363-5595ee418155)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-gslx9_kube-system(9fd1ac7c-4f77-412b-a363-5595ee418155)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gslx9" podUID=9fd1ac7c-4f77-412b-a363-5595ee418155 Feb 12 19:40:48.799199 env[1109]: time="2024-02-12T19:40:48.799129324Z" level=error msg="Failed to destroy network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.799732 env[1109]: time="2024-02-12T19:40:48.799696067Z" level=error msg="encountered an error cleaning up failed sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.799865 env[1109]: time="2024-02-12T19:40:48.799836708Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6ddbf76c88-fdgzv,Uid:d3faba48-7aa5-436b-9796-d5066850f4b6,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.802945 kubelet[2009]: E0212 19:40:48.800351 2009 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.802945 kubelet[2009]: E0212 19:40:48.800427 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" Feb 12 19:40:48.802945 kubelet[2009]: E0212 19:40:48.800450 2009 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" Feb 12 19:40:48.803476 kubelet[2009]: E0212 19:40:48.800538 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6ddbf76c88-fdgzv_calico-system(d3faba48-7aa5-436b-9796-d5066850f4b6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6ddbf76c88-fdgzv_calico-system(d3faba48-7aa5-436b-9796-d5066850f4b6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" podUID=d3faba48-7aa5-436b-9796-d5066850f4b6 Feb 12 19:40:48.810409 env[1109]: time="2024-02-12T19:40:48.810345166Z" level=error msg="Failed to destroy network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.811022 env[1109]: time="2024-02-12T19:40:48.810974511Z" level=error msg="encountered an error cleaning up failed sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.811243 env[1109]: time="2024-02-12T19:40:48.811202501Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-q92k9,Uid:c0f485f8-6be6-47fc-ac84-1f79b85db16a,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.811726 kubelet[2009]: E0212 19:40:48.811688 2009 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:48.811856 kubelet[2009]: E0212 19:40:48.811771 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-q92k9" Feb 12 19:40:48.811856 kubelet[2009]: E0212 19:40:48.811808 2009 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-q92k9" Feb 12 19:40:48.811963 kubelet[2009]: E0212 19:40:48.811891 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-q92k9_kube-system(c0f485f8-6be6-47fc-ac84-1f79b85db16a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-q92k9_kube-system(c0f485f8-6be6-47fc-ac84-1f79b85db16a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-q92k9" podUID=c0f485f8-6be6-47fc-ac84-1f79b85db16a Feb 12 19:40:49.191295 systemd[1]: Created slice kubepods-besteffort-pod508a2b03_867c_4864_94af_91620ebe7ae2.slice. Feb 12 19:40:49.194617 env[1109]: time="2024-02-12T19:40:49.194570879Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmcqd,Uid:508a2b03-867c-4864-94af-91620ebe7ae2,Namespace:calico-system,Attempt:0,}" Feb 12 19:40:49.283687 env[1109]: time="2024-02-12T19:40:49.283562920Z" level=error msg="Failed to destroy network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.284265 env[1109]: time="2024-02-12T19:40:49.284181088Z" level=error msg="encountered an error cleaning up failed sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.284438 env[1109]: time="2024-02-12T19:40:49.284281646Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmcqd,Uid:508a2b03-867c-4864-94af-91620ebe7ae2,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.284818 kubelet[2009]: E0212 19:40:49.284764 2009 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.286166 kubelet[2009]: E0212 19:40:49.284853 2009 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:49.286166 kubelet[2009]: E0212 19:40:49.284885 2009 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-xmcqd" Feb 12 19:40:49.286166 kubelet[2009]: E0212 19:40:49.284974 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-xmcqd_calico-system(508a2b03-867c-4864-94af-91620ebe7ae2)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-xmcqd_calico-system(508a2b03-867c-4864-94af-91620ebe7ae2)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:49.414485 kubelet[2009]: I0212 19:40:49.413839 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:40:49.415613 env[1109]: time="2024-02-12T19:40:49.415574340Z" level=info msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" Feb 12 19:40:49.420544 kubelet[2009]: I0212 19:40:49.418608 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:40:49.421716 env[1109]: time="2024-02-12T19:40:49.421651361Z" level=info msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" Feb 12 19:40:49.422786 kubelet[2009]: I0212 19:40:49.422745 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:40:49.423598 env[1109]: time="2024-02-12T19:40:49.423566049Z" level=info msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" Feb 12 19:40:49.429268 kubelet[2009]: I0212 19:40:49.429233 2009 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:40:49.430072 env[1109]: time="2024-02-12T19:40:49.430003197Z" level=info msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" Feb 12 19:40:49.504438 env[1109]: time="2024-02-12T19:40:49.504284912Z" level=error msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" failed" error="failed to destroy network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.506003 kubelet[2009]: E0212 19:40:49.505961 2009 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:40:49.506269 kubelet[2009]: E0212 19:40:49.506029 2009 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613} Feb 12 19:40:49.506269 kubelet[2009]: E0212 19:40:49.506090 2009 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9fd1ac7c-4f77-412b-a363-5595ee418155\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:49.506269 kubelet[2009]: E0212 19:40:49.506122 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9fd1ac7c-4f77-412b-a363-5595ee418155\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-gslx9" podUID=9fd1ac7c-4f77-412b-a363-5595ee418155 Feb 12 19:40:49.518038 env[1109]: time="2024-02-12T19:40:49.517949980Z" level=error msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" failed" error="failed to destroy network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.518659 kubelet[2009]: E0212 19:40:49.518627 2009 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:40:49.518766 kubelet[2009]: E0212 19:40:49.518684 2009 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4} Feb 12 19:40:49.518766 kubelet[2009]: E0212 19:40:49.518745 2009 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"508a2b03-867c-4864-94af-91620ebe7ae2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:49.518970 kubelet[2009]: E0212 19:40:49.518779 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"508a2b03-867c-4864-94af-91620ebe7ae2\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-xmcqd" podUID=508a2b03-867c-4864-94af-91620ebe7ae2 Feb 12 19:40:49.535351 env[1109]: time="2024-02-12T19:40:49.535265612Z" level=error msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" failed" error="failed to destroy network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.535612 kubelet[2009]: E0212 19:40:49.535587 2009 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:40:49.535695 kubelet[2009]: E0212 19:40:49.535632 2009 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b} Feb 12 19:40:49.535695 kubelet[2009]: E0212 19:40:49.535676 2009 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3faba48-7aa5-436b-9796-d5066850f4b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:49.535808 kubelet[2009]: E0212 19:40:49.535709 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3faba48-7aa5-436b-9796-d5066850f4b6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" podUID=d3faba48-7aa5-436b-9796-d5066850f4b6 Feb 12 19:40:49.544271 env[1109]: time="2024-02-12T19:40:49.544189777Z" level=error msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" failed" error="failed to destroy network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:40:49.544843 kubelet[2009]: E0212 19:40:49.544800 2009 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:40:49.544981 kubelet[2009]: E0212 19:40:49.544857 2009 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598} Feb 12 19:40:49.544981 kubelet[2009]: E0212 19:40:49.544911 2009 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"c0f485f8-6be6-47fc-ac84-1f79b85db16a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:40:49.544981 kubelet[2009]: E0212 19:40:49.544960 2009 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"c0f485f8-6be6-47fc-ac84-1f79b85db16a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-q92k9" podUID=c0f485f8-6be6-47fc-ac84-1f79b85db16a Feb 12 19:40:49.580363 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613-shm.mount: Deactivated successfully. Feb 12 19:40:51.705735 systemd[1]: Started sshd@13-164.90.149.146:22-119.92.70.82:40326.service. Feb 12 19:40:51.704000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.90.149.146:22-119.92.70.82:40326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:52.441832 kubelet[2009]: I0212 19:40:52.441742 2009 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:40:52.442755 kubelet[2009]: E0212 19:40:52.442704 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:52.455024 kubelet[2009]: E0212 19:40:52.454988 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:52.634001 sshd[2945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82 user=root Feb 12 19:40:52.637097 kernel: kauditd_printk_skb: 36 callbacks suppressed Feb 12 19:40:52.637360 kernel: audit: type=1100 audit(1707766852.633:1178): pid=2945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.92.70.82 addr=119.92.70.82 terminal=ssh res=failed' Feb 12 19:40:52.633000 audit[2945]: USER_AUTH pid=2945 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.92.70.82 addr=119.92.70.82 terminal=ssh res=failed' Feb 12 19:40:52.841000 audit[2948]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.841000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffce0054080 a2=0 a3=7ffce005406c items=0 ppid=2166 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.854015 kernel: audit: type=1325 audit(1707766852.841:1179): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.854259 kernel: audit: type=1300 audit(1707766852.841:1179): arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffce0054080 a2=0 a3=7ffce005406c items=0 ppid=2166 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.858091 kernel: audit: type=1327 audit(1707766852.841:1179): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.841000 audit[2948]: NETFILTER_CFG table=nat:96 family=2 entries=19 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.870159 kernel: audit: type=1325 audit(1707766852.841:1180): table=nat:96 family=2 entries=19 op=nft_register_chain pid=2948 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:40:52.870300 kernel: audit: type=1300 audit(1707766852.841:1180): arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffce0054080 a2=0 a3=7ffce005406c items=0 ppid=2166 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.841000 audit[2948]: SYSCALL arch=c000003e syscall=46 success=yes exit=6068 a0=3 a1=7ffce0054080 a2=0 a3=7ffce005406c items=0 ppid=2166 pid=2948 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:52.874273 kernel: audit: type=1327 audit(1707766852.841:1180): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:52.841000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:40:54.465277 sshd[2945]: Failed password for root from 119.92.70.82 port 40326 ssh2 Feb 12 19:40:54.735323 sshd[2945]: Received disconnect from 119.92.70.82 port 40326:11: Bye Bye [preauth] Feb 12 19:40:54.735323 sshd[2945]: Disconnected from authenticating user root 119.92.70.82 port 40326 [preauth] Feb 12 19:40:54.743211 kernel: audit: type=1131 audit(1707766854.735:1181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.90.149.146:22-119.92.70.82:40326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:54.735000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-164.90.149.146:22-119.92.70.82:40326 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:54.735892 systemd[1]: sshd@13-164.90.149.146:22-119.92.70.82:40326.service: Deactivated successfully. Feb 12 19:40:57.592154 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2897418373.mount: Deactivated successfully. Feb 12 19:40:57.695411 env[1109]: time="2024-02-12T19:40:57.695343109Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.697343 env[1109]: time="2024-02-12T19:40:57.697273000Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.699503 env[1109]: time="2024-02-12T19:40:57.699381255Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.702934 env[1109]: time="2024-02-12T19:40:57.702858629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:40:57.703981 env[1109]: time="2024-02-12T19:40:57.703883568Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:1843802b91be8ff1c1d35ee08461ebe909e7a2199e59396f69886439a372312c\"" Feb 12 19:40:57.727560 env[1109]: time="2024-02-12T19:40:57.727467834Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:40:57.749618 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2621365018.mount: Deactivated successfully. Feb 12 19:40:57.761016 env[1109]: time="2024-02-12T19:40:57.760887204Z" level=info msg="CreateContainer within sandbox \"70be8efd6cbc6b8c96b388fb2e1bc72bd38641eb9203d7124f7609cbd6b1ea46\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3\"" Feb 12 19:40:57.763836 env[1109]: time="2024-02-12T19:40:57.762567981Z" level=info msg="StartContainer for \"ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3\"" Feb 12 19:40:57.796321 systemd[1]: Started cri-containerd-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3.scope. Feb 12 19:40:57.841441 kernel: audit: type=1400 audit(1707766857.831:1182): avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.841790 kernel: audit: type=1300 audit(1707766857.831:1182): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2487 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2487 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393534623431386162613264363266613465393832643966353537 Feb 12 19:40:57.848244 kernel: audit: type=1327 audit(1707766857.831:1182): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393534623431386162613264363266613465393832643966353537 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.856736 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.856884 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.862118 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.867148 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.871093 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.876087 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.880075 kernel: audit: type=1400 audit(1707766857.831:1183): avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.831000 audit: BPF prog-id=145 op=LOAD Feb 12 19:40:57.831000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014d9d8 a2=78 a3=c0003d0710 items=0 ppid=2487 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.831000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393534623431386162613264363266613465393832643966353537 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.840000 audit: BPF prog-id=146 op=LOAD Feb 12 19:40:57.840000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00014d770 a2=78 a3=c0003d0758 items=0 ppid=2487 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.840000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393534623431386162613264363266613465393832643966353537 Feb 12 19:40:57.846000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:40:57.846000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:40:57.846000 audit: BPF prog-id=147 op=LOAD Feb 12 19:40:57.846000 audit[2960]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00014dc30 a2=78 a3=c0003d07e8 items=0 ppid=2487 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:57.846000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164393534623431386162613264363266613465393832643966353537 Feb 12 19:40:57.893766 env[1109]: time="2024-02-12T19:40:57.893680200Z" level=info msg="StartContainer for \"ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3\" returns successfully" Feb 12 19:40:58.003425 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:40:58.003611 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:40:58.475025 kubelet[2009]: E0212 19:40:58.474984 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:59.473913 kubelet[2009]: E0212 19:40:59.473859 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:40:59.501005 systemd[1]: run-containerd-runc-k8s.io-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3-runc.IzXcUw.mount: Deactivated successfully. Feb 12 19:40:59.723000 audit[3105]: AVC avc: denied { write } for pid=3105 comm="tee" name="fd" dev="proc" ino=23473 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.723000 audit[3105]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd500c6972 a2=241 a3=1b6 items=1 ppid=3072 pid=3105 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.723000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:40:59.723000 audit: PATH item=0 name="/dev/fd/63" inode=23455 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.723000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.725000 audit[3113]: AVC avc: denied { write } for pid=3113 comm="tee" name="fd" dev="proc" ino=23477 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.725000 audit[3113]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffc1cb84963 a2=241 a3=1b6 items=1 ppid=3067 pid=3113 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.725000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:40:59.725000 audit: PATH item=0 name="/dev/fd/63" inode=23462 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.725000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.732000 audit[3115]: AVC avc: denied { write } for pid=3115 comm="tee" name="fd" dev="proc" ino=23484 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.732000 audit[3115]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe9a080974 a2=241 a3=1b6 items=1 ppid=3077 pid=3115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.732000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:40:59.732000 audit: PATH item=0 name="/dev/fd/63" inode=23465 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.732000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.738000 audit[3117]: AVC avc: denied { write } for pid=3117 comm="tee" name="fd" dev="proc" ino=23488 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.738000 audit[3117]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffbc977972 a2=241 a3=1b6 items=1 ppid=3069 pid=3117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.738000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:40:59.738000 audit: PATH item=0 name="/dev/fd/63" inode=23468 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.738000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.761000 audit[3137]: AVC avc: denied { write } for pid=3137 comm="tee" name="fd" dev="proc" ino=23501 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.761000 audit[3137]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe84bb4973 a2=241 a3=1b6 items=1 ppid=3091 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.761000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:40:59.761000 audit: PATH item=0 name="/dev/fd/63" inode=23498 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.761000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.762000 audit[3130]: AVC avc: denied { write } for pid=3130 comm="tee" name="fd" dev="proc" ino=23505 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.762000 audit[3130]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd8ed5d972 a2=241 a3=1b6 items=1 ppid=3086 pid=3130 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.762000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:40:59.762000 audit: PATH item=0 name="/dev/fd/63" inode=24510 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.762000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:40:59.765000 audit[3122]: AVC avc: denied { write } for pid=3122 comm="tee" name="fd" dev="proc" ino=23509 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:40:59.765000 audit[3122]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff533d2962 a2=241 a3=1b6 items=1 ppid=3075 pid=3122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.765000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:40:59.765000 audit: PATH item=0 name="/dev/fd/63" inode=24507 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:40:59.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.303000 audit: BPF prog-id=148 op=LOAD Feb 12 19:41:00.303000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5ef9f9e0 a2=70 a3=7f6142845000 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.303000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.305000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit: BPF prog-id=149 op=LOAD Feb 12 19:41:00.305000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7fff5ef9f9e0 a2=70 a3=6e items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.305000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.305000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7fff5ef9f990 a2=70 a3=7fff5ef9f9e0 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.305000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.305000 audit: BPF prog-id=150 op=LOAD Feb 12 19:41:00.305000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff5ef9f970 a2=70 a3=7fff5ef9f9e0 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.305000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.307000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5ef9fa50 a2=70 a3=0 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.307000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7fff5ef9fa40 a2=70 a3=0 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.307000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=0 a1=7fff5ef9fa80 a2=70 a3=0 items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.307000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { perfmon } for pid=3206 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit[3206]: AVC avc: denied { bpf } for pid=3206 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.307000 audit: BPF prog-id=151 op=LOAD Feb 12 19:41:00.307000 audit[3206]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=5 a1=7fff5ef9f9a0 a2=70 a3=ffffffff items=0 ppid=3087 pid=3206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.307000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:41:00.313000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.313000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4e9995d0 a2=70 a3=fff80800 items=0 ppid=3087 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:00.313000 audit[3210]: AVC avc: denied { bpf } for pid=3210 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:00.313000 audit[3210]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7fff4e9994a0 a2=70 a3=3 items=0 ppid=3087 pid=3210 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.313000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:41:00.321000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:41:00.425000 audit[3234]: NETFILTER_CFG table=raw:97 family=2 entries=19 op=nft_register_chain pid=3234 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:00.425000 audit[3234]: SYSCALL arch=c000003e syscall=46 success=yes exit=6132 a0=3 a1=7ffc62e45490 a2=0 a3=7ffc62e4547c items=0 ppid=3087 pid=3234 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.425000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:00.427000 audit[3236]: NETFILTER_CFG table=mangle:98 family=2 entries=19 op=nft_register_chain pid=3236 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:00.427000 audit[3236]: SYSCALL arch=c000003e syscall=46 success=yes exit=6800 a0=3 a1=7ffdcb2b57a0 a2=0 a3=55a3c1d15000 items=0 ppid=3087 pid=3236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.427000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:00.436000 audit[3235]: NETFILTER_CFG table=nat:99 family=2 entries=16 op=nft_register_chain pid=3235 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:00.436000 audit[3235]: SYSCALL arch=c000003e syscall=46 success=yes exit=5188 a0=3 a1=7ffff1f662b0 a2=0 a3=7ffff1f6629c items=0 ppid=3087 pid=3235 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.436000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:00.438000 audit[3237]: NETFILTER_CFG table=filter:100 family=2 entries=39 op=nft_register_chain pid=3237 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:00.438000 audit[3237]: SYSCALL arch=c000003e syscall=46 success=yes exit=18472 a0=3 a1=7fffbcab3ef0 a2=0 a3=55cee25a6000 items=0 ppid=3087 pid=3237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.438000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:01.155902 systemd-networkd[1005]: vxlan.calico: Link UP Feb 12 19:41:01.155914 systemd-networkd[1005]: vxlan.calico: Gained carrier Feb 12 19:41:01.187267 env[1109]: time="2024-02-12T19:41:01.185768297Z" level=info msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" Feb 12 19:41:01.191086 env[1109]: time="2024-02-12T19:41:01.190988530Z" level=info msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" Feb 12 19:41:01.309491 kubelet[2009]: I0212 19:41:01.309415 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-pmwvt" podStartSLOduration=4.169750237 podCreationTimestamp="2024-02-12 19:40:35 +0000 UTC" firstStartedPulling="2024-02-12 19:40:35.568670702 +0000 UTC m=+18.553486445" lastFinishedPulling="2024-02-12 19:40:57.704486081 +0000 UTC m=+40.689301827" observedRunningTime="2024-02-12 19:40:58.506604088 +0000 UTC m=+41.491419840" watchObservedRunningTime="2024-02-12 19:41:01.305565619 +0000 UTC m=+44.290381447" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.313 [INFO][3278] k8s.go 578: Cleaning up netns ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.313 [INFO][3278] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" iface="eth0" netns="/var/run/netns/cni-ecdc7f05-7216-a0c9-f382-0160ddd5ffef" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.315 [INFO][3278] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" iface="eth0" netns="/var/run/netns/cni-ecdc7f05-7216-a0c9-f382-0160ddd5ffef" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.315 [INFO][3278] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" iface="eth0" netns="/var/run/netns/cni-ecdc7f05-7216-a0c9-f382-0160ddd5ffef" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.315 [INFO][3278] k8s.go 585: Releasing IP address(es) ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.315 [INFO][3278] utils.go 188: Calico CNI releasing IP address ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.461 [INFO][3291] ipam_plugin.go 415: Releasing address using handleID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.463 [INFO][3291] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.463 [INFO][3291] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.479 [WARNING][3291] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.479 [INFO][3291] ipam_plugin.go 443: Releasing address using workloadID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.482 [INFO][3291] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:01.489106 env[1109]: 2024-02-12 19:41:01.485 [INFO][3278] k8s.go 591: Teardown processing complete. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:01.489885 env[1109]: time="2024-02-12T19:41:01.489836209Z" level=info msg="TearDown network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" successfully" Feb 12 19:41:01.489986 env[1109]: time="2024-02-12T19:41:01.489965595Z" level=info msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" returns successfully" Feb 12 19:41:01.492304 systemd[1]: run-netns-cni\x2decdc7f05\x2d7216\x2da0c9\x2df382\x2d0160ddd5ffef.mount: Deactivated successfully. Feb 12 19:41:01.495402 env[1109]: time="2024-02-12T19:41:01.495335464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6ddbf76c88-fdgzv,Uid:d3faba48-7aa5-436b-9796-d5066850f4b6,Namespace:calico-system,Attempt:1,}" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.306 [INFO][3279] k8s.go 578: Cleaning up netns ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.307 [INFO][3279] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" iface="eth0" netns="/var/run/netns/cni-0aa6e447-d54b-ce59-4fc2-a74ec8169026" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.307 [INFO][3279] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" iface="eth0" netns="/var/run/netns/cni-0aa6e447-d54b-ce59-4fc2-a74ec8169026" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.311 [INFO][3279] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" iface="eth0" netns="/var/run/netns/cni-0aa6e447-d54b-ce59-4fc2-a74ec8169026" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.311 [INFO][3279] k8s.go 585: Releasing IP address(es) ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.311 [INFO][3279] utils.go 188: Calico CNI releasing IP address ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.461 [INFO][3290] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.463 [INFO][3290] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.482 [INFO][3290] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.500 [WARNING][3290] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.500 [INFO][3290] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.505 [INFO][3290] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:01.514791 env[1109]: 2024-02-12 19:41:01.509 [INFO][3279] k8s.go 591: Teardown processing complete. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:01.519283 systemd[1]: run-netns-cni\x2d0aa6e447\x2dd54b\x2dce59\x2d4fc2\x2da74ec8169026.mount: Deactivated successfully. Feb 12 19:41:01.522028 env[1109]: time="2024-02-12T19:41:01.520857961Z" level=info msg="TearDown network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" successfully" Feb 12 19:41:01.522028 env[1109]: time="2024-02-12T19:41:01.520978068Z" level=info msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" returns successfully" Feb 12 19:41:01.525848 env[1109]: time="2024-02-12T19:41:01.525769377Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmcqd,Uid:508a2b03-867c-4864-94af-91620ebe7ae2,Namespace:calico-system,Attempt:1,}" Feb 12 19:41:01.784547 systemd-networkd[1005]: califb3e9de9f30: Link UP Feb 12 19:41:01.787980 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:01.788180 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): califb3e9de9f30: link becomes ready Feb 12 19:41:01.788227 systemd-networkd[1005]: califb3e9de9f30: Gained carrier Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.613 [INFO][3304] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0 calico-kube-controllers-6ddbf76c88- calico-system d3faba48-7aa5-436b-9796-d5066850f4b6 746 0 2024-02-12 19:40:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6ddbf76c88 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 calico-kube-controllers-6ddbf76c88-fdgzv eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] califb3e9de9f30 [] []}} ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.613 [INFO][3304] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.665 [INFO][3329] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" HandleID="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.692 [INFO][3329] ipam_plugin.go 268: Auto assigning IP ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" HandleID="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002a14b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"calico-kube-controllers-6ddbf76c88-fdgzv", "timestamp":"2024-02-12 19:41:01.665737307 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.692 [INFO][3329] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.692 [INFO][3329] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.692 [INFO][3329] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.699 [INFO][3329] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.716 [INFO][3329] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.737 [INFO][3329] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.747 [INFO][3329] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.752 [INFO][3329] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.752 [INFO][3329] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.756 [INFO][3329] ipam.go 1682: Creating new handle: k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.763 [INFO][3329] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.774 [INFO][3329] ipam.go 1216: Successfully claimed IPs: [192.168.105.129/26] block=192.168.105.128/26 handle="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.774 [INFO][3329] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.129/26] handle="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.774 [INFO][3329] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:01.810617 env[1109]: 2024-02-12 19:41:01.774 [INFO][3329] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.129/26] IPv6=[] ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" HandleID="k8s-pod-network.e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.778 [INFO][3304] k8s.go 385: Populated endpoint ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0", GenerateName:"calico-kube-controllers-6ddbf76c88-", Namespace:"calico-system", SelfLink:"", UID:"d3faba48-7aa5-436b-9796-d5066850f4b6", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6ddbf76c88", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"calico-kube-controllers-6ddbf76c88-fdgzv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califb3e9de9f30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.778 [INFO][3304] k8s.go 386: Calico CNI using IPs: [192.168.105.129/32] ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.778 [INFO][3304] dataplane_linux.go 68: Setting the host side veth name to califb3e9de9f30 ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.788 [INFO][3304] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.790 [INFO][3304] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0", GenerateName:"calico-kube-controllers-6ddbf76c88-", Namespace:"calico-system", SelfLink:"", UID:"d3faba48-7aa5-436b-9796-d5066850f4b6", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6ddbf76c88", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd", Pod:"calico-kube-controllers-6ddbf76c88-fdgzv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califb3e9de9f30", MAC:"2e:7f:20:fe:62:da", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:01.812867 env[1109]: 2024-02-12 19:41:01.807 [INFO][3304] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd" Namespace="calico-system" Pod="calico-kube-controllers-6ddbf76c88-fdgzv" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:01.838934 env[1109]: time="2024-02-12T19:41:01.837819227Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:01.838934 env[1109]: time="2024-02-12T19:41:01.837894199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:01.838934 env[1109]: time="2024-02-12T19:41:01.837911802Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:01.838934 env[1109]: time="2024-02-12T19:41:01.838174703Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd pid=3364 runtime=io.containerd.runc.v2 Feb 12 19:41:01.866237 systemd[1]: Started cri-containerd-e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd.scope. Feb 12 19:41:01.898130 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia4326b3e3c8: link becomes ready Feb 12 19:41:01.898466 systemd-networkd[1005]: calia4326b3e3c8: Link UP Feb 12 19:41:01.898777 systemd-networkd[1005]: calia4326b3e3c8: Gained carrier Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.648 [INFO][3314] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0 csi-node-driver- calico-system 508a2b03-867c-4864-94af-91620ebe7ae2 745 0 2024-02-12 19:40:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 csi-node-driver-xmcqd eth0 default [] [] [kns.calico-system ksa.calico-system.default] calia4326b3e3c8 [] []}} ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.648 [INFO][3314] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.720 [INFO][3337] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" HandleID="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.745 [INFO][3337] ipam_plugin.go 268: Auto assigning IP ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" HandleID="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002ad7b0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"csi-node-driver-xmcqd", "timestamp":"2024-02-12 19:41:01.720819762 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.745 [INFO][3337] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.774 [INFO][3337] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.774 [INFO][3337] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.791 [INFO][3337] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.812 [INFO][3337] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.825 [INFO][3337] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.830 [INFO][3337] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.838 [INFO][3337] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.838 [INFO][3337] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.844 [INFO][3337] ipam.go 1682: Creating new handle: k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546 Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.855 [INFO][3337] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.879 [INFO][3337] ipam.go 1216: Successfully claimed IPs: [192.168.105.130/26] block=192.168.105.128/26 handle="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.879 [INFO][3337] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.130/26] handle="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.879 [INFO][3337] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:01.915873 env[1109]: 2024-02-12 19:41:01.879 [INFO][3337] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.130/26] IPv6=[] ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" HandleID="k8s-pod-network.bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.885 [INFO][3314] k8s.go 385: Populated endpoint ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"508a2b03-867c-4864-94af-91620ebe7ae2", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"csi-node-driver-xmcqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4326b3e3c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.885 [INFO][3314] k8s.go 386: Calico CNI using IPs: [192.168.105.130/32] ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.886 [INFO][3314] dataplane_linux.go 68: Setting the host side veth name to calia4326b3e3c8 ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.898 [INFO][3314] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.899 [INFO][3314] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"508a2b03-867c-4864-94af-91620ebe7ae2", ResourceVersion:"745", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546", Pod:"csi-node-driver-xmcqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4326b3e3c8", MAC:"5e:4b:36:1f:fc:ae", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:01.916667 env[1109]: 2024-02-12 19:41:01.912 [INFO][3314] k8s.go 491: Wrote updated endpoint to datastore ContainerID="bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546" Namespace="calico-system" Pod="csi-node-driver-xmcqd" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.923000 audit: BPF prog-id=152 op=LOAD Feb 12 19:41:01.924000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.924000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=3364 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333535353032653063343434363561666361626438323163393330 Feb 12 19:41:01.924000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.924000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=3364 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.924000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333535353032653063343434363561666361626438323163393330 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit: BPF prog-id=153 op=LOAD Feb 12 19:41:01.925000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00036ab50 items=0 ppid=3364 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333535353032653063343434363561666361626438323163393330 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit: BPF prog-id=154 op=LOAD Feb 12 19:41:01.925000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00036ab98 items=0 ppid=3364 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333535353032653063343434363561666361626438323163393330 Feb 12 19:41:01.925000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:41:01.925000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { perfmon } for pid=3375 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit[3375]: AVC avc: denied { bpf } for pid=3375 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:01.925000 audit: BPF prog-id=155 op=LOAD Feb 12 19:41:01.925000 audit[3375]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00036afa8 items=0 ppid=3364 pid=3375 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532333535353032653063343434363561666361626438323163393330 Feb 12 19:41:01.953370 env[1109]: time="2024-02-12T19:41:01.953247867Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:01.953675 env[1109]: time="2024-02-12T19:41:01.953618711Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:01.953876 env[1109]: time="2024-02-12T19:41:01.953829982Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:01.954304 env[1109]: time="2024-02-12T19:41:01.954253569Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546 pid=3413 runtime=io.containerd.runc.v2 Feb 12 19:41:01.951000 audit[3412]: NETFILTER_CFG table=filter:101 family=2 entries=36 op=nft_register_chain pid=3412 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:01.951000 audit[3412]: SYSCALL arch=c000003e syscall=46 success=yes exit=19908 a0=3 a1=7ffd3e57e3e0 a2=0 a3=7ffd3e57e3cc items=0 ppid=3087 pid=3412 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.951000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:01.980898 systemd[1]: Started cri-containerd-bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546.scope. Feb 12 19:41:02.026151 env[1109]: time="2024-02-12T19:41:02.026099960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6ddbf76c88-fdgzv,Uid:d3faba48-7aa5-436b-9796-d5066850f4b6,Namespace:calico-system,Attempt:1,} returns sandbox id \"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd\"" Feb 12 19:41:02.029806 env[1109]: time="2024-02-12T19:41:02.029750865Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:41:02.039000 audit[3448]: NETFILTER_CFG table=filter:102 family=2 entries=34 op=nft_register_chain pid=3448 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:02.039000 audit[3448]: SYSCALL arch=c000003e syscall=46 success=yes exit=18320 a0=3 a1=7ffc0b2c91a0 a2=0 a3=7ffc0b2c918c items=0 ppid=3087 pid=3448 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.039000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.055000 audit: BPF prog-id=156 op=LOAD Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263303265396437303330303266323039666336303537326638333231 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263303265396437303330303266323039666336303537326638333231 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit: BPF prog-id=157 op=LOAD Feb 12 19:41:02.056000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000b2700 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263303265396437303330303266323039666336303537326638333231 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.056000 audit: BPF prog-id=158 op=LOAD Feb 12 19:41:02.056000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000b2748 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.056000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263303265396437303330303266323039666336303537326638333231 Feb 12 19:41:02.057000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:41:02.057000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { perfmon } for pid=3423 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit[3423]: AVC avc: denied { bpf } for pid=3423 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:02.057000 audit: BPF prog-id=159 op=LOAD Feb 12 19:41:02.057000 audit[3423]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000b2b58 items=0 ppid=3413 pid=3423 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.057000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263303265396437303330303266323039666336303537326638333231 Feb 12 19:41:02.083915 env[1109]: time="2024-02-12T19:41:02.083742666Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-xmcqd,Uid:508a2b03-867c-4864-94af-91620ebe7ae2,Namespace:calico-system,Attempt:1,} returns sandbox id \"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546\"" Feb 12 19:41:03.133929 systemd-networkd[1005]: vxlan.calico: Gained IPv6LL Feb 12 19:41:03.187169 env[1109]: time="2024-02-12T19:41:03.187113820Z" level=info msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.255 [INFO][3472] k8s.go 578: Cleaning up netns ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.255 [INFO][3472] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" iface="eth0" netns="/var/run/netns/cni-00bd9a60-862b-c6ea-2eec-2c3725b45f26" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.255 [INFO][3472] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" iface="eth0" netns="/var/run/netns/cni-00bd9a60-862b-c6ea-2eec-2c3725b45f26" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.257 [INFO][3472] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" iface="eth0" netns="/var/run/netns/cni-00bd9a60-862b-c6ea-2eec-2c3725b45f26" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.257 [INFO][3472] k8s.go 585: Releasing IP address(es) ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.257 [INFO][3472] utils.go 188: Calico CNI releasing IP address ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.289 [INFO][3479] ipam_plugin.go 415: Releasing address using handleID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.289 [INFO][3479] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.289 [INFO][3479] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.302 [WARNING][3479] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.302 [INFO][3479] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.307 [INFO][3479] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:03.311579 env[1109]: 2024-02-12 19:41:03.309 [INFO][3472] k8s.go 591: Teardown processing complete. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:03.316900 env[1109]: time="2024-02-12T19:41:03.314904023Z" level=info msg="TearDown network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" successfully" Feb 12 19:41:03.316900 env[1109]: time="2024-02-12T19:41:03.314974408Z" level=info msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" returns successfully" Feb 12 19:41:03.316973 kubelet[2009]: E0212 19:41:03.315800 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:03.314694 systemd[1]: run-netns-cni\x2d00bd9a60\x2d862b\x2dc6ea\x2d2eec\x2d2c3725b45f26.mount: Deactivated successfully. Feb 12 19:41:03.318417 env[1109]: time="2024-02-12T19:41:03.318363003Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gslx9,Uid:9fd1ac7c-4f77-412b-a363-5595ee418155,Namespace:kube-system,Attempt:1,}" Feb 12 19:41:03.445357 systemd-networkd[1005]: calia4326b3e3c8: Gained IPv6LL Feb 12 19:41:03.511804 systemd-networkd[1005]: cali35efbdd47d0: Link UP Feb 12 19:41:03.516159 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:03.516298 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali35efbdd47d0: link becomes ready Feb 12 19:41:03.516515 systemd-networkd[1005]: cali35efbdd47d0: Gained carrier Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.392 [INFO][3486] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0 coredns-5d78c9869d- kube-system 9fd1ac7c-4f77-412b-a363-5595ee418155 758 0 2024-02-12 19:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 coredns-5d78c9869d-gslx9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali35efbdd47d0 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.393 [INFO][3486] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.436 [INFO][3498] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" HandleID="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.452 [INFO][3498] ipam_plugin.go 268: Auto assigning IP ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" HandleID="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00022eae0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"coredns-5d78c9869d-gslx9", "timestamp":"2024-02-12 19:41:03.436199417 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.452 [INFO][3498] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.452 [INFO][3498] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.452 [INFO][3498] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.455 [INFO][3498] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.463 [INFO][3498] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.471 [INFO][3498] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.474 [INFO][3498] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.479 [INFO][3498] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.479 [INFO][3498] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.484 [INFO][3498] ipam.go 1682: Creating new handle: k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47 Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.494 [INFO][3498] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.502 [INFO][3498] ipam.go 1216: Successfully claimed IPs: [192.168.105.131/26] block=192.168.105.128/26 handle="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.502 [INFO][3498] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.131/26] handle="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.502 [INFO][3498] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:03.540853 env[1109]: 2024-02-12 19:41:03.502 [INFO][3498] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.131/26] IPv6=[] ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" HandleID="k8s-pod-network.1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.505 [INFO][3486] k8s.go 385: Populated endpoint ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9fd1ac7c-4f77-412b-a363-5595ee418155", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"coredns-5d78c9869d-gslx9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35efbdd47d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.505 [INFO][3486] k8s.go 386: Calico CNI using IPs: [192.168.105.131/32] ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.505 [INFO][3486] dataplane_linux.go 68: Setting the host side veth name to cali35efbdd47d0 ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.522 [INFO][3486] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.522 [INFO][3486] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9fd1ac7c-4f77-412b-a363-5595ee418155", ResourceVersion:"758", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47", Pod:"coredns-5d78c9869d-gslx9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35efbdd47d0", MAC:"c2:11:ba:0a:bb:e1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:03.542171 env[1109]: 2024-02-12 19:41:03.537 [INFO][3486] k8s.go 491: Wrote updated endpoint to datastore ContainerID="1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47" Namespace="kube-system" Pod="coredns-5d78c9869d-gslx9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:03.572026 env[1109]: time="2024-02-12T19:41:03.571876897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:03.572026 env[1109]: time="2024-02-12T19:41:03.571971489Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:03.572343 env[1109]: time="2024-02-12T19:41:03.571990498Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:03.572558 env[1109]: time="2024-02-12T19:41:03.572519921Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47 pid=3528 runtime=io.containerd.runc.v2 Feb 12 19:41:03.587697 kernel: kauditd_printk_skb: 271 callbacks suppressed Feb 12 19:41:03.587851 kernel: audit: type=1325 audit(1707766863.582:1251): table=filter:103 family=2 entries=44 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:03.582000 audit[3538]: NETFILTER_CFG table=filter:103 family=2 entries=44 op=nft_register_chain pid=3538 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:03.582000 audit[3538]: SYSCALL arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffdb0dfa1d0 a2=0 a3=7ffdb0dfa1bc items=0 ppid=3087 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.594167 kernel: audit: type=1300 audit(1707766863.582:1251): arch=c000003e syscall=46 success=yes exit=22284 a0=3 a1=7ffdb0dfa1d0 a2=0 a3=7ffdb0dfa1bc items=0 ppid=3087 pid=3538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.582000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:03.599084 kernel: audit: type=1327 audit(1707766863.582:1251): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:03.611429 systemd[1]: run-containerd-runc-k8s.io-1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47-runc.UqRdfY.mount: Deactivated successfully. Feb 12 19:41:03.614578 systemd[1]: Started cri-containerd-1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47.scope. Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.635266 kernel: audit: type=1400 audit(1707766863.629:1252): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.639164 kernel: audit: type=1400 audit(1707766863.629:1253): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.646720 kernel: audit: type=1400 audit(1707766863.629:1254): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.646858 kernel: audit: type=1400 audit(1707766863.629:1255): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.651219 kernel: audit: type=1400 audit(1707766863.629:1256): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.657218 kernel: audit: type=1400 audit(1707766863.629:1257): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.661131 kernel: audit: type=1400 audit(1707766863.629:1258): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.630000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.630000 audit: BPF prog-id=160 op=LOAD Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306238306137386534633731633430316435646232386664326230 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306238306137386534633731633430316435646232386664326230 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.634000 audit: BPF prog-id=161 op=LOAD Feb 12 19:41:03.634000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000212560 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.634000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306238306137386534633731633430316435646232386664326230 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.638000 audit: BPF prog-id=162 op=LOAD Feb 12 19:41:03.638000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002125a8 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.638000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306238306137386534633731633430316435646232386664326230 Feb 12 19:41:03.641000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:41:03.642000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { perfmon } for pid=3539 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit[3539]: AVC avc: denied { bpf } for pid=3539 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.642000 audit: BPF prog-id=163 op=LOAD Feb 12 19:41:03.642000 audit[3539]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002129b8 items=0 ppid=3528 pid=3539 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.642000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166306238306137386534633731633430316435646232386664326230 Feb 12 19:41:03.699093 env[1109]: time="2024-02-12T19:41:03.695448365Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-gslx9,Uid:9fd1ac7c-4f77-412b-a363-5595ee418155,Namespace:kube-system,Attempt:1,} returns sandbox id \"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47\"" Feb 12 19:41:03.700099 kubelet[2009]: E0212 19:41:03.699904 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:03.702823 systemd-networkd[1005]: califb3e9de9f30: Gained IPv6LL Feb 12 19:41:03.706874 env[1109]: time="2024-02-12T19:41:03.706817963Z" level=info msg="CreateContainer within sandbox \"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:41:03.735398 env[1109]: time="2024-02-12T19:41:03.731627590Z" level=info msg="CreateContainer within sandbox \"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"029170264f56fd574a214196e3b5ab883c517f9bc190f3575da34aeaec8847c1\"" Feb 12 19:41:03.739087 env[1109]: time="2024-02-12T19:41:03.739015367Z" level=info msg="StartContainer for \"029170264f56fd574a214196e3b5ab883c517f9bc190f3575da34aeaec8847c1\"" Feb 12 19:41:03.766402 systemd[1]: Started cri-containerd-029170264f56fd574a214196e3b5ab883c517f9bc190f3575da34aeaec8847c1.scope. Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.791000 audit: BPF prog-id=164 op=LOAD Feb 12 19:41:03.792000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.792000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3528 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.792000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032393137303236346635366664353734613231343139366533623561 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3528 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032393137303236346635366664353734613231343139366533623561 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit: BPF prog-id=165 op=LOAD Feb 12 19:41:03.793000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0001afdd0 items=0 ppid=3528 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032393137303236346635366664353734613231343139366533623561 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit: BPF prog-id=166 op=LOAD Feb 12 19:41:03.793000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0001afe18 items=0 ppid=3528 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032393137303236346635366664353734613231343139366533623561 Feb 12 19:41:03.793000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:41:03.793000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { perfmon } for pid=3569 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit[3569]: AVC avc: denied { bpf } for pid=3569 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:03.793000 audit: BPF prog-id=167 op=LOAD Feb 12 19:41:03.793000 audit[3569]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000242228 items=0 ppid=3528 pid=3569 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.793000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3032393137303236346635366664353734613231343139366533623561 Feb 12 19:41:03.822803 env[1109]: time="2024-02-12T19:41:03.822725038Z" level=info msg="StartContainer for \"029170264f56fd574a214196e3b5ab883c517f9bc190f3575da34aeaec8847c1\" returns successfully" Feb 12 19:41:04.185350 env[1109]: time="2024-02-12T19:41:04.185300225Z" level=info msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.276 [INFO][3611] k8s.go 578: Cleaning up netns ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.276 [INFO][3611] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" iface="eth0" netns="/var/run/netns/cni-5875f017-03f8-e660-13d2-56927aace377" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.276 [INFO][3611] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" iface="eth0" netns="/var/run/netns/cni-5875f017-03f8-e660-13d2-56927aace377" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.277 [INFO][3611] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" iface="eth0" netns="/var/run/netns/cni-5875f017-03f8-e660-13d2-56927aace377" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.277 [INFO][3611] k8s.go 585: Releasing IP address(es) ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.277 [INFO][3611] utils.go 188: Calico CNI releasing IP address ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.305 [INFO][3617] ipam_plugin.go 415: Releasing address using handleID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.305 [INFO][3617] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.305 [INFO][3617] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.317 [WARNING][3617] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.318 [INFO][3617] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.320 [INFO][3617] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:04.325660 env[1109]: 2024-02-12 19:41:04.323 [INFO][3611] k8s.go 591: Teardown processing complete. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:04.326915 env[1109]: time="2024-02-12T19:41:04.325855223Z" level=info msg="TearDown network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" successfully" Feb 12 19:41:04.326915 env[1109]: time="2024-02-12T19:41:04.325901352Z" level=info msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" returns successfully" Feb 12 19:41:04.327781 kubelet[2009]: E0212 19:41:04.327468 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:04.330764 env[1109]: time="2024-02-12T19:41:04.328280937Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-q92k9,Uid:c0f485f8-6be6-47fc-ac84-1f79b85db16a,Namespace:kube-system,Attempt:1,}" Feb 12 19:41:04.501258 kubelet[2009]: E0212 19:41:04.500374 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:04.521387 kubelet[2009]: I0212 19:41:04.521040 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-gslx9" podStartSLOduration=35.520959841 podCreationTimestamp="2024-02-12 19:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:04.518812048 +0000 UTC m=+47.503627795" watchObservedRunningTime="2024-02-12 19:41:04.520959841 +0000 UTC m=+47.505775589" Feb 12 19:41:04.582440 systemd[1]: run-netns-cni\x2d5875f017\x2d03f8\x2de660\x2d13d2\x2d56927aace377.mount: Deactivated successfully. Feb 12 19:41:04.581000 audit[3646]: NETFILTER_CFG table=filter:104 family=2 entries=14 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:04.581000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=4956 a0=3 a1=7ffe7460f050 a2=0 a3=7ffe7460f03c items=0 ppid=2166 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.581000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:04.595000 audit[3646]: NETFILTER_CFG table=nat:105 family=2 entries=14 op=nft_register_rule pid=3646 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:04.595000 audit[3646]: SYSCALL arch=c000003e syscall=46 success=yes exit=3300 a0=3 a1=7ffe7460f050 a2=0 a3=31030 items=0 ppid=2166 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.595000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:04.622773 systemd-networkd[1005]: calib044d7dce46: Link UP Feb 12 19:41:04.630720 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:04.630900 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib044d7dce46: link becomes ready Feb 12 19:41:04.625000 audit[3648]: NETFILTER_CFG table=filter:106 family=2 entries=11 op=nft_register_rule pid=3648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:04.625000 audit[3648]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffc13645f50 a2=0 a3=7ffc13645f3c items=0 ppid=2166 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.625000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:04.631335 systemd-networkd[1005]: calib044d7dce46: Gained carrier Feb 12 19:41:04.632000 audit[3648]: NETFILTER_CFG table=nat:107 family=2 entries=35 op=nft_register_chain pid=3648 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:04.632000 audit[3648]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffc13645f50 a2=0 a3=7ffc13645f3c items=0 ppid=2166 pid=3648 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.632000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.411 [INFO][3624] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0 coredns-5d78c9869d- kube-system c0f485f8-6be6-47fc-ac84-1f79b85db16a 772 0 2024-02-12 19:40:29 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 coredns-5d78c9869d-q92k9 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib044d7dce46 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.411 [INFO][3624] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.472 [INFO][3638] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" HandleID="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.492 [INFO][3638] ipam_plugin.go 268: Auto assigning IP ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" HandleID="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00027cff0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"coredns-5d78c9869d-q92k9", "timestamp":"2024-02-12 19:41:04.472442668 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.493 [INFO][3638] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.493 [INFO][3638] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.493 [INFO][3638] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.509 [INFO][3638] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.534 [INFO][3638] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.565 [INFO][3638] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.571 [INFO][3638] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.584 [INFO][3638] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.584 [INFO][3638] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.588 [INFO][3638] ipam.go 1682: Creating new handle: k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5 Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.602 [INFO][3638] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.614 [INFO][3638] ipam.go 1216: Successfully claimed IPs: [192.168.105.132/26] block=192.168.105.128/26 handle="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.614 [INFO][3638] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.132/26] handle="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.614 [INFO][3638] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:04.653865 env[1109]: 2024-02-12 19:41:04.614 [INFO][3638] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.132/26] IPv6=[] ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" HandleID="k8s-pod-network.035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.618 [INFO][3624] k8s.go 385: Populated endpoint ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c0f485f8-6be6-47fc-ac84-1f79b85db16a", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"coredns-5d78c9869d-q92k9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib044d7dce46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.618 [INFO][3624] k8s.go 386: Calico CNI using IPs: [192.168.105.132/32] ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.618 [INFO][3624] dataplane_linux.go 68: Setting the host side veth name to calib044d7dce46 ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.632 [INFO][3624] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.632 [INFO][3624] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c0f485f8-6be6-47fc-ac84-1f79b85db16a", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5", Pod:"coredns-5d78c9869d-q92k9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib044d7dce46", MAC:"ee:75:9f:72:f3:1d", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:04.655212 env[1109]: 2024-02-12 19:41:04.647 [INFO][3624] k8s.go 491: Wrote updated endpoint to datastore ContainerID="035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5" Namespace="kube-system" Pod="coredns-5d78c9869d-q92k9" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:04.686000 audit[3661]: NETFILTER_CFG table=filter:108 family=2 entries=38 op=nft_register_chain pid=3661 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:04.686000 audit[3661]: SYSCALL arch=c000003e syscall=46 success=yes exit=19088 a0=3 a1=7ffe42ec26c0 a2=0 a3=7ffe42ec26ac items=0 ppid=3087 pid=3661 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.686000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:04.694968 env[1109]: time="2024-02-12T19:41:04.694811098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:04.694968 env[1109]: time="2024-02-12T19:41:04.694860976Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:04.694968 env[1109]: time="2024-02-12T19:41:04.694872755Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:04.695732 env[1109]: time="2024-02-12T19:41:04.695622610Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5 pid=3668 runtime=io.containerd.runc.v2 Feb 12 19:41:04.731229 systemd[1]: Started cri-containerd-035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5.scope. Feb 12 19:41:04.750018 systemd[1]: run-containerd-runc-k8s.io-035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5-runc.Q1ju45.mount: Deactivated successfully. Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.774000 audit: BPF prog-id=168 op=LOAD Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033356639363130336136356635623332633530393764306331623932 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033356639363130336136356635623332633530393764306331623932 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.775000 audit: BPF prog-id=169 op=LOAD Feb 12 19:41:04.775000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00044b090 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.775000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033356639363130336136356635623332633530393764306331623932 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit: BPF prog-id=170 op=LOAD Feb 12 19:41:04.776000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00044b0d8 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033356639363130336136356635623332633530393764306331623932 Feb 12 19:41:04.776000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:41:04.776000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { perfmon } for pid=3679 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit[3679]: AVC avc: denied { bpf } for pid=3679 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.776000 audit: BPF prog-id=171 op=LOAD Feb 12 19:41:04.776000 audit[3679]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00044b4e8 items=0 ppid=3668 pid=3679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.776000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3033356639363130336136356635623332633530393764306331623932 Feb 12 19:41:04.828173 env[1109]: time="2024-02-12T19:41:04.828095637Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-q92k9,Uid:c0f485f8-6be6-47fc-ac84-1f79b85db16a,Namespace:kube-system,Attempt:1,} returns sandbox id \"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5\"" Feb 12 19:41:04.830119 kubelet[2009]: E0212 19:41:04.829616 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:04.833149 env[1109]: time="2024-02-12T19:41:04.833014605Z" level=info msg="CreateContainer within sandbox \"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:41:04.859245 systemd-networkd[1005]: cali35efbdd47d0: Gained IPv6LL Feb 12 19:41:04.874170 env[1109]: time="2024-02-12T19:41:04.874115059Z" level=info msg="CreateContainer within sandbox \"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"d28e7122831c1a90d52f37685b0e5ce9162ce7cd1561dd8c66794c38f667ba25\"" Feb 12 19:41:04.875160 env[1109]: time="2024-02-12T19:41:04.875124964Z" level=info msg="StartContainer for \"d28e7122831c1a90d52f37685b0e5ce9162ce7cd1561dd8c66794c38f667ba25\"" Feb 12 19:41:04.896127 systemd[1]: Started cri-containerd-d28e7122831c1a90d52f37685b0e5ce9162ce7cd1561dd8c66794c38f667ba25.scope. Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.916000 audit: BPF prog-id=172 op=LOAD Feb 12 19:41:04.917000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.917000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=3668 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432386537313232383331633161393064353266333736383562306535 Feb 12 19:41:04.917000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.917000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=3668 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.917000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432386537313232383331633161393064353266333736383562306535 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.918000 audit: BPF prog-id=173 op=LOAD Feb 12 19:41:04.918000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000218e60 items=0 ppid=3668 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.918000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432386537313232383331633161393064353266333736383562306535 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit: BPF prog-id=174 op=LOAD Feb 12 19:41:04.919000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000218ea8 items=0 ppid=3668 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432386537313232383331633161393064353266333736383562306535 Feb 12 19:41:04.919000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:41:04.919000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { perfmon } for pid=3710 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit[3710]: AVC avc: denied { bpf } for pid=3710 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:04.919000 audit: BPF prog-id=175 op=LOAD Feb 12 19:41:04.919000 audit[3710]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0002192b8 items=0 ppid=3668 pid=3710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.919000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6432386537313232383331633161393064353266333736383562306535 Feb 12 19:41:04.944855 env[1109]: time="2024-02-12T19:41:04.944783439Z" level=info msg="StartContainer for \"d28e7122831c1a90d52f37685b0e5ce9162ce7cd1561dd8c66794c38f667ba25\" returns successfully" Feb 12 19:41:05.505356 kubelet[2009]: E0212 19:41:05.504907 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:05.505356 kubelet[2009]: E0212 19:41:05.505137 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:05.550318 kubelet[2009]: I0212 19:41:05.550265 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-q92k9" podStartSLOduration=36.550196123 podCreationTimestamp="2024-02-12 19:40:29 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:41:05.543977796 +0000 UTC m=+48.528793551" watchObservedRunningTime="2024-02-12 19:41:05.550196123 +0000 UTC m=+48.535011883" Feb 12 19:41:05.580000 audit[3747]: NETFILTER_CFG table=filter:109 family=2 entries=8 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:05.580000 audit[3747]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffdf1099110 a2=0 a3=7ffdf10990fc items=0 ppid=2166 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:05.580000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:05.602000 audit[3747]: NETFILTER_CFG table=nat:110 family=2 entries=44 op=nft_register_rule pid=3747 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:05.602000 audit[3747]: SYSCALL arch=c000003e syscall=46 success=yes exit=13788 a0=3 a1=7ffdf1099110 a2=0 a3=7ffdf10990fc items=0 ppid=2166 pid=3747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:05.602000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:05.748343 systemd-networkd[1005]: calib044d7dce46: Gained IPv6LL Feb 12 19:41:06.510105 kubelet[2009]: E0212 19:41:06.507763 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:06.650000 audit[3749]: NETFILTER_CFG table=filter:111 family=2 entries=8 op=nft_register_rule pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.650000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7fff6445aa20 a2=0 a3=7fff6445aa0c items=0 ppid=2166 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.650000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.684000 audit[3749]: NETFILTER_CFG table=nat:112 family=2 entries=56 op=nft_register_chain pid=3749 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:06.684000 audit[3749]: SYSCALL arch=c000003e syscall=46 success=yes exit=19452 a0=3 a1=7fff6445aa20 a2=0 a3=7fff6445aa0c items=0 ppid=2166 pid=3749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:06.684000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:06.882474 env[1109]: time="2024-02-12T19:41:06.882284330Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:06.886105 env[1109]: time="2024-02-12T19:41:06.886020113Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:06.888891 env[1109]: time="2024-02-12T19:41:06.888834006Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:06.891612 env[1109]: time="2024-02-12T19:41:06.891481917Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:06.892693 env[1109]: time="2024-02-12T19:41:06.892623032Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:4e87edec0297dadd6f3bb25b2f540fd40e2abed9fff582c97ff4cd751d3f9803\"" Feb 12 19:41:06.895375 env[1109]: time="2024-02-12T19:41:06.895329169Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:41:06.914471 env[1109]: time="2024-02-12T19:41:06.914414088Z" level=info msg="CreateContainer within sandbox \"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:41:06.938251 env[1109]: time="2024-02-12T19:41:06.938181068Z" level=info msg="CreateContainer within sandbox \"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df\"" Feb 12 19:41:06.939405 env[1109]: time="2024-02-12T19:41:06.939358631Z" level=info msg="StartContainer for \"b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df\"" Feb 12 19:41:07.006153 systemd[1]: Started cri-containerd-b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df.scope. Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.047000 audit: BPF prog-id=176 op=LOAD Feb 12 19:41:07.048000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.048000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3364 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.048000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326563326666653837613539323363666238346334336538343831 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=3364 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326563326666653837613539323363666238346334336538343831 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.049000 audit: BPF prog-id=177 op=LOAD Feb 12 19:41:07.049000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0002e17a0 items=0 ppid=3364 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.049000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326563326666653837613539323363666238346334336538343831 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.050000 audit: BPF prog-id=178 op=LOAD Feb 12 19:41:07.050000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0002e17e8 items=0 ppid=3364 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.050000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326563326666653837613539323363666238346334336538343831 Feb 12 19:41:07.051000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:41:07.051000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { perfmon } for pid=3760 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit[3760]: AVC avc: denied { bpf } for pid=3760 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:07.051000 audit: BPF prog-id=179 op=LOAD Feb 12 19:41:07.051000 audit[3760]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0002e1bf8 items=0 ppid=3364 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:07.051000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6239326563326666653837613539323363666238346334336538343831 Feb 12 19:41:07.104129 env[1109]: time="2024-02-12T19:41:07.103436018Z" level=info msg="StartContainer for \"b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df\" returns successfully" Feb 12 19:41:07.512914 kubelet[2009]: E0212 19:41:07.512865 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:07.542015 kubelet[2009]: I0212 19:41:07.541943 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6ddbf76c88-fdgzv" podStartSLOduration=27.676612965 podCreationTimestamp="2024-02-12 19:40:35 +0000 UTC" firstStartedPulling="2024-02-12 19:41:02.028777956 +0000 UTC m=+45.013593693" lastFinishedPulling="2024-02-12 19:41:06.89403134 +0000 UTC m=+49.878847067" observedRunningTime="2024-02-12 19:41:07.539623781 +0000 UTC m=+50.524439539" watchObservedRunningTime="2024-02-12 19:41:07.541866339 +0000 UTC m=+50.526682102" Feb 12 19:41:08.515973 kubelet[2009]: E0212 19:41:08.515046 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:08.737334 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3687288342.mount: Deactivated successfully. Feb 12 19:41:09.422438 env[1109]: time="2024-02-12T19:41:09.422383721Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.425959 env[1109]: time="2024-02-12T19:41:09.425912604Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.428908 env[1109]: time="2024-02-12T19:41:09.428860586Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.444124 env[1109]: time="2024-02-12T19:41:09.444037399Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:09.444535 env[1109]: time="2024-02-12T19:41:09.444495384Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:91c1c91da7602f16686c149419195b486669f3a1828fd320cf332fdc6a25297d\"" Feb 12 19:41:09.453510 env[1109]: time="2024-02-12T19:41:09.453448759Z" level=info msg="CreateContainer within sandbox \"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:41:09.477859 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3354786752.mount: Deactivated successfully. Feb 12 19:41:09.482147 env[1109]: time="2024-02-12T19:41:09.482085406Z" level=info msg="CreateContainer within sandbox \"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"36ae662e83c85e05203218f84f988e25b2fe3542fa071da65f9e1322358255cc\"" Feb 12 19:41:09.483270 env[1109]: time="2024-02-12T19:41:09.483209977Z" level=info msg="StartContainer for \"36ae662e83c85e05203218f84f988e25b2fe3542fa071da65f9e1322358255cc\"" Feb 12 19:41:09.514427 systemd[1]: Started cri-containerd-36ae662e83c85e05203218f84f988e25b2fe3542fa071da65f9e1322358255cc.scope. Feb 12 19:41:09.567734 kernel: kauditd_printk_skb: 305 callbacks suppressed Feb 12 19:41:09.567956 kernel: audit: type=1400 audit(1707766869.562:1351): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3413 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.579227 kernel: audit: type=1300 audit(1707766869.562:1351): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3413 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.579315 kernel: audit: type=1327 audit(1707766869.562:1351): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616536363265383363383565303532303332313866383466393838 Feb 12 19:41:09.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616536363265383363383565303532303332313866383466393838 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.583174 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.590805 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.590928 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.596107 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.607101 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.613389 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.613562 kernel: audit: type=1400 audit(1707766869.562:1352): avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.562000 audit: BPF prog-id=180 op=LOAD Feb 12 19:41:09.562000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002ebc70 items=0 ppid=3413 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.562000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616536363265383363383565303532303332313866383466393838 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit: BPF prog-id=181 op=LOAD Feb 12 19:41:09.572000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002ebcb8 items=0 ppid=3413 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616536363265383363383565303532303332313866383466393838 Feb 12 19:41:09.572000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:41:09.572000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { perfmon } for pid=3817 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit[3817]: AVC avc: denied { bpf } for pid=3817 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:09.572000 audit: BPF prog-id=182 op=LOAD Feb 12 19:41:09.572000 audit[3817]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0002ebd48 items=0 ppid=3413 pid=3817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:09.572000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3336616536363265383363383565303532303332313866383466393838 Feb 12 19:41:09.625693 env[1109]: time="2024-02-12T19:41:09.625624501Z" level=info msg="StartContainer for \"36ae662e83c85e05203218f84f988e25b2fe3542fa071da65f9e1322358255cc\" returns successfully" Feb 12 19:41:09.627141 env[1109]: time="2024-02-12T19:41:09.627079949Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:41:10.477561 systemd[1]: run-containerd-runc-k8s.io-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3-runc.SJ9fPx.mount: Deactivated successfully. Feb 12 19:41:10.592208 kubelet[2009]: E0212 19:41:10.591632 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:11.134000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:11.134000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000b81060 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:11.134000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:11.134000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:11.134000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0012121e0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:11.134000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:11.522128 env[1109]: time="2024-02-12T19:41:11.522001629Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:11.525253 env[1109]: time="2024-02-12T19:41:11.525164038Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:11.528018 env[1109]: time="2024-02-12T19:41:11.527926135Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:11.530724 env[1109]: time="2024-02-12T19:41:11.530644696Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:11.531558 env[1109]: time="2024-02-12T19:41:11.531512813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:d36ef67f7b24c4facd86d0bc06b0cd907431a822dee695eb06b86a905bff85d4\"" Feb 12 19:41:11.536794 env[1109]: time="2024-02-12T19:41:11.536679022Z" level=info msg="CreateContainer within sandbox \"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:41:11.556028 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3602315279.mount: Deactivated successfully. Feb 12 19:41:11.562826 env[1109]: time="2024-02-12T19:41:11.562738480Z" level=info msg="CreateContainer within sandbox \"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"9b52f1915ee72f5be33b9fef1e7e81deb792c2f83df22f66b0c10fe8c49112b8\"" Feb 12 19:41:11.565651 env[1109]: time="2024-02-12T19:41:11.563811233Z" level=info msg="StartContainer for \"9b52f1915ee72f5be33b9fef1e7e81deb792c2f83df22f66b0c10fe8c49112b8\"" Feb 12 19:41:11.624023 systemd[1]: run-containerd-runc-k8s.io-9b52f1915ee72f5be33b9fef1e7e81deb792c2f83df22f66b0c10fe8c49112b8-runc.2BeWsK.mount: Deactivated successfully. Feb 12 19:41:11.638978 systemd[1]: Started cri-containerd-9b52f1915ee72f5be33b9fef1e7e81deb792c2f83df22f66b0c10fe8c49112b8.scope. Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=3413 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:11.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353266313931356565373266356265333362396665663165376538 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.668000 audit: BPF prog-id=183 op=LOAD Feb 12 19:41:11.668000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b67f0 items=0 ppid=3413 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:11.668000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353266313931356565373266356265333362396665663165376538 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit: BPF prog-id=184 op=LOAD Feb 12 19:41:11.669000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b6838 items=0 ppid=3413 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:11.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353266313931356565373266356265333362396665663165376538 Feb 12 19:41:11.669000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:41:11.669000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { perfmon } for pid=3882 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit[3882]: AVC avc: denied { bpf } for pid=3882 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:11.669000 audit: BPF prog-id=185 op=LOAD Feb 12 19:41:11.669000 audit[3882]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b68c8 items=0 ppid=3413 pid=3882 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:11.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3962353266313931356565373266356265333362396665663165376538 Feb 12 19:41:11.696497 env[1109]: time="2024-02-12T19:41:11.696417415Z" level=info msg="StartContainer for \"9b52f1915ee72f5be33b9fef1e7e81deb792c2f83df22f66b0c10fe8c49112b8\" returns successfully" Feb 12 19:41:12.311000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.311000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c004066330 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.311000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.311000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=69 a1=c0076a7820 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.311000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.312000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.312000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00d70e7b0 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.312000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.332000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.332000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c00d70f410 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.332000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.373000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.373000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c007b48620 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.373000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:12.373000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=68 a1=c0036dad50 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:41:12.373000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:41:12.380320 kubelet[2009]: I0212 19:41:12.380284 2009 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:41:12.381526 kubelet[2009]: I0212 19:41:12.381366 2009 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:41:14.814000 audit[3913]: NETFILTER_CFG table=filter:113 family=2 entries=9 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.819318 kernel: kauditd_printk_skb: 100 callbacks suppressed Feb 12 19:41:14.819449 kernel: audit: type=1325 audit(1707766874.814:1371): table=filter:113 family=2 entries=9 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.814000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd0cf08a70 a2=0 a3=7ffd0cf08a5c items=0 ppid=2166 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.830576 kernel: audit: type=1300 audit(1707766874.814:1371): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffd0cf08a70 a2=0 a3=7ffd0cf08a5c items=0 ppid=2166 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.814000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.818000 audit[3913]: NETFILTER_CFG table=nat:114 family=2 entries=20 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.838739 kernel: audit: type=1327 audit(1707766874.814:1371): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.838923 kernel: audit: type=1325 audit(1707766874.818:1372): table=nat:114 family=2 entries=20 op=nft_register_rule pid=3913 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.818000 audit[3913]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd0cf08a70 a2=0 a3=7ffd0cf08a5c items=0 ppid=2166 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.818000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.851240 kernel: audit: type=1300 audit(1707766874.818:1372): arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffd0cf08a70 a2=0 a3=7ffd0cf08a5c items=0 ppid=2166 pid=3913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.851459 kernel: audit: type=1327 audit(1707766874.818:1372): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.863346 kubelet[2009]: I0212 19:41:14.863302 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-xmcqd" podStartSLOduration=30.417688842 podCreationTimestamp="2024-02-12 19:40:35 +0000 UTC" firstStartedPulling="2024-02-12 19:41:02.086826553 +0000 UTC m=+45.071642311" lastFinishedPulling="2024-02-12 19:41:11.532390334 +0000 UTC m=+54.517206083" observedRunningTime="2024-02-12 19:41:12.577226536 +0000 UTC m=+55.562042292" watchObservedRunningTime="2024-02-12 19:41:14.863252614 +0000 UTC m=+57.848068367" Feb 12 19:41:14.865233 kubelet[2009]: I0212 19:41:14.865191 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:14.873301 systemd[1]: Created slice kubepods-besteffort-pod31ad1db8_a52f_4b7f_ae12_eb42c3657d7f.slice. Feb 12 19:41:14.877593 kubelet[2009]: I0212 19:41:14.877545 2009 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:41:14.884528 systemd[1]: Created slice kubepods-besteffort-pod2cc32cec_4856_4623_b15d_071fbb7b9f71.slice. Feb 12 19:41:14.897000 audit[3915]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.902088 kernel: audit: type=1325 audit(1707766874.897:1373): table=filter:115 family=2 entries=10 op=nft_register_rule pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.897000 audit[3915]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffec4e8fd0 a2=0 a3=7fffec4e8fbc items=0 ppid=2166 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.897000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.914933 kernel: audit: type=1300 audit(1707766874.897:1373): arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7fffec4e8fd0 a2=0 a3=7fffec4e8fbc items=0 ppid=2166 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.915510 kernel: audit: type=1327 audit(1707766874.897:1373): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.917000 audit[3915]: NETFILTER_CFG table=nat:116 family=2 entries=20 op=nft_register_rule pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.917000 audit[3915]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7fffec4e8fd0 a2=0 a3=7fffec4e8fbc items=0 ppid=2166 pid=3915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:14.924152 kernel: audit: type=1325 audit(1707766874.917:1374): table=nat:116 family=2 entries=20 op=nft_register_rule pid=3915 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:14.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:14.964367 kubelet[2009]: I0212 19:41:14.964316 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-k6gp9\" (UniqueName: \"kubernetes.io/projected/2cc32cec-4856-4623-b15d-071fbb7b9f71-kube-api-access-k6gp9\") pod \"calico-apiserver-6dfc86cf8c-fwz69\" (UID: \"2cc32cec-4856-4623-b15d-071fbb7b9f71\") " pod="calico-apiserver/calico-apiserver-6dfc86cf8c-fwz69" Feb 12 19:41:14.965094 kubelet[2009]: I0212 19:41:14.965037 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/31ad1db8-a52f-4b7f-ae12-eb42c3657d7f-calico-apiserver-certs\") pod \"calico-apiserver-6dfc86cf8c-bzqlt\" (UID: \"31ad1db8-a52f-4b7f-ae12-eb42c3657d7f\") " pod="calico-apiserver/calico-apiserver-6dfc86cf8c-bzqlt" Feb 12 19:41:14.965374 kubelet[2009]: I0212 19:41:14.965338 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jkb27\" (UniqueName: \"kubernetes.io/projected/31ad1db8-a52f-4b7f-ae12-eb42c3657d7f-kube-api-access-jkb27\") pod \"calico-apiserver-6dfc86cf8c-bzqlt\" (UID: \"31ad1db8-a52f-4b7f-ae12-eb42c3657d7f\") " pod="calico-apiserver/calico-apiserver-6dfc86cf8c-bzqlt" Feb 12 19:41:14.965567 kubelet[2009]: I0212 19:41:14.965550 2009 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/2cc32cec-4856-4623-b15d-071fbb7b9f71-calico-apiserver-certs\") pod \"calico-apiserver-6dfc86cf8c-fwz69\" (UID: \"2cc32cec-4856-4623-b15d-071fbb7b9f71\") " pod="calico-apiserver/calico-apiserver-6dfc86cf8c-fwz69" Feb 12 19:41:15.067343 kubelet[2009]: E0212 19:41:15.067224 2009 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:41:15.069631 kubelet[2009]: E0212 19:41:15.067846 2009 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:41:15.072374 kubelet[2009]: E0212 19:41:15.069946 2009 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/31ad1db8-a52f-4b7f-ae12-eb42c3657d7f-calico-apiserver-certs podName:31ad1db8-a52f-4b7f-ae12-eb42c3657d7f nodeName:}" failed. No retries permitted until 2024-02-12 19:41:15.56772669 +0000 UTC m=+58.552542443 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/31ad1db8-a52f-4b7f-ae12-eb42c3657d7f-calico-apiserver-certs") pod "calico-apiserver-6dfc86cf8c-bzqlt" (UID: "31ad1db8-a52f-4b7f-ae12-eb42c3657d7f") : secret "calico-apiserver-certs" not found Feb 12 19:41:15.073790 kubelet[2009]: E0212 19:41:15.073731 2009 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/2cc32cec-4856-4623-b15d-071fbb7b9f71-calico-apiserver-certs podName:2cc32cec-4856-4623-b15d-071fbb7b9f71 nodeName:}" failed. No retries permitted until 2024-02-12 19:41:15.572965452 +0000 UTC m=+58.557781200 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/2cc32cec-4856-4623-b15d-071fbb7b9f71-calico-apiserver-certs") pod "calico-apiserver-6dfc86cf8c-fwz69" (UID: "2cc32cec-4856-4623-b15d-071fbb7b9f71") : secret "calico-apiserver-certs" not found Feb 12 19:41:15.778302 env[1109]: time="2024-02-12T19:41:15.778231180Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dfc86cf8c-bzqlt,Uid:31ad1db8-a52f-4b7f-ae12-eb42c3657d7f,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:41:15.790858 env[1109]: time="2024-02-12T19:41:15.790479340Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dfc86cf8c-fwz69,Uid:2cc32cec-4856-4623-b15d-071fbb7b9f71,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:41:16.097804 systemd-networkd[1005]: calif26fdc6e6b7: Link UP Feb 12 19:41:16.108183 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:41:16.108352 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif26fdc6e6b7: link becomes ready Feb 12 19:41:16.103411 systemd-networkd[1005]: calif26fdc6e6b7: Gained carrier Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:15.916 [INFO][3920] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0 calico-apiserver-6dfc86cf8c- calico-apiserver 31ad1db8-a52f-4b7f-ae12-eb42c3657d7f 891 0 2024-02-12 19:41:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dfc86cf8c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 calico-apiserver-6dfc86cf8c-bzqlt eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif26fdc6e6b7 [] []}} ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:15.917 [INFO][3920] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:15.990 [INFO][3942] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" HandleID="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.011 [INFO][3942] ipam_plugin.go 268: Auto assigning IP ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" HandleID="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc00023c840), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"calico-apiserver-6dfc86cf8c-bzqlt", "timestamp":"2024-02-12 19:41:15.990332493 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.012 [INFO][3942] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.012 [INFO][3942] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.012 [INFO][3942] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.016 [INFO][3942] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.030 [INFO][3942] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.043 [INFO][3942] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.047 [INFO][3942] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.052 [INFO][3942] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.052 [INFO][3942] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.057 [INFO][3942] ipam.go 1682: Creating new handle: k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050 Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.065 [INFO][3942] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.089 [INFO][3942] ipam.go 1216: Successfully claimed IPs: [192.168.105.133/26] block=192.168.105.128/26 handle="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.089 [INFO][3942] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.133/26] handle="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.089 [INFO][3942] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:16.159403 env[1109]: 2024-02-12 19:41:16.090 [INFO][3942] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.133/26] IPv6=[] ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" HandleID="k8s-pod-network.56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.092 [INFO][3920] k8s.go 385: Populated endpoint ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0", GenerateName:"calico-apiserver-6dfc86cf8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"31ad1db8-a52f-4b7f-ae12-eb42c3657d7f", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dfc86cf8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"calico-apiserver-6dfc86cf8c-bzqlt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif26fdc6e6b7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.093 [INFO][3920] k8s.go 386: Calico CNI using IPs: [192.168.105.133/32] ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.093 [INFO][3920] dataplane_linux.go 68: Setting the host side veth name to calif26fdc6e6b7 ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.109 [INFO][3920] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.113 [INFO][3920] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0", GenerateName:"calico-apiserver-6dfc86cf8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"31ad1db8-a52f-4b7f-ae12-eb42c3657d7f", ResourceVersion:"891", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dfc86cf8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050", Pod:"calico-apiserver-6dfc86cf8c-bzqlt", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif26fdc6e6b7", MAC:"ee:e4:b8:c5:9b:b7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:16.163939 env[1109]: 2024-02-12 19:41:16.155 [INFO][3920] k8s.go 491: Wrote updated endpoint to datastore ContainerID="56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-bzqlt" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--bzqlt-eth0" Feb 12 19:41:16.217217 env[1109]: time="2024-02-12T19:41:16.211364946Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:16.217217 env[1109]: time="2024-02-12T19:41:16.211456778Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:16.217217 env[1109]: time="2024-02-12T19:41:16.211611606Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:16.217217 env[1109]: time="2024-02-12T19:41:16.212108068Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050 pid=3981 runtime=io.containerd.runc.v2 Feb 12 19:41:16.227575 systemd-networkd[1005]: calia1da0eeb54b: Link UP Feb 12 19:41:16.232157 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia1da0eeb54b: link becomes ready Feb 12 19:41:16.232456 systemd-networkd[1005]: calia1da0eeb54b: Gained carrier Feb 12 19:41:16.278958 systemd[1]: run-containerd-runc-k8s.io-56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050-runc.gEgn4x.mount: Deactivated successfully. Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:15.948 [INFO][3930] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0 calico-apiserver-6dfc86cf8c- calico-apiserver 2cc32cec-4856-4623-b15d-071fbb7b9f71 893 0 2024-02-12 19:41:14 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6dfc86cf8c projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-f-2b8c436d32 calico-apiserver-6dfc86cf8c-fwz69 eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia1da0eeb54b [] []}} ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:15.948 [INFO][3930] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.050 [INFO][3949] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" HandleID="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.080 [INFO][3949] ipam_plugin.go 268: Auto assigning IP ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" HandleID="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291480), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-f-2b8c436d32", "pod":"calico-apiserver-6dfc86cf8c-fwz69", "timestamp":"2024-02-12 19:41:16.050763625 +0000 UTC"}, Hostname:"ci-3510.3.2-f-2b8c436d32", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.080 [INFO][3949] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.089 [INFO][3949] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.089 [INFO][3949] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-f-2b8c436d32' Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.113 [INFO][3949] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.147 [INFO][3949] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.165 [INFO][3949] ipam.go 489: Trying affinity for 192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.170 [INFO][3949] ipam.go 155: Attempting to load block cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.177 [INFO][3949] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.105.128/26 host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.177 [INFO][3949] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.105.128/26 handle="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.182 [INFO][3949] ipam.go 1682: Creating new handle: k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.189 [INFO][3949] ipam.go 1203: Writing block in order to claim IPs block=192.168.105.128/26 handle="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.199 [INFO][3949] ipam.go 1216: Successfully claimed IPs: [192.168.105.134/26] block=192.168.105.128/26 handle="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.199 [INFO][3949] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.105.134/26] handle="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" host="ci-3510.3.2-f-2b8c436d32" Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.199 [INFO][3949] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:16.286639 env[1109]: 2024-02-12 19:41:16.199 [INFO][3949] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.105.134/26] IPv6=[] ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" HandleID="k8s-pod-network.be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.202 [INFO][3930] k8s.go 385: Populated endpoint ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0", GenerateName:"calico-apiserver-6dfc86cf8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"2cc32cec-4856-4623-b15d-071fbb7b9f71", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dfc86cf8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"", Pod:"calico-apiserver-6dfc86cf8c-fwz69", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia1da0eeb54b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.202 [INFO][3930] k8s.go 386: Calico CNI using IPs: [192.168.105.134/32] ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.202 [INFO][3930] dataplane_linux.go 68: Setting the host side veth name to calia1da0eeb54b ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.229 [INFO][3930] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.236 [INFO][3930] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0", GenerateName:"calico-apiserver-6dfc86cf8c-", Namespace:"calico-apiserver", SelfLink:"", UID:"2cc32cec-4856-4623-b15d-071fbb7b9f71", ResourceVersion:"893", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 41, 14, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6dfc86cf8c", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e", Pod:"calico-apiserver-6dfc86cf8c-fwz69", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.105.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia1da0eeb54b", MAC:"5e:78:3e:16:41:6d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:16.288734 env[1109]: 2024-02-12 19:41:16.261 [INFO][3930] k8s.go 491: Wrote updated endpoint to datastore ContainerID="be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e" Namespace="calico-apiserver" Pod="calico-apiserver-6dfc86cf8c-fwz69" WorkloadEndpoint="ci--3510.3.2--f--2b8c436d32-k8s-calico--apiserver--6dfc86cf8c--fwz69-eth0" Feb 12 19:41:16.290436 systemd[1]: Started cri-containerd-56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050.scope. Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.323000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.323000 audit: BPF prog-id=186 op=LOAD Feb 12 19:41:16.324000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.324000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3981 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.324000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536613264623839613038373034356134353466313734363438373761 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3981 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536613264623839613038373034356134353466313734363438373761 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.325000 audit: BPF prog-id=187 op=LOAD Feb 12 19:41:16.325000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001d23c0 items=0 ppid=3981 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.325000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536613264623839613038373034356134353466313734363438373761 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.326000 audit: BPF prog-id=188 op=LOAD Feb 12 19:41:16.326000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001d2408 items=0 ppid=3981 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536613264623839613038373034356134353466313734363438373761 Feb 12 19:41:16.328000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:41:16.328000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { perfmon } for pid=3995 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit[3995]: AVC avc: denied { bpf } for pid=3995 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.328000 audit: BPF prog-id=189 op=LOAD Feb 12 19:41:16.328000 audit[3995]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001d2818 items=0 ppid=3981 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3536613264623839613038373034356134353466313734363438373761 Feb 12 19:41:16.332634 env[1109]: time="2024-02-12T19:41:16.331711157Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:41:16.332634 env[1109]: time="2024-02-12T19:41:16.331772752Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:41:16.332634 env[1109]: time="2024-02-12T19:41:16.331790583Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:41:16.332634 env[1109]: time="2024-02-12T19:41:16.332042734Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e pid=4025 runtime=io.containerd.runc.v2 Feb 12 19:41:16.373687 systemd[1]: Started cri-containerd-be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e.scope. Feb 12 19:41:16.427283 env[1109]: time="2024-02-12T19:41:16.427219420Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dfc86cf8c-bzqlt,Uid:31ad1db8-a52f-4b7f-ae12-eb42c3657d7f,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050\"" Feb 12 19:41:16.430995 env[1109]: time="2024-02-12T19:41:16.430868159Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:41:16.444000 audit[4056]: NETFILTER_CFG table=filter:117 family=2 entries=65 op=nft_register_chain pid=4056 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:16.444000 audit[4056]: SYSCALL arch=c000003e syscall=46 success=yes exit=32144 a0=3 a1=7ffe55df1d40 a2=0 a3=7ffe55df1d2c items=0 ppid=3087 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.444000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.458000 audit: BPF prog-id=190 op=LOAD Feb 12 19:41:16.460000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.460000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4025 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363736663334656339343536656461336137643463636665353330 Feb 12 19:41:16.460000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.460000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=c items=0 ppid=4025 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.460000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363736663334656339343536656461336137643463636665353330 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.461000 audit: BPF prog-id=191 op=LOAD Feb 12 19:41:16.461000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000328520 items=0 ppid=4025 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363736663334656339343536656461336137643463636665353330 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.462000 audit: BPF prog-id=192 op=LOAD Feb 12 19:41:16.462000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000328568 items=0 ppid=4025 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363736663334656339343536656461336137643463636665353330 Feb 12 19:41:16.464000 audit: BPF prog-id=192 op=UNLOAD Feb 12 19:41:16.465000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { perfmon } for pid=4036 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit[4036]: AVC avc: denied { bpf } for pid=4036 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:16.465000 audit: BPF prog-id=193 op=LOAD Feb 12 19:41:16.465000 audit[4036]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c000328978 items=0 ppid=4025 pid=4036 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265363736663334656339343536656461336137643463636665353330 Feb 12 19:41:16.497000 audit[4064]: NETFILTER_CFG table=filter:118 family=2 entries=52 op=nft_register_chain pid=4064 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:41:16.497000 audit[4064]: SYSCALL arch=c000003e syscall=46 success=yes exit=26144 a0=3 a1=7ffc1a0441a0 a2=0 a3=7ffc1a04418c items=0 ppid=3087 pid=4064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:16.497000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:41:16.543252 env[1109]: time="2024-02-12T19:41:16.543186411Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6dfc86cf8c-fwz69,Uid:2cc32cec-4856-4623-b15d-071fbb7b9f71,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e\"" Feb 12 19:41:16.827711 systemd[1]: Started sshd@14-164.90.149.146:22-119.202.128.28:37666.service. Feb 12 19:41:16.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.90.149.146:22-119.202.128.28:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:17.187762 env[1109]: time="2024-02-12T19:41:17.187689771Z" level=info msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.267 [WARNING][4090] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c0f485f8-6be6-47fc-ac84-1f79b85db16a", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5", Pod:"coredns-5d78c9869d-q92k9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib044d7dce46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.267 [INFO][4090] k8s.go 578: Cleaning up netns ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.267 [INFO][4090] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" iface="eth0" netns="" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.267 [INFO][4090] k8s.go 585: Releasing IP address(es) ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.267 [INFO][4090] utils.go 188: Calico CNI releasing IP address ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.307 [INFO][4096] ipam_plugin.go 415: Releasing address using handleID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.307 [INFO][4096] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.307 [INFO][4096] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.328 [WARNING][4096] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.328 [INFO][4096] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.331 [INFO][4096] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.336662 env[1109]: 2024-02-12 19:41:17.334 [INFO][4090] k8s.go 591: Teardown processing complete. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.337403 env[1109]: time="2024-02-12T19:41:17.337348194Z" level=info msg="TearDown network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" successfully" Feb 12 19:41:17.337455 env[1109]: time="2024-02-12T19:41:17.337404240Z" level=info msg="StopPodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" returns successfully" Feb 12 19:41:17.338429 env[1109]: time="2024-02-12T19:41:17.338341350Z" level=info msg="RemovePodSandbox for \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" Feb 12 19:41:17.338577 env[1109]: time="2024-02-12T19:41:17.338435178Z" level=info msg="Forcibly stopping sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\"" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.408 [WARNING][4114] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"c0f485f8-6be6-47fc-ac84-1f79b85db16a", ResourceVersion:"800", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"035f96103a65f5b32c5097d0c1b9276d18990e2d01190f9b8a6bac99be62ddd5", Pod:"coredns-5d78c9869d-q92k9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib044d7dce46", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.408 [INFO][4114] k8s.go 578: Cleaning up netns ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.408 [INFO][4114] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" iface="eth0" netns="" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.408 [INFO][4114] k8s.go 585: Releasing IP address(es) ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.408 [INFO][4114] utils.go 188: Calico CNI releasing IP address ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.452 [INFO][4120] ipam_plugin.go 415: Releasing address using handleID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.452 [INFO][4120] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.452 [INFO][4120] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.463 [WARNING][4120] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.463 [INFO][4120] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" HandleID="k8s-pod-network.e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--q92k9-eth0" Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.466 [INFO][4120] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.472682 env[1109]: 2024-02-12 19:41:17.469 [INFO][4114] k8s.go 591: Teardown processing complete. ContainerID="e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598" Feb 12 19:41:17.472682 env[1109]: time="2024-02-12T19:41:17.471883463Z" level=info msg="TearDown network for sandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" successfully" Feb 12 19:41:17.479438 env[1109]: time="2024-02-12T19:41:17.479309233Z" level=info msg="RemovePodSandbox \"e226352781a9836d7c686526be5ef80905249784da7aa6857804772caf473598\" returns successfully" Feb 12 19:41:17.481016 env[1109]: time="2024-02-12T19:41:17.480959257Z" level=info msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" Feb 12 19:41:17.524498 systemd-networkd[1005]: calif26fdc6e6b7: Gained IPv6LL Feb 12 19:41:17.589468 systemd-networkd[1005]: calia1da0eeb54b: Gained IPv6LL Feb 12 19:41:17.593201 sshd[4072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.128.28 user=root Feb 12 19:41:17.592000 audit[4072]: USER_AUTH pid=4072 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.202.128.28 addr=119.202.128.28 terminal=ssh res=failed' Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.569 [WARNING][4140] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"508a2b03-867c-4864-94af-91620ebe7ae2", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546", Pod:"csi-node-driver-xmcqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4326b3e3c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.570 [INFO][4140] k8s.go 578: Cleaning up netns ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.570 [INFO][4140] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" iface="eth0" netns="" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.570 [INFO][4140] k8s.go 585: Releasing IP address(es) ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.570 [INFO][4140] utils.go 188: Calico CNI releasing IP address ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.614 [INFO][4146] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.614 [INFO][4146] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.614 [INFO][4146] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.634 [WARNING][4146] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.635 [INFO][4146] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.650 [INFO][4146] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.667024 env[1109]: 2024-02-12 19:41:17.659 [INFO][4140] k8s.go 591: Teardown processing complete. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.668190 env[1109]: time="2024-02-12T19:41:17.667995467Z" level=info msg="TearDown network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" successfully" Feb 12 19:41:17.668417 env[1109]: time="2024-02-12T19:41:17.668387190Z" level=info msg="StopPodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" returns successfully" Feb 12 19:41:17.670789 env[1109]: time="2024-02-12T19:41:17.670741425Z" level=info msg="RemovePodSandbox for \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" Feb 12 19:41:17.671153 env[1109]: time="2024-02-12T19:41:17.670972870Z" level=info msg="Forcibly stopping sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\"" Feb 12 19:41:17.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.90.149.146:22-104.248.54.24:47184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:17.759501 systemd[1]: Started sshd@15-164.90.149.146:22-104.248.54.24:47184.service. Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.739 [WARNING][4164] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"508a2b03-867c-4864-94af-91620ebe7ae2", ResourceVersion:"844", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"bc02e9d703002f209fc60572f8321cee752205cf0475a66719021d9d12bf2546", Pod:"csi-node-driver-xmcqd", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.105.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calia4326b3e3c8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.739 [INFO][4164] k8s.go 578: Cleaning up netns ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.739 [INFO][4164] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" iface="eth0" netns="" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.740 [INFO][4164] k8s.go 585: Releasing IP address(es) ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.740 [INFO][4164] utils.go 188: Calico CNI releasing IP address ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.796 [INFO][4170] ipam_plugin.go 415: Releasing address using handleID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.797 [INFO][4170] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.797 [INFO][4170] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.808 [WARNING][4170] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.808 [INFO][4170] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" HandleID="k8s-pod-network.e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Workload="ci--3510.3.2--f--2b8c436d32-k8s-csi--node--driver--xmcqd-eth0" Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.811 [INFO][4170] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.816315 env[1109]: 2024-02-12 19:41:17.814 [INFO][4164] k8s.go 591: Teardown processing complete. ContainerID="e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4" Feb 12 19:41:17.817468 env[1109]: time="2024-02-12T19:41:17.817409736Z" level=info msg="TearDown network for sandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" successfully" Feb 12 19:41:17.822870 env[1109]: time="2024-02-12T19:41:17.822771202Z" level=info msg="RemovePodSandbox \"e8aea1b781da8362c511d6204d4d02ef69a36d2a9d216a10555275c93aece3d4\" returns successfully" Feb 12 19:41:17.824035 env[1109]: time="2024-02-12T19:41:17.823991977Z" level=info msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.886 [WARNING][4192] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0", GenerateName:"calico-kube-controllers-6ddbf76c88-", Namespace:"calico-system", SelfLink:"", UID:"d3faba48-7aa5-436b-9796-d5066850f4b6", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6ddbf76c88", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd", Pod:"calico-kube-controllers-6ddbf76c88-fdgzv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califb3e9de9f30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.886 [INFO][4192] k8s.go 578: Cleaning up netns ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.886 [INFO][4192] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" iface="eth0" netns="" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.887 [INFO][4192] k8s.go 585: Releasing IP address(es) ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.887 [INFO][4192] utils.go 188: Calico CNI releasing IP address ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.916 [INFO][4198] ipam_plugin.go 415: Releasing address using handleID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.916 [INFO][4198] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.916 [INFO][4198] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.928 [WARNING][4198] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.928 [INFO][4198] ipam_plugin.go 443: Releasing address using workloadID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.932 [INFO][4198] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:17.936446 env[1109]: 2024-02-12 19:41:17.934 [INFO][4192] k8s.go 591: Teardown processing complete. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:17.937301 env[1109]: time="2024-02-12T19:41:17.937202646Z" level=info msg="TearDown network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" successfully" Feb 12 19:41:17.937301 env[1109]: time="2024-02-12T19:41:17.937260066Z" level=info msg="StopPodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" returns successfully" Feb 12 19:41:17.938047 env[1109]: time="2024-02-12T19:41:17.937990132Z" level=info msg="RemovePodSandbox for \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" Feb 12 19:41:17.938368 env[1109]: time="2024-02-12T19:41:17.938279947Z" level=info msg="Forcibly stopping sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\"" Feb 12 19:41:18.043828 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3658652261.mount: Deactivated successfully. Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.049 [WARNING][4216] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0", GenerateName:"calico-kube-controllers-6ddbf76c88-", Namespace:"calico-system", SelfLink:"", UID:"d3faba48-7aa5-436b-9796-d5066850f4b6", ResourceVersion:"814", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6ddbf76c88", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"e2355502e0c44465afcabd821c9303f8ac9b4fdaf1e0ff784280c4a4a7da33dd", Pod:"calico-kube-controllers-6ddbf76c88-fdgzv", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.105.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"califb3e9de9f30", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.049 [INFO][4216] k8s.go 578: Cleaning up netns ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.049 [INFO][4216] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" iface="eth0" netns="" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.049 [INFO][4216] k8s.go 585: Releasing IP address(es) ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.050 [INFO][4216] utils.go 188: Calico CNI releasing IP address ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.095 [INFO][4222] ipam_plugin.go 415: Releasing address using handleID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.095 [INFO][4222] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.095 [INFO][4222] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.109 [WARNING][4222] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.109 [INFO][4222] ipam_plugin.go 443: Releasing address using workloadID ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" HandleID="k8s-pod-network.011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Workload="ci--3510.3.2--f--2b8c436d32-k8s-calico--kube--controllers--6ddbf76c88--fdgzv-eth0" Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.113 [INFO][4222] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:18.118503 env[1109]: 2024-02-12 19:41:18.115 [INFO][4216] k8s.go 591: Teardown processing complete. ContainerID="011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b" Feb 12 19:41:18.119358 env[1109]: time="2024-02-12T19:41:18.118546976Z" level=info msg="TearDown network for sandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" successfully" Feb 12 19:41:18.123701 env[1109]: time="2024-02-12T19:41:18.123618228Z" level=info msg="RemovePodSandbox \"011a1bfc8a17a03bc34f5b05e8d4f2ca4c1664021e92028a24200fc1fb61c03b\" returns successfully" Feb 12 19:41:18.124447 env[1109]: time="2024-02-12T19:41:18.124412947Z" level=info msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.176 [WARNING][4241] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9fd1ac7c-4f77-412b-a363-5595ee418155", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47", Pod:"coredns-5d78c9869d-gslx9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35efbdd47d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.177 [INFO][4241] k8s.go 578: Cleaning up netns ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.177 [INFO][4241] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" iface="eth0" netns="" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.177 [INFO][4241] k8s.go 585: Releasing IP address(es) ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.177 [INFO][4241] utils.go 188: Calico CNI releasing IP address ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.212 [INFO][4249] ipam_plugin.go 415: Releasing address using handleID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.212 [INFO][4249] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.212 [INFO][4249] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.223 [WARNING][4249] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.224 [INFO][4249] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.229 [INFO][4249] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:18.234109 env[1109]: 2024-02-12 19:41:18.232 [INFO][4241] k8s.go 591: Teardown processing complete. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.235100 env[1109]: time="2024-02-12T19:41:18.234135419Z" level=info msg="TearDown network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" successfully" Feb 12 19:41:18.235100 env[1109]: time="2024-02-12T19:41:18.234169058Z" level=info msg="StopPodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" returns successfully" Feb 12 19:41:18.235100 env[1109]: time="2024-02-12T19:41:18.234866648Z" level=info msg="RemovePodSandbox for \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" Feb 12 19:41:18.235100 env[1109]: time="2024-02-12T19:41:18.234907030Z" level=info msg="Forcibly stopping sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\"" Feb 12 19:41:18.251105 sshd[4175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.54.24 user=root Feb 12 19:41:18.250000 audit[4175]: USER_AUTH pid=4175 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.248.54.24 addr=104.248.54.24 terminal=ssh res=failed' Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.315 [WARNING][4268] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"9fd1ac7c-4f77-412b-a363-5595ee418155", ResourceVersion:"778", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 40, 29, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-f-2b8c436d32", ContainerID:"1f0b80a78e4c71c401d5db28fd2b089ec63cc4c98660a9f3ecd34181a22bfe47", Pod:"coredns-5d78c9869d-gslx9", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.105.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali35efbdd47d0", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.316 [INFO][4268] k8s.go 578: Cleaning up netns ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.317 [INFO][4268] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" iface="eth0" netns="" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.318 [INFO][4268] k8s.go 585: Releasing IP address(es) ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.318 [INFO][4268] utils.go 188: Calico CNI releasing IP address ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.365 [INFO][4274] ipam_plugin.go 415: Releasing address using handleID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.365 [INFO][4274] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.365 [INFO][4274] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.383 [WARNING][4274] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.383 [INFO][4274] ipam_plugin.go 443: Releasing address using workloadID ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" HandleID="k8s-pod-network.c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Workload="ci--3510.3.2--f--2b8c436d32-k8s-coredns--5d78c9869d--gslx9-eth0" Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.387 [INFO][4274] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:41:18.393903 env[1109]: 2024-02-12 19:41:18.390 [INFO][4268] k8s.go 591: Teardown processing complete. ContainerID="c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613" Feb 12 19:41:18.393903 env[1109]: time="2024-02-12T19:41:18.392228267Z" level=info msg="TearDown network for sandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" successfully" Feb 12 19:41:18.396878 env[1109]: time="2024-02-12T19:41:18.396241900Z" level=info msg="RemovePodSandbox \"c0286b9e3065c76d466182c58ec437c9a729a90998ecf7cf97498b6ce234f613\" returns successfully" Feb 12 19:41:18.673604 systemd[1]: run-containerd-runc-k8s.io-b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df-runc.kfESED.mount: Deactivated successfully. Feb 12 19:41:19.524840 sshd[4072]: Failed password for root from 119.202.128.28 port 37666 ssh2 Feb 12 19:41:19.666494 sshd[4072]: Received disconnect from 119.202.128.28 port 37666:11: Bye Bye [preauth] Feb 12 19:41:19.666494 sshd[4072]: Disconnected from authenticating user root 119.202.128.28 port 37666 [preauth] Feb 12 19:41:19.667000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-164.90.149.146:22-119.202.128.28:37666 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:19.668189 systemd[1]: sshd@14-164.90.149.146:22-119.202.128.28:37666.service: Deactivated successfully. Feb 12 19:41:20.654957 sshd[4175]: Failed password for root from 104.248.54.24 port 47184 ssh2 Feb 12 19:41:20.985772 env[1109]: time="2024-02-12T19:41:20.985586949Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.989031 env[1109]: time="2024-02-12T19:41:20.988965609Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.992746 env[1109]: time="2024-02-12T19:41:20.992567820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.995172 env[1109]: time="2024-02-12T19:41:20.995109066Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:20.997512 env[1109]: time="2024-02-12T19:41:20.997433345Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:41:21.001553 env[1109]: time="2024-02-12T19:41:21.001491362Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:41:21.004930 env[1109]: time="2024-02-12T19:41:21.004568358Z" level=info msg="CreateContainer within sandbox \"56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:41:21.020479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2504293029.mount: Deactivated successfully. Feb 12 19:41:21.042044 env[1109]: time="2024-02-12T19:41:21.041937591Z" level=info msg="CreateContainer within sandbox \"56a2db89a087045a454f17464877a87d96c32f10e08f2c2f52e4c83ea6bc5050\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d\"" Feb 12 19:41:21.043310 env[1109]: time="2024-02-12T19:41:21.043265917Z" level=info msg="StartContainer for \"f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d\"" Feb 12 19:41:21.091711 systemd[1]: run-containerd-runc-k8s.io-f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d-runc.JVZFVd.mount: Deactivated successfully. Feb 12 19:41:21.097210 systemd[1]: Started cri-containerd-f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d.scope. Feb 12 19:41:21.134255 kernel: kauditd_printk_skb: 127 callbacks suppressed Feb 12 19:41:21.134519 kernel: audit: type=1400 audit(1707766881.127:1418): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.140352 kernel: audit: type=1400 audit(1707766881.127:1419): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.145298 kernel: audit: type=1400 audit(1707766881.127:1420): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.153811 kernel: audit: type=1400 audit(1707766881.127:1421): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.153997 kernel: audit: type=1400 audit(1707766881.127:1422): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.173087 kernel: audit: type=1400 audit(1707766881.127:1423): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.173277 kernel: audit: type=1400 audit(1707766881.127:1424): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.173317 kernel: audit: type=1400 audit(1707766881.127:1425): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.173350 kernel: audit: type=1400 audit(1707766881.127:1426): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.133000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.179160 kernel: audit: type=1400 audit(1707766881.133:1427): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.133000 audit: BPF prog-id=194 op=LOAD Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=3981 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393665653364303965313239613266376461303732373062343663 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=3981 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393665653364303965313239613266376461303732373062343663 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.134000 audit: BPF prog-id=195 op=LOAD Feb 12 19:41:21.134000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ce110 items=0 ppid=3981 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.134000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393665653364303965313239613266376461303732373062343663 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit: BPF prog-id=196 op=LOAD Feb 12 19:41:21.139000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ce158 items=0 ppid=3981 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393665653364303965313239613266376461303732373062343663 Feb 12 19:41:21.139000 audit: BPF prog-id=196 op=UNLOAD Feb 12 19:41:21.139000 audit: BPF prog-id=195 op=UNLOAD Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { perfmon } for pid=4316 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit[4316]: AVC avc: denied { bpf } for pid=4316 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.139000 audit: BPF prog-id=197 op=LOAD Feb 12 19:41:21.139000 audit[4316]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003ce568 items=0 ppid=3981 pid=4316 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.139000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6639393665653364303965313239613266376461303732373062343663 Feb 12 19:41:21.231085 env[1109]: time="2024-02-12T19:41:21.231001284Z" level=info msg="StartContainer for \"f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d\" returns successfully" Feb 12 19:41:21.565135 env[1109]: time="2024-02-12T19:41:21.565032510Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.567478 env[1109]: time="2024-02-12T19:41:21.567420542Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.570033 env[1109]: time="2024-02-12T19:41:21.569980131Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.580751 env[1109]: time="2024-02-12T19:41:21.580664738Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:848c5b919e8d33dbad8c8c64aa6aec07c29cfe6e4f6312ceafc1641ea929f91a\"" Feb 12 19:41:21.585257 env[1109]: time="2024-02-12T19:41:21.585188889Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:41:21.591121 env[1109]: time="2024-02-12T19:41:21.591066517Z" level=info msg="CreateContainer within sandbox \"be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:41:21.618115 env[1109]: time="2024-02-12T19:41:21.618022263Z" level=info msg="CreateContainer within sandbox \"be676f34ec9456eda3a7d4ccfe530534cbc928a1f8f13a47f4fca2f1782e9c1e\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"301b1ebfe51f036d5a639e0f5dda8d0497d6598aaecfe036f65a402aba609429\"" Feb 12 19:41:21.625618 env[1109]: time="2024-02-12T19:41:21.625568319Z" level=info msg="StartContainer for \"301b1ebfe51f036d5a639e0f5dda8d0497d6598aaecfe036f65a402aba609429\"" Feb 12 19:41:21.645681 kubelet[2009]: I0212 19:41:21.645579 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dfc86cf8c-bzqlt" podStartSLOduration=3.077560585 podCreationTimestamp="2024-02-12 19:41:14 +0000 UTC" firstStartedPulling="2024-02-12 19:41:16.430046922 +0000 UTC m=+59.414862653" lastFinishedPulling="2024-02-12 19:41:20.997998377 +0000 UTC m=+63.982814119" observedRunningTime="2024-02-12 19:41:21.640535283 +0000 UTC m=+64.625351045" watchObservedRunningTime="2024-02-12 19:41:21.645512051 +0000 UTC m=+64.630327803" Feb 12 19:41:21.654240 systemd[1]: Started cri-containerd-301b1ebfe51f036d5a639e0f5dda8d0497d6598aaecfe036f65a402aba609429.scope. Feb 12 19:41:21.687000 audit[4368]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:21.687000 audit[4368]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffdff6ffe40 a2=0 a3=7ffdff6ffe2c items=0 ppid=2166 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.687000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:21.690000 audit[4368]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4368 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:21.690000 audit[4368]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffdff6ffe40 a2=0 a3=7ffdff6ffe2c items=0 ppid=2166 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.690000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.710000 audit: BPF prog-id=198 op=LOAD Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4025 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330316231656266653531663033366435613633396530663564646138 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4025 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330316231656266653531663033366435613633396530663564646138 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.712000 audit: BPF prog-id=199 op=LOAD Feb 12 19:41:21.712000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003be250 items=0 ppid=4025 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.712000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330316231656266653531663033366435613633396530663564646138 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.713000 audit: BPF prog-id=200 op=LOAD Feb 12 19:41:21.713000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003be298 items=0 ppid=4025 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.713000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330316231656266653531663033366435613633396530663564646138 Feb 12 19:41:21.713000 audit: BPF prog-id=200 op=UNLOAD Feb 12 19:41:21.714000 audit: BPF prog-id=199 op=UNLOAD Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { perfmon } for pid=4356 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit[4356]: AVC avc: denied { bpf } for pid=4356 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:41:21.714000 audit: BPF prog-id=201 op=LOAD Feb 12 19:41:21.714000 audit[4356]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003be6a8 items=0 ppid=4025 pid=4356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.714000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3330316231656266653531663033366435613633396530663564646138 Feb 12 19:41:21.779037 env[1109]: time="2024-02-12T19:41:21.778971608Z" level=info msg="StartContainer for \"301b1ebfe51f036d5a639e0f5dda8d0497d6598aaecfe036f65a402aba609429\" returns successfully" Feb 12 19:41:22.233350 sshd[4175]: Received disconnect from 104.248.54.24 port 47184:11: Bye Bye [preauth] Feb 12 19:41:22.233350 sshd[4175]: Disconnected from authenticating user root 104.248.54.24 port 47184 [preauth] Feb 12 19:41:22.234000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-164.90.149.146:22-104.248.54.24:47184 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.234989 systemd[1]: sshd@15-164.90.149.146:22-104.248.54.24:47184.service: Deactivated successfully. Feb 12 19:41:22.316000 audit[4328]: AVC avc: denied { watch } for pid=4328 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_41_15.4176543236/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c8,c416 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c8,c416 tclass=file permissive=0 Feb 12 19:41:22.316000 audit[4328]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000abb4c0 a2=fc6 a3=0 items=0 ppid=3981 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c8,c416 key=(null) Feb 12 19:41:22.316000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:22.669000 audit[4390]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:22.669000 audit[4390]: SYSCALL arch=c000003e syscall=46 success=yes exit=3548 a0=3 a1=7ffe3330b8a0 a2=0 a3=7ffe3330b88c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.669000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:22.670000 audit[4390]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4390 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:22.670000 audit[4390]: SYSCALL arch=c000003e syscall=46 success=yes exit=5484 a0=3 a1=7ffe3330b8a0 a2=0 a3=7ffe3330b88c items=0 ppid=2166 pid=4390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:22.670000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:22.897000 audit[4369]: AVC avc: denied { watch } for pid=4369 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_41_15.744754273/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c282,c561 tclass=file permissive=0 Feb 12 19:41:22.897000 audit[4369]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c0009c78e0 a2=fc6 a3=0 items=0 ppid=4025 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 key=(null) Feb 12 19:41:22.897000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:27.212000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.214490 kernel: kauditd_printk_skb: 123 callbacks suppressed Feb 12 19:41:27.214650 kernel: audit: type=1400 audit(1707766887.212:1461): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.220098 kernel: audit: type=1300 audit(1707766887.212:1461): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141d60 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.212000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141d60 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.239591 kernel: audit: type=1327 audit(1707766887.212:1461): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.239838 kernel: audit: type=1400 audit(1707766887.212:1462): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.212000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.212000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141d80 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.250313 kernel: audit: type=1300 audit(1707766887.212:1462): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141d80 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.250507 kernel: audit: type=1327 audit(1707766887.212:1462): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.212000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.255000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.262092 kernel: audit: type=1400 audit(1707766887.255:1463): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.255000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141dc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.255000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.274343 kernel: audit: type=1300 audit(1707766887.255:1463): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141dc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.274568 kernel: audit: type=1327 audit(1707766887.255:1463): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.274000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.280103 kernel: audit: type=1400 audit(1707766887.274:1464): avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:27.274000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001141e40 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:41:27.274000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:27.631711 systemd[1]: Started sshd@16-164.90.149.146:22-139.178.68.195:34052.service. Feb 12 19:41:27.635000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.90.149.146:22-139.178.68.195:34052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.759000 audit[4399]: USER_ACCT pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.761426 sshd[4399]: Accepted publickey for core from 139.178.68.195 port 34052 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:27.762000 audit[4399]: CRED_ACQ pid=4399 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.762000 audit[4399]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc558c0340 a2=3 a3=0 items=0 ppid=1 pid=4399 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=8 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:27.762000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:27.766794 sshd[4399]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:27.780032 systemd-logind[1098]: New session 8 of user core. Feb 12 19:41:27.781855 systemd[1]: Started session-8.scope. Feb 12 19:41:27.794000 audit[4399]: USER_START pid=4399 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:27.797000 audit[4402]: CRED_ACQ pid=4402 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:28.140004 sshd[4399]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:28.140000 audit[4399]: USER_END pid=4399 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:28.141000 audit[4399]: CRED_DISP pid=4399 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:28.144796 systemd[1]: sshd@16-164.90.149.146:22-139.178.68.195:34052.service: Deactivated successfully. Feb 12 19:41:28.146003 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:41:28.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-164.90.149.146:22-139.178.68.195:34052 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:28.147792 systemd-logind[1098]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:41:28.148930 systemd-logind[1098]: Removed session 8. Feb 12 19:41:30.185074 kubelet[2009]: E0212 19:41:30.184987 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:33.149970 systemd[1]: Started sshd@17-164.90.149.146:22-139.178.68.195:34054.service. Feb 12 19:41:33.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.90.149.146:22-139.178.68.195:34054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.152344 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:41:33.152457 kernel: audit: type=1130 audit(1707766893.149:1474): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.90.149.146:22-139.178.68.195:34054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.187580 kubelet[2009]: E0212 19:41:33.187512 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:33.209000 audit[4417]: USER_ACCT pid=4417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.210638 sshd[4417]: Accepted publickey for core from 139.178.68.195 port 34054 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:33.214000 audit[4417]: CRED_ACQ pid=4417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.216630 sshd[4417]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:33.220145 kernel: audit: type=1101 audit(1707766893.209:1475): pid=4417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.220473 kernel: audit: type=1103 audit(1707766893.214:1476): pid=4417 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.220687 kernel: audit: type=1006 audit(1707766893.214:1477): pid=4417 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=9 res=1 Feb 12 19:41:33.214000 audit[4417]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa2e86510 a2=3 a3=0 items=0 ppid=1 pid=4417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.231493 kernel: audit: type=1300 audit(1707766893.214:1477): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffa2e86510 a2=3 a3=0 items=0 ppid=1 pid=4417 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.232862 kernel: audit: type=1327 audit(1707766893.214:1477): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.235286 systemd-logind[1098]: New session 9 of user core. Feb 12 19:41:33.237012 systemd[1]: Started session-9.scope. Feb 12 19:41:33.244000 audit[4417]: USER_START pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.246000 audit[4419]: CRED_ACQ pid=4419 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.255672 kernel: audit: type=1105 audit(1707766893.244:1478): pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.255913 kernel: audit: type=1103 audit(1707766893.246:1479): pid=4419 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.426546 sshd[4417]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:33.428000 audit[4417]: USER_END pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.431829 systemd[1]: sshd@17-164.90.149.146:22-139.178.68.195:34054.service: Deactivated successfully. Feb 12 19:41:33.433009 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:41:33.435348 kernel: audit: type=1106 audit(1707766893.428:1480): pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.435461 kernel: audit: type=1104 audit(1707766893.428:1481): pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.428000 audit[4417]: CRED_DISP pid=4417 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:33.439885 systemd-logind[1098]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:41:33.431000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-164.90.149.146:22-139.178.68.195:34054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.442147 systemd-logind[1098]: Removed session 9. Feb 12 19:41:34.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-164.90.149.146:22-167.99.70.20:59960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:34.121493 systemd[1]: Started sshd@18-164.90.149.146:22-167.99.70.20:59960.service. Feb 12 19:41:35.118450 sshd[4430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.70.20 user=root Feb 12 19:41:35.117000 audit[4430]: USER_AUTH pid=4430 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=167.99.70.20 addr=167.99.70.20 terminal=ssh res=failed' Feb 12 19:41:36.854524 sshd[4430]: Failed password for root from 167.99.70.20 port 59960 ssh2 Feb 12 19:41:37.241322 sshd[4430]: Received disconnect from 167.99.70.20 port 59960:11: Bye Bye [preauth] Feb 12 19:41:37.241322 sshd[4430]: Disconnected from authenticating user root 167.99.70.20 port 59960 [preauth] Feb 12 19:41:37.243120 systemd[1]: sshd@18-164.90.149.146:22-167.99.70.20:59960.service: Deactivated successfully. Feb 12 19:41:37.242000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-164.90.149.146:22-167.99.70.20:59960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.436000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.90.149.146:22-139.178.68.195:54356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.439165 kernel: kauditd_printk_skb: 4 callbacks suppressed Feb 12 19:41:38.439216 kernel: audit: type=1130 audit(1707766898.436:1486): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.90.149.146:22-139.178.68.195:54356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.437609 systemd[1]: Started sshd@19-164.90.149.146:22-139.178.68.195:54356.service. Feb 12 19:41:38.502322 sshd[4437]: Accepted publickey for core from 139.178.68.195 port 54356 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:38.501000 audit[4437]: USER_ACCT pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.508600 kernel: audit: type=1101 audit(1707766898.501:1487): pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.508744 kernel: audit: type=1103 audit(1707766898.507:1488): pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.507000 audit[4437]: CRED_ACQ pid=4437 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.513772 sshd[4437]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:38.514389 kernel: audit: type=1006 audit(1707766898.507:1489): pid=4437 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:41:38.507000 audit[4437]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc256f78b0 a2=3 a3=0 items=0 ppid=1 pid=4437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:38.524740 kernel: audit: type=1300 audit(1707766898.507:1489): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc256f78b0 a2=3 a3=0 items=0 ppid=1 pid=4437 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:38.524929 kernel: audit: type=1327 audit(1707766898.507:1489): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:38.507000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:38.531285 systemd-logind[1098]: New session 10 of user core. Feb 12 19:41:38.533028 systemd[1]: Started session-10.scope. Feb 12 19:41:38.542000 audit[4437]: USER_START pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.553178 kernel: audit: type=1105 audit(1707766898.542:1490): pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.552000 audit[4439]: CRED_ACQ pid=4439 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.560249 kernel: audit: type=1103 audit(1707766898.552:1491): pid=4439 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.778594 sshd[4437]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:38.780000 audit[4437]: USER_END pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.789232 kernel: audit: type=1106 audit(1707766898.780:1492): pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.785000 audit[4437]: CRED_DISP pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.790155 systemd-logind[1098]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:41:38.792647 systemd[1]: sshd@19-164.90.149.146:22-139.178.68.195:54356.service: Deactivated successfully. Feb 12 19:41:38.793820 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:41:38.802153 kernel: audit: type=1104 audit(1707766898.785:1493): pid=4437 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:38.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-164.90.149.146:22-139.178.68.195:54356 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:38.803146 systemd-logind[1098]: Removed session 10. Feb 12 19:41:39.047420 systemd[1]: Started sshd@20-164.90.149.146:22-165.227.101.226:54348.service. Feb 12 19:41:39.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.90.149.146:22-165.227.101.226:54348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:39.556934 sshd[4449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.101.226 user=root Feb 12 19:41:39.556000 audit[4449]: USER_AUTH pid=4449 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:41:40.466547 systemd[1]: run-containerd-runc-k8s.io-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3-runc.udY9Hk.mount: Deactivated successfully. Feb 12 19:41:41.508376 sshd[4449]: Failed password for root from 165.227.101.226 port 54348 ssh2 Feb 12 19:41:43.532336 sshd[4449]: Received disconnect from 165.227.101.226 port 54348:11: Bye Bye [preauth] Feb 12 19:41:43.532336 sshd[4449]: Disconnected from authenticating user root 165.227.101.226 port 54348 [preauth] Feb 12 19:41:43.534360 systemd[1]: sshd@20-164.90.149.146:22-165.227.101.226:54348.service: Deactivated successfully. Feb 12 19:41:43.537125 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:41:43.537283 kernel: audit: type=1131 audit(1707766903.534:1497): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.90.149.146:22-165.227.101.226:54348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:43.534000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-164.90.149.146:22-165.227.101.226:54348 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:43.798221 systemd[1]: Started sshd@21-164.90.149.146:22-139.178.68.195:54360.service. Feb 12 19:41:43.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.90.149.146:22-139.178.68.195:54360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:43.805101 kernel: audit: type=1130 audit(1707766903.798:1498): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.90.149.146:22-139.178.68.195:54360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:43.870000 audit[4483]: USER_ACCT pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.871091 sshd[4483]: Accepted publickey for core from 139.178.68.195 port 54360 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:43.877151 kernel: audit: type=1101 audit(1707766903.870:1499): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.877000 audit[4483]: CRED_ACQ pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.886877 kernel: audit: type=1103 audit(1707766903.877:1500): pid=4483 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.887184 kernel: audit: type=1006 audit(1707766903.877:1501): pid=4483 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:41:43.887251 kernel: audit: type=1300 audit(1707766903.877:1501): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdee5ba0a0 a2=3 a3=0 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.877000 audit[4483]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdee5ba0a0 a2=3 a3=0 items=0 ppid=1 pid=4483 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:43.887681 sshd[4483]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:43.877000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:43.895939 kernel: audit: type=1327 audit(1707766903.877:1501): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:43.901207 systemd-logind[1098]: New session 11 of user core. Feb 12 19:41:43.901528 systemd[1]: Started session-11.scope. Feb 12 19:41:43.909000 audit[4483]: USER_START pid=4483 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.912000 audit[4485]: CRED_ACQ pid=4485 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.920401 kernel: audit: type=1105 audit(1707766903.909:1502): pid=4483 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:43.920964 kernel: audit: type=1103 audit(1707766903.912:1503): pid=4485 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:44.089760 sshd[4483]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:44.091000 audit[4483]: USER_END pid=4483 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:44.095113 systemd[1]: sshd@21-164.90.149.146:22-139.178.68.195:54360.service: Deactivated successfully. Feb 12 19:41:44.096344 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:41:44.098342 kernel: audit: type=1106 audit(1707766904.091:1504): pid=4483 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:44.092000 audit[4483]: CRED_DISP pid=4483 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:44.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-164.90.149.146:22-139.178.68.195:54360 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:44.099508 systemd-logind[1098]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:41:44.100844 systemd-logind[1098]: Removed session 11. Feb 12 19:41:45.899216 kubelet[2009]: I0212 19:41:45.898934 2009 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6dfc86cf8c-fwz69" podStartSLOduration=26.86315905 podCreationTimestamp="2024-02-12 19:41:14 +0000 UTC" firstStartedPulling="2024-02-12 19:41:16.545640475 +0000 UTC m=+59.530456208" lastFinishedPulling="2024-02-12 19:41:21.581356958 +0000 UTC m=+64.566172691" observedRunningTime="2024-02-12 19:41:22.641273956 +0000 UTC m=+65.626089708" watchObservedRunningTime="2024-02-12 19:41:45.898875533 +0000 UTC m=+88.883691290" Feb 12 19:41:45.968000 audit[4538]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.968000 audit[4538]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffd83e6b9b0 a2=0 a3=7ffd83e6b99c items=0 ppid=2166 pid=4538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.968000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.971000 audit[4538]: NETFILTER_CFG table=nat:124 family=2 entries=31 op=nft_register_chain pid=4538 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.971000 audit[4538]: SYSCALL arch=c000003e syscall=46 success=yes exit=10868 a0=3 a1=7ffd83e6b9b0 a2=0 a3=7ffd83e6b99c items=0 ppid=2166 pid=4538 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.971000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.989000 audit[4540]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=4540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.989000 audit[4540]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffddc4469b0 a2=0 a3=7ffddc44699c items=0 ppid=2166 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.989000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:45.991000 audit[4540]: NETFILTER_CFG table=nat:126 family=2 entries=22 op=nft_register_rule pid=4540 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:45.991000 audit[4540]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffddc4469b0 a2=0 a3=7ffddc44699c items=0 ppid=2166 pid=4540 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:45.991000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:49.098399 systemd[1]: Started sshd@22-164.90.149.146:22-139.178.68.195:40784.service. Feb 12 19:41:49.107441 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:41:49.107658 kernel: audit: type=1130 audit(1707766909.098:1511): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.90.149.146:22-139.178.68.195:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:49.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.90.149.146:22-139.178.68.195:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:49.201000 audit[4564]: USER_ACCT pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.203394 sshd[4564]: Accepted publickey for core from 139.178.68.195 port 40784 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:49.210103 kernel: audit: type=1101 audit(1707766909.201:1512): pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.213000 audit[4564]: CRED_ACQ pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.220110 kernel: audit: type=1103 audit(1707766909.213:1513): pid=4564 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.221009 sshd[4564]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:49.227190 kernel: audit: type=1006 audit(1707766909.213:1514): pid=4564 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:41:49.213000 audit[4564]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff251de8b0 a2=3 a3=0 items=0 ppid=1 pid=4564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:49.236134 kernel: audit: type=1300 audit(1707766909.213:1514): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff251de8b0 a2=3 a3=0 items=0 ppid=1 pid=4564 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:49.213000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:49.244615 kernel: audit: type=1327 audit(1707766909.213:1514): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:49.243940 systemd[1]: Started session-12.scope. Feb 12 19:41:49.246666 systemd-logind[1098]: New session 12 of user core. Feb 12 19:41:49.258000 audit[4564]: USER_START pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.277131 kernel: audit: type=1105 audit(1707766909.258:1515): pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.261000 audit[4566]: CRED_ACQ pid=4566 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.283133 kernel: audit: type=1103 audit(1707766909.261:1516): pid=4566 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.494332 sshd[4564]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:49.498000 audit[4564]: USER_END pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.506554 kernel: audit: type=1106 audit(1707766909.498:1517): pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.498000 audit[4564]: CRED_DISP pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.508647 systemd[1]: Started sshd@23-164.90.149.146:22-139.178.68.195:40800.service. Feb 12 19:41:49.513128 kernel: audit: type=1104 audit(1707766909.498:1518): pid=4564 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-164.90.149.146:22-139.178.68.195:40800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:49.516603 systemd[1]: sshd@22-164.90.149.146:22-139.178.68.195:40784.service: Deactivated successfully. Feb 12 19:41:49.517000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-164.90.149.146:22-139.178.68.195:40784 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:49.520975 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:41:49.522877 systemd-logind[1098]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:41:49.525004 systemd-logind[1098]: Removed session 12. Feb 12 19:41:49.580488 sshd[4575]: Accepted publickey for core from 139.178.68.195 port 40800 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:49.579000 audit[4575]: USER_ACCT pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.581000 audit[4575]: CRED_ACQ pid=4575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.581000 audit[4575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff99b46950 a2=3 a3=0 items=0 ppid=1 pid=4575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:49.581000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:49.583517 sshd[4575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:49.592198 systemd-logind[1098]: New session 13 of user core. Feb 12 19:41:49.592293 systemd[1]: Started session-13.scope. Feb 12 19:41:49.600000 audit[4575]: USER_START pid=4575 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:49.602000 audit[4578]: CRED_ACQ pid=4578 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.078331 sshd[4575]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:51.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-164.90.149.146:22-139.178.68.195:40806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:51.079796 systemd[1]: Started sshd@24-164.90.149.146:22-139.178.68.195:40806.service. Feb 12 19:41:51.093000 audit[4575]: USER_END pid=4575 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.094000 audit[4575]: CRED_DISP pid=4575 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.105000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-164.90.149.146:22-139.178.68.195:40800 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:51.106633 systemd[1]: sshd@23-164.90.149.146:22-139.178.68.195:40800.service: Deactivated successfully. Feb 12 19:41:51.107666 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:41:51.110599 systemd-logind[1098]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:41:51.113496 systemd-logind[1098]: Removed session 13. Feb 12 19:41:51.167000 audit[4584]: USER_ACCT pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.169612 sshd[4584]: Accepted publickey for core from 139.178.68.195 port 40806 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:51.169000 audit[4584]: CRED_ACQ pid=4584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.169000 audit[4584]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe111d8d40 a2=3 a3=0 items=0 ppid=1 pid=4584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:51.169000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:51.172162 sshd[4584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:51.179362 systemd[1]: Started session-14.scope. Feb 12 19:41:51.179773 systemd-logind[1098]: New session 14 of user core. Feb 12 19:41:51.188000 audit[4584]: USER_START pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.191000 audit[4587]: CRED_ACQ pid=4587 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.391142 sshd[4584]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:51.392000 audit[4584]: USER_END pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.392000 audit[4584]: CRED_DISP pid=4584 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:51.397503 systemd-logind[1098]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:41:51.397851 systemd[1]: sshd@24-164.90.149.146:22-139.178.68.195:40806.service: Deactivated successfully. Feb 12 19:41:51.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-164.90.149.146:22-139.178.68.195:40806 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:51.398729 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:41:51.399621 systemd-logind[1098]: Removed session 14. Feb 12 19:41:56.409385 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:41:56.409647 kernel: audit: type=1130 audit(1707766916.401:1538): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.90.149.146:22-139.178.68.195:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:56.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.90.149.146:22-139.178.68.195:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:56.401893 systemd[1]: Started sshd@25-164.90.149.146:22-139.178.68.195:56054.service. Feb 12 19:41:56.456000 audit[4602]: USER_ACCT pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.463027 sshd[4602]: Accepted publickey for core from 139.178.68.195 port 56054 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:41:56.463662 kernel: audit: type=1101 audit(1707766916.456:1539): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.462000 audit[4602]: CRED_ACQ pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.464008 sshd[4602]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:56.469171 kernel: audit: type=1103 audit(1707766916.462:1540): pid=4602 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.462000 audit[4602]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd459f35a0 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.478139 kernel: audit: type=1006 audit(1707766916.462:1541): pid=4602 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:41:56.478355 kernel: audit: type=1300 audit(1707766916.462:1541): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd459f35a0 a2=3 a3=0 items=0 ppid=1 pid=4602 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:56.462000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:56.480429 kernel: audit: type=1327 audit(1707766916.462:1541): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:56.486896 systemd[1]: Started session-15.scope. Feb 12 19:41:56.487185 systemd-logind[1098]: New session 15 of user core. Feb 12 19:41:56.494000 audit[4602]: USER_START pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.502273 kernel: audit: type=1105 audit(1707766916.494:1542): pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.497000 audit[4604]: CRED_ACQ pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.508516 kernel: audit: type=1103 audit(1707766916.497:1543): pid=4604 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.659414 sshd[4602]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:56.660000 audit[4602]: USER_END pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.662000 audit[4602]: CRED_DISP pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.669525 systemd[1]: sshd@25-164.90.149.146:22-139.178.68.195:56054.service: Deactivated successfully. Feb 12 19:41:56.670514 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:41:56.672016 kernel: audit: type=1106 audit(1707766916.660:1544): pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.672143 kernel: audit: type=1104 audit(1707766916.662:1545): pid=4602 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:41:56.668000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-164.90.149.146:22-139.178.68.195:56054 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:56.673262 systemd-logind[1098]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:41:56.675449 systemd-logind[1098]: Removed session 15. Feb 12 19:41:57.185876 kubelet[2009]: E0212 19:41:57.185829 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:57.188474 kubelet[2009]: E0212 19:41:57.188106 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:41:58.546796 systemd[1]: Started sshd@26-164.90.149.146:22-119.92.70.82:58712.service. Feb 12 19:41:58.546000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.90.149.146:22-119.92.70.82:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:59.507493 sshd[4616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.92.70.82 user=root Feb 12 19:41:59.506000 audit[4616]: USER_AUTH pid=4616 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.92.70.82 addr=119.92.70.82 terminal=ssh res=failed' Feb 12 19:42:01.203028 sshd[4616]: Failed password for root from 119.92.70.82 port 58712 ssh2 Feb 12 19:42:01.630844 sshd[4616]: Received disconnect from 119.92.70.82 port 58712:11: Bye Bye [preauth] Feb 12 19:42:01.630844 sshd[4616]: Disconnected from authenticating user root 119.92.70.82 port 58712 [preauth] Feb 12 19:42:01.633119 systemd[1]: sshd@26-164.90.149.146:22-119.92.70.82:58712.service: Deactivated successfully. Feb 12 19:42:01.635700 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:42:01.635857 kernel: audit: type=1131 audit(1707766921.632:1549): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.90.149.146:22-119.92.70.82:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:01.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-164.90.149.146:22-119.92.70.82:58712 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:01.683721 systemd[1]: Started sshd@27-164.90.149.146:22-139.178.68.195:56064.service. Feb 12 19:42:01.682000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.90.149.146:22-139.178.68.195:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:01.691298 kernel: audit: type=1130 audit(1707766921.682:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.90.149.146:22-139.178.68.195:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:01.758000 audit[4622]: USER_ACCT pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.761331 sshd[4622]: Accepted publickey for core from 139.178.68.195 port 56064 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:01.766201 kernel: audit: type=1101 audit(1707766921.758:1551): pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.767418 sshd[4622]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:01.765000 audit[4622]: CRED_ACQ pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.791560 kernel: audit: type=1103 audit(1707766921.765:1552): pid=4622 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.791882 kernel: audit: type=1006 audit(1707766921.765:1553): pid=4622 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:42:01.791941 kernel: audit: type=1300 audit(1707766921.765:1553): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6e45e5d0 a2=3 a3=0 items=0 ppid=1 pid=4622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:01.791983 kernel: audit: type=1327 audit(1707766921.765:1553): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:01.765000 audit[4622]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc6e45e5d0 a2=3 a3=0 items=0 ppid=1 pid=4622 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:01.765000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:01.815746 systemd[1]: Started session-16.scope. Feb 12 19:42:01.816232 systemd-logind[1098]: New session 16 of user core. Feb 12 19:42:01.842000 audit[4622]: USER_START pid=4622 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.853126 kernel: audit: type=1105 audit(1707766921.842:1554): pid=4622 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.851000 audit[4624]: CRED_ACQ pid=4624 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:01.859249 kernel: audit: type=1103 audit(1707766921.851:1555): pid=4624 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:02.079435 sshd[4622]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:02.080000 audit[4622]: USER_END pid=4622 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:02.084000 audit[4622]: CRED_DISP pid=4622 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:02.088443 kernel: audit: type=1106 audit(1707766922.080:1556): pid=4622 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:02.089783 systemd[1]: sshd@27-164.90.149.146:22-139.178.68.195:56064.service: Deactivated successfully. Feb 12 19:42:02.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@27-164.90.149.146:22-139.178.68.195:56064 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:02.091088 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:42:02.092988 systemd-logind[1098]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:42:02.097832 systemd-logind[1098]: Removed session 16. Feb 12 19:42:07.094101 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:42:07.094282 kernel: audit: type=1130 audit(1707766927.090:1559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-164.90.149.146:22-139.178.68.195:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:07.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-164.90.149.146:22-139.178.68.195:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:07.090943 systemd[1]: Started sshd@28-164.90.149.146:22-139.178.68.195:40422.service. Feb 12 19:42:07.143000 audit[4636]: USER_ACCT pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.144733 sshd[4636]: Accepted publickey for core from 139.178.68.195 port 40422 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:07.151117 kernel: audit: type=1101 audit(1707766927.143:1560): pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.150000 audit[4636]: CRED_ACQ pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.152184 sshd[4636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:07.158584 kernel: audit: type=1103 audit(1707766927.150:1561): pid=4636 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.158743 kernel: audit: type=1006 audit(1707766927.150:1562): pid=4636 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:42:07.150000 audit[4636]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeecf8b620 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:07.175786 kernel: audit: type=1300 audit(1707766927.150:1562): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffeecf8b620 a2=3 a3=0 items=0 ppid=1 pid=4636 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:07.150000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:07.181489 kernel: audit: type=1327 audit(1707766927.150:1562): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:07.180985 systemd-logind[1098]: New session 17 of user core. Feb 12 19:42:07.182639 systemd[1]: Started session-17.scope. Feb 12 19:42:07.205272 kernel: audit: type=1105 audit(1707766927.196:1563): pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.196000 audit[4636]: USER_START pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.198000 audit[4638]: CRED_ACQ pid=4638 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.211297 kernel: audit: type=1103 audit(1707766927.198:1564): pid=4638 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.381508 sshd[4636]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:07.383000 audit[4636]: USER_END pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.383000 audit[4636]: CRED_DISP pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.393183 systemd[1]: sshd@28-164.90.149.146:22-139.178.68.195:40422.service: Deactivated successfully. Feb 12 19:42:07.394423 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:42:07.396713 systemd-logind[1098]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:42:07.398014 kernel: audit: type=1106 audit(1707766927.383:1565): pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.398178 kernel: audit: type=1104 audit(1707766927.383:1566): pid=4636 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:07.398566 systemd-logind[1098]: Removed session 17. Feb 12 19:42:07.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@28-164.90.149.146:22-139.178.68.195:40422 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:10.475309 systemd[1]: run-containerd-runc-k8s.io-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3-runc.liLZEA.mount: Deactivated successfully. Feb 12 19:42:11.006911 systemd[1]: Started sshd@29-164.90.149.146:22-104.248.54.24:54588.service. Feb 12 19:42:11.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-164.90.149.146:22-104.248.54.24:54588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:11.143000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:11.143000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0011cc1e0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:11.143000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:11.144000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:11.144000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c001f16330 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:11.144000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:11.478761 sshd[4668]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.54.24 user=root Feb 12 19:42:11.477000 audit[4668]: USER_AUTH pid=4668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=104.248.54.24 addr=104.248.54.24 terminal=ssh res=failed' Feb 12 19:42:11.839442 systemd[1]: run-containerd-runc-k8s.io-b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df-runc.ppbFcQ.mount: Deactivated successfully. Feb 12 19:42:12.315000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.318437 kernel: kauditd_printk_skb: 9 callbacks suppressed Feb 12 19:42:12.318757 kernel: audit: type=1400 audit(1707766932.315:1572): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.315000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df408e0 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.329899 kernel: audit: type=1300 audit(1707766932.315:1572): arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df408e0 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.330127 kernel: audit: type=1327 audit(1707766932.315:1572): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.315000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.316000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.339860 kernel: audit: type=1400 audit(1707766932.316:1573): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.340099 kernel: audit: type=1300 audit(1707766932.316:1573): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c009a7af60 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.316000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c009a7af60 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.316000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.351181 kernel: audit: type=1327 audit(1707766932.316:1573): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.351452 kernel: audit: type=1400 audit(1707766932.317:1574): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.317000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="vda9" ino=524817 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.317000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00420a930 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.362360 kernel: audit: type=1300 audit(1707766932.317:1574): arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00420a930 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.363540 kernel: audit: type=1327 audit(1707766932.317:1574): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.317000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.334000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.334000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00420a990 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.385100 kernel: audit: type=1400 audit(1707766932.334:1575): avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="vda9" ino=524823 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.334000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.377000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.377000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00df40920 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.377000 audit[1844]: AVC avc: denied { watch } for pid=1844 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="vda9" ino=524821 scontext=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:12.377000 audit[1844]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00420aa20 a2=fc6 a3=0 items=0 ppid=1707 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c150,c405 key=(null) Feb 12 19:42:12.377000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D3136342E39302E3134392E313436002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B Feb 12 19:42:12.393958 systemd[1]: Started sshd@30-164.90.149.146:22-139.178.68.195:40428.service. Feb 12 19:42:12.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-164.90.149.146:22-139.178.68.195:40428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:12.453000 audit[4691]: USER_ACCT pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.454747 sshd[4691]: Accepted publickey for core from 139.178.68.195 port 40428 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:12.455000 audit[4691]: CRED_ACQ pid=4691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.455000 audit[4691]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff92969a90 a2=3 a3=0 items=0 ppid=1 pid=4691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:12.455000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:12.458737 sshd[4691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:12.465799 systemd-logind[1098]: New session 18 of user core. Feb 12 19:42:12.467332 systemd[1]: Started session-18.scope. Feb 12 19:42:12.474000 audit[4691]: USER_START pid=4691 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.476000 audit[4693]: CRED_ACQ pid=4693 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.704449 sshd[4691]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:12.704000 audit[4691]: USER_END pid=4691 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.705000 audit[4691]: CRED_DISP pid=4691 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:12.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@30-164.90.149.146:22-139.178.68.195:40428 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:12.708339 systemd[1]: sshd@30-164.90.149.146:22-139.178.68.195:40428.service: Deactivated successfully. Feb 12 19:42:12.709591 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:42:12.711590 systemd-logind[1098]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:42:12.712756 systemd-logind[1098]: Removed session 18. Feb 12 19:42:13.154654 sshd[4668]: Failed password for root from 104.248.54.24 port 54588 ssh2 Feb 12 19:42:13.501887 sshd[4668]: Received disconnect from 104.248.54.24 port 54588:11: Bye Bye [preauth] Feb 12 19:42:13.501887 sshd[4668]: Disconnected from authenticating user root 104.248.54.24 port 54588 [preauth] Feb 12 19:42:13.502984 systemd[1]: sshd@29-164.90.149.146:22-104.248.54.24:54588.service: Deactivated successfully. Feb 12 19:42:13.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@29-164.90.149.146:22-104.248.54.24:54588 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:14.186037 kubelet[2009]: E0212 19:42:14.185984 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:17.187636 kubelet[2009]: E0212 19:42:17.187586 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:17.189299 kubelet[2009]: E0212 19:42:17.189256 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:17.713981 systemd[1]: Started sshd@31-164.90.149.146:22-139.178.68.195:34610.service. Feb 12 19:42:17.713000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-164.90.149.146:22-139.178.68.195:34610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:17.716116 kernel: kauditd_printk_skb: 20 callbacks suppressed Feb 12 19:42:17.716204 kernel: audit: type=1130 audit(1707766937.713:1588): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-164.90.149.146:22-139.178.68.195:34610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:17.770000 audit[4746]: USER_ACCT pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.772234 sshd[4746]: Accepted publickey for core from 139.178.68.195 port 34610 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:17.778115 kernel: audit: type=1101 audit(1707766937.770:1589): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.777000 audit[4746]: CRED_ACQ pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.784194 sshd[4746]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:17.786433 kernel: audit: type=1103 audit(1707766937.777:1590): pid=4746 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.786899 kernel: audit: type=1006 audit(1707766937.777:1591): pid=4746 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 19:42:17.786979 kernel: audit: type=1300 audit(1707766937.777:1591): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd8174f0 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:17.777000 audit[4746]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcbd8174f0 a2=3 a3=0 items=0 ppid=1 pid=4746 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:17.792175 kernel: audit: type=1327 audit(1707766937.777:1591): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:17.777000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:17.799195 systemd-logind[1098]: New session 19 of user core. Feb 12 19:42:17.800258 systemd[1]: Started session-19.scope. Feb 12 19:42:17.806000 audit[4746]: USER_START pid=4746 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.814159 kernel: audit: type=1105 audit(1707766937.806:1592): pid=4746 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.813000 audit[4748]: CRED_ACQ pid=4748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:17.820180 kernel: audit: type=1103 audit(1707766937.813:1593): pid=4748 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.015964 sshd[4746]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:18.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-164.90.149.146:22-139.178.68.195:34616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:18.023590 systemd[1]: Started sshd@32-164.90.149.146:22-139.178.68.195:34616.service. Feb 12 19:42:18.031983 kernel: audit: type=1130 audit(1707766938.022:1594): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-164.90.149.146:22-139.178.68.195:34616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:18.032752 kernel: audit: type=1106 audit(1707766938.029:1595): pid=4746 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.029000 audit[4746]: USER_END pid=4746 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.034159 systemd[1]: sshd@31-164.90.149.146:22-139.178.68.195:34610.service: Deactivated successfully. Feb 12 19:42:18.035202 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:42:18.036388 systemd-logind[1098]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:42:18.029000 audit[4746]: CRED_DISP pid=4746 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.033000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@31-164.90.149.146:22-139.178.68.195:34610 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:18.038446 systemd-logind[1098]: Removed session 19. Feb 12 19:42:18.087000 audit[4757]: USER_ACCT pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.089115 sshd[4757]: Accepted publickey for core from 139.178.68.195 port 34616 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:18.090000 audit[4757]: CRED_ACQ pid=4757 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.090000 audit[4757]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0cd8cd70 a2=3 a3=0 items=0 ppid=1 pid=4757 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:18.090000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:18.092460 sshd[4757]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:18.099936 systemd[1]: Started session-20.scope. Feb 12 19:42:18.100586 systemd-logind[1098]: New session 20 of user core. Feb 12 19:42:18.107000 audit[4757]: USER_START pid=4757 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.109000 audit[4760]: CRED_ACQ pid=4760 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.485423 sshd[4757]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:18.492000 audit[4757]: USER_END pid=4757 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.493000 audit[4757]: CRED_DISP pid=4757 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.497091 systemd[1]: Started sshd@33-164.90.149.146:22-139.178.68.195:34630.service. Feb 12 19:42:18.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-164.90.149.146:22-139.178.68.195:34630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:18.504493 systemd[1]: sshd@32-164.90.149.146:22-139.178.68.195:34616.service: Deactivated successfully. Feb 12 19:42:18.504000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@32-164.90.149.146:22-139.178.68.195:34616 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:18.507325 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:42:18.509406 systemd-logind[1098]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:42:18.512000 systemd-logind[1098]: Removed session 20. Feb 12 19:42:18.571000 audit[4766]: USER_ACCT pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.572682 sshd[4766]: Accepted publickey for core from 139.178.68.195 port 34630 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:18.572000 audit[4766]: CRED_ACQ pid=4766 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.573000 audit[4766]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffda1608a00 a2=3 a3=0 items=0 ppid=1 pid=4766 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:18.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:18.575727 sshd[4766]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:18.583693 systemd[1]: Started session-21.scope. Feb 12 19:42:18.584343 systemd-logind[1098]: New session 21 of user core. Feb 12 19:42:18.589000 audit[4766]: USER_START pid=4766 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.592000 audit[4769]: CRED_ACQ pid=4769 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:18.696801 systemd[1]: run-containerd-runc-k8s.io-b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df-runc.wG0yDl.mount: Deactivated successfully. Feb 12 19:42:19.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-164.90.149.146:22-119.202.128.28:48838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:19.337035 systemd[1]: Started sshd@34-164.90.149.146:22-119.202.128.28:48838.service. Feb 12 19:42:20.124311 sshd[4766]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:20.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-164.90.149.146:22-139.178.68.195:34636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:20.128782 systemd[1]: Started sshd@35-164.90.149.146:22-139.178.68.195:34636.service. Feb 12 19:42:20.137000 audit[4766]: USER_END pid=4766 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.137000 audit[4766]: CRED_DISP pid=4766 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.141579 systemd[1]: sshd@33-164.90.149.146:22-139.178.68.195:34630.service: Deactivated successfully. Feb 12 19:42:20.140000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@33-164.90.149.146:22-139.178.68.195:34630 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:20.143511 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:42:20.157000 audit[4796]: USER_AUTH pid=4796 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=119.202.128.28 addr=119.202.128.28 terminal=ssh res=failed' Feb 12 19:42:20.157972 sshd[4796]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.202.128.28 user=root Feb 12 19:42:20.162568 systemd-logind[1098]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:42:20.164318 systemd-logind[1098]: Removed session 21. Feb 12 19:42:20.190000 audit[4803]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=4803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.190000 audit[4803]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7ffe96dfc360 a2=0 a3=7ffe96dfc34c items=0 ppid=2166 pid=4803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.190000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.193000 audit[4803]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=4803 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.193000 audit[4803]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7ffe96dfc360 a2=0 a3=31030 items=0 ppid=2166 pid=4803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.227000 audit[4801]: USER_ACCT pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.230746 sshd[4801]: Accepted publickey for core from 139.178.68.195 port 34636 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:20.231000 audit[4801]: CRED_ACQ pid=4801 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.231000 audit[4801]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff16d98770 a2=3 a3=0 items=0 ppid=1 pid=4801 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:20.232873 sshd[4801]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:20.244163 systemd-logind[1098]: New session 22 of user core. Feb 12 19:42:20.245405 systemd[1]: Started session-22.scope. Feb 12 19:42:20.253000 audit[4801]: USER_START pid=4801 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.257000 audit[4806]: CRED_ACQ pid=4806 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:20.289000 audit[4807]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=4807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.289000 audit[4807]: SYSCALL arch=c000003e syscall=46 success=yes exit=11292 a0=3 a1=7fff40ac3910 a2=0 a3=7fff40ac38fc items=0 ppid=2166 pid=4807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.289000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:20.292000 audit[4807]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=4807 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:20.292000 audit[4807]: SYSCALL arch=c000003e syscall=46 success=yes exit=6212 a0=3 a1=7fff40ac3910 a2=0 a3=31030 items=0 ppid=2166 pid=4807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:20.292000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:21.372646 sshd[4801]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:21.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-164.90.149.146:22-139.178.68.195:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:21.376662 systemd[1]: Started sshd@36-164.90.149.146:22-139.178.68.195:34642.service. Feb 12 19:42:21.388000 audit[4801]: USER_END pid=4801 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.388000 audit[4801]: CRED_DISP pid=4801 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.392969 systemd[1]: sshd@35-164.90.149.146:22-139.178.68.195:34636.service: Deactivated successfully. Feb 12 19:42:21.392000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@35-164.90.149.146:22-139.178.68.195:34636 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:21.394439 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:42:21.396480 systemd-logind[1098]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:42:21.397906 systemd-logind[1098]: Removed session 22. Feb 12 19:42:21.493000 audit[4824]: USER_ACCT pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.495495 sshd[4824]: Accepted publickey for core from 139.178.68.195 port 34642 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:21.496000 audit[4824]: CRED_ACQ pid=4824 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.497000 audit[4824]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd288236d0 a2=3 a3=0 items=0 ppid=1 pid=4824 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:21.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:21.499894 sshd[4824]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:21.508900 systemd[1]: Started session-23.scope. Feb 12 19:42:21.510274 systemd-logind[1098]: New session 23 of user core. Feb 12 19:42:21.527000 audit[4824]: USER_START pid=4824 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.530000 audit[4827]: CRED_ACQ pid=4827 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.747777 sshd[4824]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:21.750000 audit[4824]: USER_END pid=4824 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.750000 audit[4824]: CRED_DISP pid=4824 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:21.755770 systemd[1]: sshd@36-164.90.149.146:22-139.178.68.195:34642.service: Deactivated successfully. Feb 12 19:42:21.755000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@36-164.90.149.146:22-139.178.68.195:34642 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:21.757023 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:42:21.758632 systemd-logind[1098]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:42:21.760269 systemd-logind[1098]: Removed session 23. Feb 12 19:42:22.334000 audit[4328]: AVC avc: denied { watch } for pid=4328 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_41_15.4176543236/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c8,c416 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c8,c416 tclass=file permissive=0 Feb 12 19:42:22.334000 audit[4328]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c001983c20 a2=fc6 a3=0 items=0 ppid=3981 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c8,c416 key=(null) Feb 12 19:42:22.334000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:22.736360 sshd[4796]: Failed password for root from 119.202.128.28 port 48838 ssh2 Feb 12 19:42:22.908205 kernel: kauditd_printk_skb: 62 callbacks suppressed Feb 12 19:42:22.908455 kernel: audit: type=1400 audit(1707766942.898:1640): avc: denied { watch } for pid=4369 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_41_15.744754273/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c282,c561 tclass=file permissive=0 Feb 12 19:42:22.898000 audit[4369]: AVC avc: denied { watch } for pid=4369 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_41_15.744754273/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c282,c561 tclass=file permissive=0 Feb 12 19:42:22.920541 kernel: audit: type=1300 audit(1707766942.898:1640): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00116dba0 a2=fc6 a3=0 items=0 ppid=4025 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 key=(null) Feb 12 19:42:22.920749 kernel: audit: type=1327 audit(1707766942.898:1640): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:22.898000 audit[4369]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c00116dba0 a2=fc6 a3=0 items=0 ppid=4025 pid=4369 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c282,c561 key=(null) Feb 12 19:42:22.898000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:24.151999 sshd[4796]: Received disconnect from 119.202.128.28 port 48838:11: Bye Bye [preauth] Feb 12 19:42:24.151999 sshd[4796]: Disconnected from authenticating user root 119.202.128.28 port 48838 [preauth] Feb 12 19:42:24.154087 systemd[1]: sshd@34-164.90.149.146:22-119.202.128.28:48838.service: Deactivated successfully. Feb 12 19:42:24.153000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-164.90.149.146:22-119.202.128.28:48838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:24.162129 kernel: audit: type=1131 audit(1707766944.153:1641): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@34-164.90.149.146:22-119.202.128.28:48838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:26.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-164.90.149.146:22-139.178.68.195:42374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:26.756593 systemd[1]: Started sshd@37-164.90.149.146:22-139.178.68.195:42374.service. Feb 12 19:42:26.762123 kernel: audit: type=1130 audit(1707766946.755:1642): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-164.90.149.146:22-139.178.68.195:42374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:26.811000 audit[4839]: USER_ACCT pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:26.812883 sshd[4839]: Accepted publickey for core from 139.178.68.195 port 42374 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:26.818113 kernel: audit: type=1101 audit(1707766946.811:1643): pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:26.817000 audit[4839]: CRED_ACQ pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:26.819785 sshd[4839]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:26.825115 kernel: audit: type=1103 audit(1707766946.817:1644): pid=4839 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:26.830088 kernel: audit: type=1006 audit(1707766946.818:1645): pid=4839 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:42:26.836393 kernel: audit: type=1300 audit(1707766946.818:1645): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53630f00 a2=3 a3=0 items=0 ppid=1 pid=4839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:26.818000 audit[4839]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd53630f00 a2=3 a3=0 items=0 ppid=1 pid=4839 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:26.839515 kernel: audit: type=1327 audit(1707766946.818:1645): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:26.818000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:26.843664 systemd[1]: Started session-24.scope. Feb 12 19:42:26.845210 systemd-logind[1098]: New session 24 of user core. Feb 12 19:42:26.850000 audit[4839]: USER_START pid=4839 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:26.852000 audit[4841]: CRED_ACQ pid=4841 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:27.013679 sshd[4839]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:27.015000 audit[4839]: USER_END pid=4839 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:27.016000 audit[4839]: CRED_DISP pid=4839 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:27.019783 systemd-logind[1098]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:42:27.020392 systemd[1]: sshd@37-164.90.149.146:22-139.178.68.195:42374.service: Deactivated successfully. Feb 12 19:42:27.021295 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:42:27.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@37-164.90.149.146:22-139.178.68.195:42374 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:27.022635 systemd-logind[1098]: Removed session 24. Feb 12 19:42:27.256000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:27.256000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:27.256000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00288a6c0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:27.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:27.256000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0026afdc0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:27.256000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:27.275000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:27.275000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0026afee0 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:27.275000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:27.280000 audit[1883]: AVC avc: denied { watch } for pid=1883 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="vda9" ino=524806 scontext=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:27.280000 audit[1883]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002946000 a2=fc6 a3=0 items=0 ppid=1725 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c239,c714 key=(null) Feb 12 19:42:27.280000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:29.621138 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 12 19:42:29.621319 kernel: audit: type=1325 audit(1707766949.614:1655): table=filter:131 family=2 entries=20 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.621365 kernel: audit: type=1300 audit(1707766949.614:1655): arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffeb06fbdb0 a2=0 a3=7ffeb06fbd9c items=0 ppid=2166 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.614000 audit[4852]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.614000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2844 a0=3 a1=7ffeb06fbdb0 a2=0 a3=7ffeb06fbd9c items=0 ppid=2166 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.614000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:29.616000 audit[4852]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.637811 kernel: audit: type=1327 audit(1707766949.614:1655): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:29.638001 kernel: audit: type=1325 audit(1707766949.616:1656): table=nat:132 family=2 entries=106 op=nft_register_chain pid=4852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:42:29.616000 audit[4852]: SYSCALL arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffeb06fbdb0 a2=0 a3=7ffeb06fbd9c items=0 ppid=2166 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:29.652102 kernel: audit: type=1300 audit(1707766949.616:1656): arch=c000003e syscall=46 success=yes exit=48164 a0=3 a1=7ffeb06fbdb0 a2=0 a3=7ffeb06fbd9c items=0 ppid=2166 pid=4852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:29.652316 kernel: audit: type=1327 audit(1707766949.616:1656): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:42:32.023000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-164.90.149.146:22-139.178.68.195:42386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:32.024517 systemd[1]: Started sshd@38-164.90.149.146:22-139.178.68.195:42386.service. Feb 12 19:42:32.031143 kernel: audit: type=1130 audit(1707766952.023:1657): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-164.90.149.146:22-139.178.68.195:42386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:32.072000 audit[4857]: USER_ACCT pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.074205 sshd[4857]: Accepted publickey for core from 139.178.68.195 port 42386 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:32.079108 kernel: audit: type=1101 audit(1707766952.072:1658): pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.079000 audit[4857]: CRED_ACQ pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.080835 sshd[4857]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:32.089002 kernel: audit: type=1103 audit(1707766952.079:1659): pid=4857 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.089159 kernel: audit: type=1006 audit(1707766952.079:1660): pid=4857 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:42:32.079000 audit[4857]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff534f7370 a2=3 a3=0 items=0 ppid=1 pid=4857 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:32.079000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:32.092751 systemd-logind[1098]: New session 25 of user core. Feb 12 19:42:32.095455 systemd[1]: Started session-25.scope. Feb 12 19:42:32.101000 audit[4857]: USER_START pid=4857 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.104000 audit[4859]: CRED_ACQ pid=4859 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.186197 kubelet[2009]: E0212 19:42:32.185369 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:32.262233 sshd[4857]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:32.263000 audit[4857]: USER_END pid=4857 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.263000 audit[4857]: CRED_DISP pid=4857 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:32.266586 systemd-logind[1098]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:42:32.266836 systemd[1]: sshd@38-164.90.149.146:22-139.178.68.195:42386.service: Deactivated successfully. Feb 12 19:42:32.267873 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:42:32.266000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@38-164.90.149.146:22-139.178.68.195:42386 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:32.269618 systemd-logind[1098]: Removed session 25. Feb 12 19:42:34.352003 systemd[1]: Started sshd@39-164.90.149.146:22-165.227.101.226:44848.service. Feb 12 19:42:34.353000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-164.90.149.146:22-165.227.101.226:44848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:34.833703 sshd[4881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.101.226 user=root Feb 12 19:42:34.832000 audit[4881]: USER_AUTH pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:42:34.835386 kernel: kauditd_printk_skb: 8 callbacks suppressed Feb 12 19:42:34.835479 kernel: audit: type=1100 audit(1707766954.832:1667): pid=4881 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:authentication grantors=? acct="root" exe="/usr/sbin/sshd" hostname=165.227.101.226 addr=165.227.101.226 terminal=ssh res=failed' Feb 12 19:42:36.671165 sshd[4881]: Failed password for root from 165.227.101.226 port 44848 ssh2 Feb 12 19:42:36.858766 sshd[4881]: Received disconnect from 165.227.101.226 port 44848:11: Bye Bye [preauth] Feb 12 19:42:36.858766 sshd[4881]: Disconnected from authenticating user root 165.227.101.226 port 44848 [preauth] Feb 12 19:42:36.860046 systemd[1]: sshd@39-164.90.149.146:22-165.227.101.226:44848.service: Deactivated successfully. Feb 12 19:42:36.859000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-164.90.149.146:22-165.227.101.226:44848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:36.866095 kernel: audit: type=1131 audit(1707766956.859:1668): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@39-164.90.149.146:22-165.227.101.226:44848 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:37.185977 kubelet[2009]: E0212 19:42:37.185922 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:37.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-164.90.149.146:22-139.178.68.195:43124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:37.270759 systemd[1]: Started sshd@40-164.90.149.146:22-139.178.68.195:43124.service. Feb 12 19:42:37.277155 kernel: audit: type=1130 audit(1707766957.269:1669): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-164.90.149.146:22-139.178.68.195:43124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:37.320383 sshd[4888]: Accepted publickey for core from 139.178.68.195 port 43124 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:37.319000 audit[4888]: USER_ACCT pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.327148 kernel: audit: type=1101 audit(1707766957.319:1670): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.327416 sshd[4888]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:37.325000 audit[4888]: CRED_ACQ pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.336502 kernel: audit: type=1103 audit(1707766957.325:1671): pid=4888 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.336661 kernel: audit: type=1006 audit(1707766957.325:1672): pid=4888 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:42:37.325000 audit[4888]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9844b00 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:37.341858 kernel: audit: type=1300 audit(1707766957.325:1672): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffff9844b00 a2=3 a3=0 items=0 ppid=1 pid=4888 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:37.325000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:37.345301 kernel: audit: type=1327 audit(1707766957.325:1672): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:37.348099 systemd[1]: Started session-26.scope. Feb 12 19:42:37.349156 systemd-logind[1098]: New session 26 of user core. Feb 12 19:42:37.355000 audit[4888]: USER_START pid=4888 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.363247 kernel: audit: type=1105 audit(1707766957.355:1673): pid=4888 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.364481 kernel: audit: type=1103 audit(1707766957.362:1674): pid=4890 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.362000 audit[4890]: CRED_ACQ pid=4890 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.516421 sshd[4888]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:37.518000 audit[4888]: USER_END pid=4888 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.518000 audit[4888]: CRED_DISP pid=4888 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:37.522302 systemd-logind[1098]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:42:37.522000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@40-164.90.149.146:22-139.178.68.195:43124 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:37.523624 systemd[1]: sshd@40-164.90.149.146:22-139.178.68.195:43124.service: Deactivated successfully. Feb 12 19:42:37.524623 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:42:37.525349 systemd-logind[1098]: Removed session 26. Feb 12 19:42:40.460773 systemd[1]: run-containerd-runc-k8s.io-ad954b418aba2d62fa4e982d9f557317b90f9bb8b2abf5f169c522be4a43c5a3-runc.GWH6p2.mount: Deactivated successfully. Feb 12 19:42:42.525796 systemd[1]: Started sshd@41-164.90.149.146:22-139.178.68.195:43140.service. Feb 12 19:42:42.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-164.90.149.146:22-139.178.68.195:43140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:42.527775 kernel: kauditd_printk_skb: 3 callbacks suppressed Feb 12 19:42:42.527823 kernel: audit: type=1130 audit(1707766962.524:1678): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-164.90.149.146:22-139.178.68.195:43140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:42.595000 audit[4924]: USER_ACCT pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.602574 sshd[4924]: Accepted publickey for core from 139.178.68.195 port 43140 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:42.601000 audit[4924]: CRED_ACQ pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.603470 sshd[4924]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:42.608839 kernel: audit: type=1101 audit(1707766962.595:1679): pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.609031 kernel: audit: type=1103 audit(1707766962.601:1680): pid=4924 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.601000 audit[4924]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23b22c70 a2=3 a3=0 items=0 ppid=1 pid=4924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:42.626223 kernel: audit: type=1006 audit(1707766962.601:1681): pid=4924 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:42:42.626500 kernel: audit: type=1300 audit(1707766962.601:1681): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc23b22c70 a2=3 a3=0 items=0 ppid=1 pid=4924 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:42.628146 kernel: audit: type=1327 audit(1707766962.601:1681): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:42.601000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:42.636229 systemd[1]: Started session-27.scope. Feb 12 19:42:42.636738 systemd-logind[1098]: New session 27 of user core. Feb 12 19:42:42.657000 audit[4924]: USER_START pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.668154 kernel: audit: type=1105 audit(1707766962.657:1682): pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.667000 audit[4926]: CRED_ACQ pid=4926 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.674502 kernel: audit: type=1103 audit(1707766962.667:1683): pid=4926 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.872173 sshd[4924]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:42.876000 audit[4924]: USER_END pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.880186 systemd[1]: sshd@41-164.90.149.146:22-139.178.68.195:43140.service: Deactivated successfully. Feb 12 19:42:42.881441 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:42:42.885131 kernel: audit: type=1106 audit(1707766962.876:1684): pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.886860 systemd-logind[1098]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:42:42.876000 audit[4924]: CRED_DISP pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.894095 kernel: audit: type=1104 audit(1707766962.876:1685): pid=4924 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:42.894103 systemd-logind[1098]: Removed session 27. Feb 12 19:42:42.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@41-164.90.149.146:22-139.178.68.195:43140 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:45.823548 systemd[1]: run-containerd-runc-k8s.io-f996ee3d09e129a2f7da07270b46c1ff1c6140aedc17655393c9f088ac6a930d-runc.blSgT8.mount: Deactivated successfully. Feb 12 19:42:47.880349 systemd[1]: Started sshd@42-164.90.149.146:22-139.178.68.195:60920.service. Feb 12 19:42:47.880000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-164.90.149.146:22-139.178.68.195:60920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:47.883360 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:42:47.883449 kernel: audit: type=1130 audit(1707766967.880:1687): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-164.90.149.146:22-139.178.68.195:60920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:47.996000 audit[4978]: USER_ACCT pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:47.997479 sshd[4978]: Accepted publickey for core from 139.178.68.195 port 60920 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:48.004149 kernel: audit: type=1101 audit(1707766967.996:1688): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.004000 audit[4978]: CRED_ACQ pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.014260 kernel: audit: type=1103 audit(1707766968.004:1689): pid=4978 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.014494 kernel: audit: type=1006 audit(1707766968.004:1690): pid=4978 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 19:42:48.014544 kernel: audit: type=1300 audit(1707766968.004:1690): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93266530 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:48.004000 audit[4978]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc93266530 a2=3 a3=0 items=0 ppid=1 pid=4978 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:48.020268 kernel: audit: type=1327 audit(1707766968.004:1690): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:48.004000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:48.023156 sshd[4978]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:48.033168 systemd-logind[1098]: New session 28 of user core. Feb 12 19:42:48.034396 systemd[1]: Started session-28.scope. Feb 12 19:42:48.045000 audit[4978]: USER_START pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.055186 kernel: audit: type=1105 audit(1707766968.045:1691): pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.054000 audit[4980]: CRED_ACQ pid=4980 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.068128 kernel: audit: type=1103 audit(1707766968.054:1692): pid=4980 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.259443 sshd[4978]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:48.262000 audit[4978]: USER_END pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.271905 systemd[1]: sshd@42-164.90.149.146:22-139.178.68.195:60920.service: Deactivated successfully. Feb 12 19:42:48.272309 kernel: audit: type=1106 audit(1707766968.262:1693): pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.273414 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 19:42:48.263000 audit[4978]: CRED_DISP pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.280105 kernel: audit: type=1104 audit(1707766968.263:1694): pid=4978 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:48.280159 systemd-logind[1098]: Session 28 logged out. Waiting for processes to exit. Feb 12 19:42:48.271000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@42-164.90.149.146:22-139.178.68.195:60920 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:48.281955 systemd-logind[1098]: Removed session 28. Feb 12 19:42:48.673575 systemd[1]: run-containerd-runc-k8s.io-b92ec2ffe87a5923cfb84c43e84810570c0a10243982288552715fa5a90cf6df-runc.8XwGmD.mount: Deactivated successfully. Feb 12 19:42:50.186853 kubelet[2009]: E0212 19:42:50.186702 2009 dns.go:158] "Nameserver limits exceeded" err="Nameserver limits were exceeded, some nameservers have been omitted, the applied nameserver line is: 67.207.67.2 67.207.67.3 67.207.67.2" Feb 12 19:42:53.280319 systemd[1]: Started sshd@43-164.90.149.146:22-139.178.68.195:60928.service. Feb 12 19:42:53.282818 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:42:53.282946 kernel: audit: type=1130 audit(1707766973.279:1696): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-164.90.149.146:22-139.178.68.195:60928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.279000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-164.90.149.146:22-139.178.68.195:60928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.341000 audit[5009]: USER_ACCT pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.343426 sshd[5009]: Accepted publickey for core from 139.178.68.195 port 60928 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:53.350159 kernel: audit: type=1101 audit(1707766973.341:1697): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.349000 audit[5009]: CRED_ACQ pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.357165 kernel: audit: type=1103 audit(1707766973.349:1698): pid=5009 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.357390 kernel: audit: type=1006 audit(1707766973.350:1699): pid=5009 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 12 19:42:53.357823 sshd[5009]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:53.350000 audit[5009]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe684ea5c0 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.368659 kernel: audit: type=1300 audit(1707766973.350:1699): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe684ea5c0 a2=3 a3=0 items=0 ppid=1 pid=5009 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:53.368909 kernel: audit: type=1327 audit(1707766973.350:1699): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:53.350000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:53.377012 systemd-logind[1098]: New session 29 of user core. Feb 12 19:42:53.377594 systemd[1]: Started session-29.scope. Feb 12 19:42:53.384000 audit[5009]: USER_START pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.387000 audit[5011]: CRED_ACQ pid=5011 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.397940 kernel: audit: type=1105 audit(1707766973.384:1700): pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.398338 kernel: audit: type=1103 audit(1707766973.387:1701): pid=5011 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.554411 sshd[5009]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:53.555000 audit[5009]: USER_END pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.555000 audit[5009]: CRED_DISP pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.564562 systemd[1]: sshd@43-164.90.149.146:22-139.178.68.195:60928.service: Deactivated successfully. Feb 12 19:42:53.565703 systemd[1]: session-29.scope: Deactivated successfully. Feb 12 19:42:53.568876 kernel: audit: type=1106 audit(1707766973.555:1702): pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.569005 kernel: audit: type=1104 audit(1707766973.555:1703): pid=5009 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:53.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@43-164.90.149.146:22-139.178.68.195:60928 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:53.570294 systemd-logind[1098]: Session 29 logged out. Waiting for processes to exit. Feb 12 19:42:53.571656 systemd-logind[1098]: Removed session 29. Feb 12 19:42:58.564490 systemd[1]: Started sshd@44-164.90.149.146:22-139.178.68.195:33726.service. Feb 12 19:42:58.564000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-164.90.149.146:22-139.178.68.195:33726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.566661 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:42:58.566734 kernel: audit: type=1130 audit(1707766978.564:1705): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-164.90.149.146:22-139.178.68.195:33726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.614000 audit[5022]: USER_ACCT pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.616384 sshd[5022]: Accepted publickey for core from 139.178.68.195 port 33726 ssh2: RSA SHA256:LDsRqpNYdTYD100G09SwfYn1R0SNt/l+VxRWb4eNCNc Feb 12 19:42:58.621092 kernel: audit: type=1101 audit(1707766978.614:1706): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.621000 audit[5022]: CRED_ACQ pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.623823 sshd[5022]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:42:58.628116 kernel: audit: type=1103 audit(1707766978.621:1707): pid=5022 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.628238 kernel: audit: type=1006 audit(1707766978.622:1708): pid=5022 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=30 res=1 Feb 12 19:42:58.622000 audit[5022]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5bf295f0 a2=3 a3=0 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:58.637748 kernel: audit: type=1300 audit(1707766978.622:1708): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc5bf295f0 a2=3 a3=0 items=0 ppid=1 pid=5022 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=30 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:58.637924 kernel: audit: type=1327 audit(1707766978.622:1708): proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:58.622000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:42:58.637318 systemd[1]: Started session-30.scope. Feb 12 19:42:58.639241 systemd-logind[1098]: New session 30 of user core. Feb 12 19:42:58.645000 audit[5022]: USER_START pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.647000 audit[5024]: CRED_ACQ pid=5024 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.656803 kernel: audit: type=1105 audit(1707766978.645:1709): pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.657003 kernel: audit: type=1103 audit(1707766978.647:1710): pid=5024 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.823436 sshd[5022]: pam_unix(sshd:session): session closed for user core Feb 12 19:42:58.824000 audit[5022]: USER_END pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.827921 systemd[1]: sshd@44-164.90.149.146:22-139.178.68.195:33726.service: Deactivated successfully. Feb 12 19:42:58.832230 kernel: audit: type=1106 audit(1707766978.824:1711): pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.832297 kernel: audit: type=1104 audit(1707766978.824:1712): pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.824000 audit[5022]: CRED_DISP pid=5022 uid=0 auid=500 ses=30 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=139.178.68.195 addr=139.178.68.195 terminal=ssh res=success' Feb 12 19:42:58.828867 systemd[1]: session-30.scope: Deactivated successfully. Feb 12 19:42:58.836970 systemd-logind[1098]: Session 30 logged out. Waiting for processes to exit. Feb 12 19:42:58.824000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@44-164.90.149.146:22-139.178.68.195:33726 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:42:58.838325 systemd-logind[1098]: Removed session 30.